-
2
-
-
84857658006
-
An authorization model for data warehouses and olap
-
New Orleans, Louisiana, USA
-
Weippl, E., Mangisengi, O., Essmayr, W., Lichtenberger, F. and Winiwarter, W. (2001) An Authorization Model for Data Warehouses and olap. Workshop on Security in Distributed Data Warehousing, New Orleans, Louisiana, USA.
-
(2001)
Workshop on Security in Distributed Data Warehousing
-
-
Weippl, E.1
Mangisengi, O.2
Essmayr, W.3
Lichtenberger, F.4
Winiwarter, W.5
-
3
-
-
48649090732
-
Extended rbac-based design and implementation for a secure data warehouse
-
Thuraisingham, B., Kantarcioglu, M. and Iyer, S. (2007) Extended rbac-based design and implementation for a secure data warehouse. Int. J. Bus. Intell. Data Mining, 2, 367-382.
-
(2007)
Int. J. Bus. Intell. Data Mining
, vol.2
, pp. 367-382
-
-
Thuraisingham, B.1
Kantarcioglu, M.2
Iyer, S.3
-
4
-
-
60849106337
-
Model-driven development for secure information systems
-
Fernández-Medina, E., Jurjens, J., Trujillo, J. and Jajodia, S. (2009) Model-driven development for secure information systems. Inf. Softw. Technol., 51, 809-814.
-
(2009)
Inf. Softw. Technol.
, vol.51
, pp. 809-814
-
-
Fernández-Medina, E.1
Jurjens, J.2
Trujillo, J.3
Jajodia, S.4
-
5
-
-
84937616532
-
Software engineering for secure systems: Industrial and research perspectives
-
Mouratidis, H. (2011) Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global.
-
(2011)
IGI Global
-
-
Mouratidis, H.1
-
7
-
-
84978686072
-
Reverse engineering: A road map
-
Muller, H. A., Jahnke, J. H., Smith, D. B., Storey, M.-A., Tilley, S. R. and Wong, K. (2000) Reverse engineering: A road map. Proc. of the Conf. on the Future of Software Engineering (ICSE '00), pp. 47-60.
-
(2000)
Proc. of the Conf. on the Future of Software Engineering (ICSE '00)
, pp. 47-60
-
-
Muller, H.A.1
Jahnke, J.H.2
Smith, D.B.3
Storey, M.-A.4
Tilley, S.R.5
Wong, K.6
-
9
-
-
0031651325
-
Reverse engineering of data
-
Aiken, P. H. (1998) Reverse engineering of data. IBM Syst. J., 37, 246-269.
-
(1998)
IBM Syst. J.
, vol.37
, pp. 246-269
-
-
Aiken, P.H.1
-
10
-
-
0034770178
-
Aretrospective on industrial database reverse engineering projects-part 1
-
Suttgart, Germany. IEEE Computer Society
-
Blaha, M. (2001)ARetrospective on Industrial Database Reverse Engineering Projects-Part 1. Proc. 8thWorking Conf. on Reverse Engineering (WCRE01), Suttgart, Germany, pp. 136-147. IEEE Computer Society.
-
(2001)
Proc. 8thWorking Conf. on Reverse Engineering (WCRE01)
, pp. 136-147
-
-
Blaha, M.1
-
11
-
-
2442466828
-
Automatic high-quality reengineering of database programs by abstraction, transformation and reimplementation
-
Cohen, Y. and Feldman, Y. A. (2003) Automatic high-quality reengineering of database programs by abstraction, transformation and reimplementation. ACM Trans. Softw. Eng. Methodol., 12, 285-316.
-
(2003)
ACM Trans. Softw. Eng. Methodol.
, vol.12
, pp. 285-316
-
-
Cohen, Y.1
Feldman, Y.A.2
-
12
-
-
0030169147
-
Database reverse engineering: From requirements to care tools
-
Hainaut, J.-L., Englebert, V., Henrard, J., Hick, J.-M. and Roland1, D. (2004) Database reverse engineering: From requirements to care tools. Appl. Categ. Struct., 3, pp. 9-45.
-
(2004)
Appl. Categ. Struct.
