From post

Going beyond MDA: Business process modeling for software reuse

, , , и . Proceedings of the Workshop on Legacy Transformation: Capturing Business Knowledge from Legacy Systems - OOPSLA'2004, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Abstract State Machine Specification and Verification of the Location Consistency Memory Model and Cache Protocol., , и . J. Univers. Comput. Sci., 7 (11): 1088-1112 (2001)Detection of SOA Patterns., , и . ICSOC, том 8274 из Lecture Notes in Computer Science, стр. 114-130. Springer, (2013)Lenient evaluation is neither strict nor lazy.. Comput. Lang., 26 (1): 43-66 (2000)Lenient evaluation and parallelism., и . Comput. Lang., 26 (1): 27-41 (2000)Implementation of the EARTH programming model on SMP clusters: a multi-threaded language and runtime system., , , и . Concurr. Comput. Pract. Exp., 15 (9): 821-844 (2003)PiCo: A Novel Approach to Stream Data Analytics., , , и . Euro-Par Workshops, том 10659 из Lecture Notes in Computer Science, стр. 118-128. Springer, (2017)Extending a marking tool with simple support for testing., , и . ITiCSE, стр. 313. ACM, (2007)Automated and Unanticipated Flexible Component Substitution., , , , и . CBSE, том 4608 из Lecture Notes in Computer Science, стр. 33-48. Springer, (2007)A possibilistic approach to intrusion detection under imperfect logging protocol., и . SIN, стр. 266-271. ACM, (2013)Specification and Detection of SOA Antipatterns in Web Services., , , и . ECSA, том 8627 из Lecture Notes in Computer Science, стр. 58-73. Springer, (2014)