Kluwer Academic Publishers

Displaying 1-5 of 5 results

  • White Papers // Jan 2011

    Mechanizing and Improving Dependency Pairs

    The dependency pair technique is a powerful method for automated termination and innermost termination proofs of Term Rewrite Systems (TRSs). For any TRS, it generates inequality constraints that have to be satisfied by well-founded orders. The authors improve the dependency pair technique by considerably reducing the number of constraints produced...

    Provided By Kluwer Academic Publishers

  • White Papers // Jul 2010

    A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques

    Modeling always has been at the core of both organizational design and Information Systems (IS) development. Models enable decision makers to filter out the irrelevant complexities of the real world, so that efforts can be directed toward the most important parts of the system under study. However, both business analysts...

    Provided By Kluwer Academic Publishers

  • White Papers // Jan 2010

    Specifying OLAP Cubes on XML Data

    On-Line Analytical Processing (OLAP) enables analysts to gain insight about data through fast and interactive access to a variety of possible views on information, organized in a dimensional model. The demand for data integration is rapidly becoming larger as more and more information sources appear in modern enterprises. In the...

    Provided By Kluwer Academic Publishers

  • White Papers // Dec 2008

    Topology Control for Fault-Tolerant Communication in Wireless Ad Hoc Networks

    Fault-tolerant communication and energy efficiency are important requirements for future-generation wireless ad hoc networks, which are increasingly being considered also for critical application domains like embedded systems in automotive and aerospace. Topology control, which enables multi-hop communication between any two network nodes via a suitably constructed overlay network, is the...

    Provided By Kluwer Academic Publishers

  • White Papers // Jun 2007

    Computer-Aided Support for Secure Tropos

    In earlier paper, the authors have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of security requirements. This paper briefly recaps the concepts proposed for capturing security aspects, and presents an implemented graphical CASE tool that supports the...

    Provided By Kluwer Academic Publishers

  • White Papers // Jul 2010

    A Taxonomy of Business Process Modeling and Information Systems Modeling Techniques

    Modeling always has been at the core of both organizational design and Information Systems (IS) development. Models enable decision makers to filter out the irrelevant complexities of the real world, so that efforts can be directed toward the most important parts of the system under study. However, both business analysts...

    Provided By Kluwer Academic Publishers

  • White Papers // Jan 2010

    Specifying OLAP Cubes on XML Data

    On-Line Analytical Processing (OLAP) enables analysts to gain insight about data through fast and interactive access to a variety of possible views on information, organized in a dimensional model. The demand for data integration is rapidly becoming larger as more and more information sources appear in modern enterprises. In the...

    Provided By Kluwer Academic Publishers

  • White Papers // Jan 2011

    Mechanizing and Improving Dependency Pairs

    The dependency pair technique is a powerful method for automated termination and innermost termination proofs of Term Rewrite Systems (TRSs). For any TRS, it generates inequality constraints that have to be satisfied by well-founded orders. The authors improve the dependency pair technique by considerably reducing the number of constraints produced...

    Provided By Kluwer Academic Publishers

  • White Papers // Dec 2008

    Topology Control for Fault-Tolerant Communication in Wireless Ad Hoc Networks

    Fault-tolerant communication and energy efficiency are important requirements for future-generation wireless ad hoc networks, which are increasingly being considered also for critical application domains like embedded systems in automotive and aerospace. Topology control, which enables multi-hop communication between any two network nodes via a suitably constructed overlay network, is the...

    Provided By Kluwer Academic Publishers

  • White Papers // Jun 2007

    Computer-Aided Support for Secure Tropos

    In earlier paper, the authors have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of security requirements. This paper briefly recaps the concepts proposed for capturing security aspects, and presents an implemented graphical CASE tool that supports the...

    Provided By Kluwer Academic Publishers