, vol.3
, pp. 9-45
-
-
Hainaut, J.-L.1
Englebert, V.2
Henrard, J.3
Hick, J.-M.4
Rolandl, D.5
-
13
-
-
35548980380
-
Modeldriven multidimensional modeling of secure data warehouses
-
Fernández-Medina, E., Trujillo, J. and Piattini, M. (2007) Modeldriven multidimensional modeling of secure data warehouses. Eur. J. Inf. Syst., 16, 374-389.
-
(2007)
Eur. J. Inf. Syst.
, vol.16
, pp. 374-389
-
-
Fernández-Medina, E.1
Trujillo, J.2
Piattini, M.3
-
16
-
-
33745471209
-
Model-driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J. and Lodderstedt, T. (2006) Model-driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15, 39-91.
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
17
-
-
79955143136
-
Secureuml: A UML-based modeling language for model-driven security
-
Dresden, Germany. Springer
-
Lodderstedt, T., Basin, D. and Doser, J. (2002) Secureuml: A UML-Based Modeling Language for Model-Driven Security. UML2002. The Unified Modeling Language. Model Engineering, Languages Concepts, and Tools. 5th International Conference, Dresden, Germany, pp. 426-441. Springer.
-
(2002)
UML2002. The Unified Modeling Language. Model Engineering, Languages Concepts, and Tools. 5th International Conference
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
18
-
-
34548787238
-
Model-based security engineering of distributed information systems using umlsec
-
Minneapolis, MN, USA. IEEE
-
Best, B., Jurjens, J. and Nuseibeh, B. (2007) Model-Based Security Engineering of Distributed Information Systems Using UMLsec. Int. Conf. on Software Engineering, Minneapolis, MN, USA, pp. 581-590. IEEE.
-
(2007)
Int. Conf. on Software Engineering
, pp. 581-590
-
-
Best, B.1
Jurjens, J.2
Nuseibeh, B.3
-
20
-
-
84884911001
-
Towards model transformation between secureuml and umlsec for role-based access control
-
Amsterdam, The Netherlands. IOS Press
-
Matulevicius, R. and Dumas, M. (2011) Towards Model Transformation Between Secureuml and UMLsec for Role-Based Access Control. Proc. 2011 Conf. on Databases and Information Systems VI: Selected Papers fromthe 9th Int. Baltic Conf., DB&IS 2010, Amsterdam, The Netherlands, pp. 339-352. IOS Press.
-
(2011)
Proc. 2011 Conf. on Databases and Information Systems VI: Selected Papers Fromthe 9th Int. Baltic Conf., DB&IS 2010
, pp. 339-352
-
-
Matulevicius, R.1
Dumas, M.2
-
22
-
-
34548563765
-
Computeraided support for secure tropos
-
Massacci, F., Mylopoulos, J. and Zannone, N. (2007) Computeraided support for secure tropos. Autom. Softw. Eng., 14, 341-364.
-
(2007)
Autom. Softw. Eng.
, vol.14
, pp. 341-364
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
23
-
-
58849148475
-
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
-
Compagna, L., Khoury, P., Krausová, A., Massacci, F. and Zannone, N. (2009) How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law, 17, 1-30.
-
(2009)
Artif. Intell. Law
, vol.17
, pp. 1-30
-
-
Compagna, L.1
Khoury, P.2
Krausová, A.3
Massacci, F.4
Zannone, N.5
-
24
-
-
51349106453
-
Twenty-five years of mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to mde and correct protocols in cyberspace
-
van de Riet, R. (2008) Twenty-five years of mokum: for 25 years of data and knowledge engineering: Correctness by design in relation to mde and correct protocols in cyberspace. Data Knowl. Eng., 67, 293-329.
-
(2008)
Data Knowl. Eng.
, vol.67
, pp. 293-329
-
-
Van De Riet, R.1
-
27
-
-
0006815158
-
Extending the e/r model for the multidimensional paradigm
-
Sapia, C., Blaschka, M., Hofling, G. and Dinter, B. (1998) Extending the e/r model for the multidimensional paradigm. 1st Int. Workshop on DataWarehouse and Data Mining (DWDM'98), Singapore, pp. 105-116. Springer. 11th IEEE Int. Requirements Engineering Conf., 2003. Proceedings. pp. 75-84
-
(1998)
1st Int. Workshop on DataWarehouse and Data Mining (DWDM'98)Singapore 105-116. Springer. 11th IEEE Int. Requirements Engineering Conf., 2003. Proceedings.
, pp. 75-84
-
-
Sapia, C.1
Blaschka, M.2
Hofling, G.3
Dinter, B.4
-
28
-
-
84997303830
-
Starer: A conceptual model for data warehouse design
-
Missouri, USA. ACM
-
Tryfona, N., Busborg, F. and Christiansen, J. (1999) Starer: A Conceptual Model for Data Warehouse Design. ACM 2nd Int. Workshop on Data Warehousing and OLAP (DOLAP'99), Missouri, USA, pp. 3-8. ACM.
-
(1999)
ACM 2nd Int. Workshop on Data Warehousing and OLAP (DOLAP'99)
, pp. 3-8
-
-
Tryfona, N.1
Busborg, F.2
Christiansen, J.3
-
30
-
-
33646695493
-
Yam2: A multidimensional conceptual model extending uml
-
Abelló, A., Samos, J. and Saltor, F. (2006) Yam2: A multidimensional conceptual model extending uml. Inf. Syst., 31, 668-677.
-
(2006)
Inf. Syst.
, vol.31
, pp. 668-677
-
-
Abelló, A.1
Samos, J.2
Saltor, F.3
-
33
-
-
0030692487
-
A security concept for olap
-
Toulouse, France. IEEE Computer Society
-
Kirkgoze, R., Katic, N., Stolda, M. and Min Tjoa, A. (1997) A Security Concept for olap. 8th Int. Workshop on Database and Expert System Applications (DEXA'97), Toulouse, France, pp. 619-626. IEEE Computer Society.
-
(1997)
8th Int. Workshop on Database and Expert System Applications (DEXA'97)
, pp. 619-626
-
-
Kirkgoze, R.1
Katic, N.2
Stolda, M.3
Min Tjoa, A.4
-
34
-
-
33144471694
-
A cubic-wise balance approach for privacy preservation in data cubes
-
Liu, Y., Sung, S. and Xiong, H. (2006) A cubic-wise balance approach for privacy preservation in data cubes. Inf. Sci., 176, 1215-1240.
-
(2006)
Inf. Sci.
, vol.176
, pp. 1215-1240
-
-
Liu, Y.1
Sung, S.2
Xiong, H.3
-
35
-
-
32544435242
-
Privacy preservation for data cubes
-
Sung, Y., Liu, Y., Xiong, H. and A. Xg, P. (2006) Privacy preservation for data cubes. Knowl. Inf. Syst., 9, 38-61.
-
(2006)
Knowl. Inf. Syst.
, vol.9
, pp. 38-61
-
-
Sung, Y.1
Liu, Y.2
Xiong, H.3
Xg P, A.4
-
37
-
-
84947933174
-
Database design recovery
-
Hainaut, J.-L., Henrard, J., Ronald, D. and Englebert, V. (1996) Database design recovery. CAiSE, pp. 272-300.
-
(1996)
CAiSE
, pp. 272-300
-
-
Hainaut, J.-L.1
Henrard, J.2
Ronald, D.3
Englebert, V.4
-
38
-
-
0032208607
-
Relational database reverse engineering: Algorithms to extract cardinality constraints
-
Soutou, C. (1998) Relational database reverse engineering: Algorithms to extract cardinality constraints. Data Knowl. Eng., 28, 161-207.
-
(1998)
Data Knowl. Eng.
, vol.28
, pp. 161-207
-
-
Soutou, C.1
-
39
-
-
0036836975
-
Clustering relations into abstract er schemas for database reverse engineering
-
Sousa, P., Pedro-de Jesus, L., Pereira, G. and Brito e Abreu, F. (2002) Clustering relations into abstract er schemas for database reverse engineering. Sci. Comput. Program, 45, 137-153.
-
(2002)
Sci. Comput. Program
, vol.45
, pp. 137-153
-
-
Sousa, P.1
Pedro-De Jesus, L.2
Pereira, G.3
Brito Abreu, E.F.4
-
42
-
-
37749027100
-
An mda-based approach for database re-engineering
-
Polo, M., García Rodríguez de Guzmán, I. and Piattini, M. (2007) An mda-based approach for database re-engineering. J. Softw. Maintance Evol., 19, 383-417.
-
(2007)
J. Softw. Maintance Evol.
, vol.19
, pp. 383-417
-
-
Polo, M.1
García Rodríguez De Guzmán, I.2
Piattini, M.3
-
43
-
-
0036888284
-
Generating three-tier applications from relational databases: A formal and practical approach
-
Polo, M., Gómez, J., Piattini, M. and Ruiz, F. (2002) Generating three-tier applications from relational databases: a formal and practical approach. Inf. Softw. Technol., 44, 923-941.
-
(2002)
Inf. Softw. Technol.
, vol.44
, pp. 923-941
-
-
Polo, M.1
Gómez, J.2
Piattini, M.3
Ruiz, F.4
-
44
-
-
84897040963
-
Showing the benefits of applying a modeldriven architecture for developing secure olap applications
-
Blanco, C., de Guzmán, I. G. R., Fernández-Medina, E. and Trujillo, J. (2014) Showing the benefits of applying a modeldriven architecture for developing secure olap applications. J. UCS, 20, 79-106.
-
(2014)
J. UCS
, vol.20
, pp. 79-106
-
-
Blanco, C.1
De Guzmán, I.G.R.2
Fernández-Medina, E.3
Trujillo, J.4
-
45
-
-
67349151119
-
A uml 2 0 profile to define security requirements for data warehouses
-
Trujillo, J., Soler, E., Fernández-Medina, E. and Piattini, M. (2009) A uml 2. 0 profile to define security requirements for data warehouses. Comput. Stand. Interfaces, 31, 969-983.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, pp. 969-983
-
-
Trujillo, J.1
Soler, E.2
Fernández-Medina, E.3
Piattini, M.4
-
46
-
-
0030781944
-
Towards modelling and reasoning support for early-phase requirements engineering
-
Washington, DC. IEEE
-
Yu, E. (1997) Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering. 3rd IEEE International Symposium on Requirements Engineering (RE'97),Washington, DC, pp. 226-235. IEEE.
-
(1997)
3rd IEEE International Symposium on Requirements Engineering (RE'97)
, pp. 226-235
-
-
Yu, E.1
-
47
-
-
33749603462
-
Access control and audit model for the multidimensional modeling of data warehouses
-
Fernández-Medina, E., Trujillo, J., Villarroel, R. and Piattini, M. (2006) Access control and audit model for the multidimensional modeling of data warehouses. Decis. Support Syst., 42, 1270-1289.
-
(2006)
Decis. Support Syst.
, vol.42
, pp. 1270-1289
-
-
Fernández-Medina, E.1
Trujillo, J.2
Villarroel, R.3
Piattini, M.4
-
48
-
-
84887568268
-
Defining and transforming security rules in an mda approach for dws
-
Blanco, C., García Rodríguez de Guzmán, I., Fernández-Medina, E., Trujillo, J. and Piattini, M. (2010) Defining and transforming security rules in an mda approach for dws. Int. J. Bus. Intell. Data Mining, 5, 116-133.
-
(2010)
Int. J. Bus. Intell. Data Mining
, vol.5
, pp. 116-133
-
-
Blanco, C.1
García Rodríguez De Guzmán, I.2
Fernández-Medina, E.3
Trujillo, J.4
Piattini, M.5
-
49
-
-
68049118693
-
Applying qvt in order to implement secure data warehouses in SQL server analysis services
-
Blanco, C., García-Rodríguez de Guzmán, I., G. Rosado, D., Fernández-Medina, E. and Trujillo, J. (2009) Applying qvt in order to implement secure data warehouses in sql server analysis services. J. Res. Practice Inf. Technol., 41, 135-154.
-
(2009)
J. Res. Practice Inf. Technol.
, vol.41
, pp. 135-154
-
-
Blanco, C.1
García-Rodríguez De Guzmán, I.2
Rosado D, G.3
Fernández-Medina, E.4
Trujillo, J.5
-
50
-
-
62349117518
-
An engineering process for developing secure data warehouses
-
Trujillo, J., Soler, E., Fernández-Medina, E. and Piattini, M. (2009) An engineering process for developing secure data warehouses. Inf. Softw. Technol., 51, 1033-1051.
-
(2009)
Inf. Softw. Technol.
, vol.51
, pp. 1033-1051
-
-
Trujillo, J.1
Soler, E.2
Fernández-Medina, E.3
Piattini, M.4
-
51
-
-
15544379188
-
In search of a basic principle for model-driven engineering
-
Bézivin, J. (2004) In search of a basic principle for model-driven engineering. Upgrade, 5, 21-24.
-
(2004)
Upgrade
, vol.5
, pp. 21-24
-
-
Bézivin, J.1
-
52
-
-
0141502298
-
Model-driven development- guest editor's introduction
-
Mellor, Clark, and Futugami (2003) Model-driven development- guest editor's introduction. IEEE Softw., 20, 14-18.
-
(2003)
IEEE Softw.
, vol.20
, pp. 14-18
-
-
Clark, M.1
Futugami2
-
53
-
-
33749606997
-
Model-driven development of secure xml databases
-
Vela, B., Fernandez-Medina, E., Marcos, E. and Piattini, M. (2006) Model-driven development of secure xml databases. ACM Sigmod Record, 35, 22-27.
-
(2006)
ACM Sigmod Record
, vol.35
, pp. 22-27
-
-
Vela, B.1
Fernandez-Medina, E.2
Marcos, E.3
Piattini, M.4
-
54
-
-
29144529186
-
Applying mda in Traditional Database-Based Application Development
-
Coventry, UK. IEEE
-
Li, B., Liu, S. and Yu, Z. (2005) Applying mda in Traditional Database-Based Application Development. Int. Conf. on Computer Supported Cooperative Work in Design, Coventry, UK, pp. 1038-1041. IEEE.
-
(2005)
Int. Conf. on Computer Supported Cooperative Work in Design
, pp. 1038-1041
-
-
Li, B.1
Liu, S.2
Yu, Z.3
-
55
-
-
36048975359
-
Evaluation of mda-psm Database Model Quality in the Context of Selected Non-Functional Requirements
-
IEEE, Szklarska Poreba, Poland
-
Dubielewicz, I., Hnatkowska, B., Huzar, Z. and Tuzinkiewicz, L. (2007) Evaluation of mda-psm Database Model Quality in the Context of Selected Non-Functional Requirements. Int. Conf. on Dependability of Computer Systems, Szklarska Poreba, Poland, pp. 19-26. IEEE.
-
(2007)
Int. Conf. on Dependability of Computer Systems
, pp. 19-26
-
-
Dubielewicz, I.1
Hnatkowska, B.2
Huzar, Z.3
Tuzinkiewicz, L.4
-
56
-
-
35248878658
-
Model transformation for object-relational database development
-
ACM, Seoul, Korea
-
Vara, J., Vela, B., Cavero, J. and Marcos, E. (2007) Model Transformation for Object-Relational Database Development. ACM Symposium on Applied Computing, Seoul, Korea, pp. 1012-1019. ACM.
-
(2007)
ACM Symposium on Applied Computing
, pp. 1012-1019
-
-
Vara, J.1
Vela, B.2
Cavero, J.3
Marcos, E.4
-
57
-
-
41149159850
-
An mda approach for the development of data warehouses
-
Mazón, J.-N. and Trujillo, J. (2008) An mda approach for the development of data warehouses. Decis. Support Syst., 45, 41-58.
-
(2008)
Decis. Support Syst.
, vol.45
, pp. 41-58
-
-
Mazón, J.-N.1
Trujillo, J.2
-
58
-
-
84937616536
-
Automatic generation of secure xml data warehouses by using qvt within an mda framework
-
Vela, B., Mazón, J., Blanco, C., Fernández-Medina, E., Trujillo, J., and Marcos, E. (2013)Automatic generation of secure xml data warehouses by using qvt within an mda framework. Inf. Softw. Technol., 55.
-
(2013)
Inf. Softw. Technol.
, vol.55
-
-
Vela, B.1
Mazón, J.2
Blanco, C.3
Fernández-Medina, E.4
Trujillo, J.5
Marcos, E.6
-
59
-
-
77952478886
-
Model-driven architecture approach for data warehouse
-
Fernandes, L., Neto, B., Fagundes, V., Zimbrao, G., de Souza, J. and Salvador, R. (2010) Model-driven architecture approach for data warehouse. 6th Int. Conf. on Autonomic and Autonomous Systems (ICAS), pp. 156-161.
-
(2010)
6th Int. Conf. on Autonomic and Autonomous Systems (ICAS)
, pp. 156-161
-
-
Fernandes, L.1
Neto, B.2
Fagundes, V.3
Zimbrao, G.4
De Souza, J.5
Salvador, R.6
-
60
-
-
38149102817
-
The websa approach: Applying model-driven engineering to web applications
-
Meliá, S. and Gomez, J. (2006) The websa approach: applying model-driven engineering to web applications. J. Web Eng., 5, 121-149.
-
(2006)
J. Web Eng.
, vol.5
, pp. 121-149
-
-
Meliá, S.1
Gomez, J.2
-
61
-
-
33845568748
-
Application mda in a conception design environment
-
IEEE Computer Society, Hangzhou, China
-
Tan, W., Ma, L., Li, J. and Xiao, Z. (2006) Application mda in a Conception Design Environment. Int. Multi-Symposiums on Computer and Computational Sciences, Hangzhou, China, pp. 702-704. IEEE Computer Society.
-
(2006)
Int. Multi-Symposiums on Computer and Computational Sciences
, pp. 702-704
-
-
Tan, W.1
Ma, L.2
Li, J.3
Xiao, Z.4
-
62
-
-
39749089267
-
Transform from models to service description based on mda
-
GuangZhou, China. IEEE
-
Yu, B., Zhang, C. and Zhao, Y. (2006) Transform from Models to Service Description Based on mda. Asia-Pacific Conference on Services Computing, GuangZhou, China, pp. 605-608. IEEE.
-
(2006)
Asia-Pacific Conference on Services Computing
, pp. 605-608
-
-
Yu, B.1
Zhang, C.2
Zhao, Y.3
-
63
-
-
70350215410
-
Model-driven generation ofweb applications in uwe
-
Como, Italy
-
Kraus, A., Knapp, A. and Koch, N. (2007) Model-Driven Generation ofWeb Applications in uwe. InternationalWorkshop on Model-Driven Web Engineering, Como, Italy.
-
(2007)
InternationalWorkshop on Model-Driven Web Engineering
-
-
Kraus, A.1
Knapp, A.2
Koch, N.3
-
66
-
-
33845315868
-
P2i: An innovative mda methodology for embedded real-time systems
-
Porto, Portugal. IEEE
-
Cuccuru, A., De Simone, R., Saunier, T., Siegel, G. and Sorel, Y. (2005) P2i: An Innovative mda Methodology for Embedded Real-Time Systems. Euromicro Conference on Digital System Design, Porto, Portugal, pp. 26-33. IEEE.
-
(2005)
Euromicro Conference on Digital System Design
, pp. 26-33
-
-
Cuccuru, A.1
De Simone, R.2
Saunier, T.3
Siegel, G.4
Sorel, Y.5
-
67
-
-
33749078294
-
A component-based uml profile to model embedded real-time systems designed by the mda approach
-
Hong Kong, China. IEEE
-
Lu, S., Halang, W. A. and Zhang, L. (2005) A Component-Based uml Profile to Model Embedded Real-Time Systems Designed by the mda Approach. Int. Conf. on Embedded and Real-Time Computing Systems and Applications, Hong Kong, China, pp. 563-566. IEEE.
-
(2005)
Int. Conf. on Embedded and Real-Time Computing Systems and Applications
, pp. 563-566
-
-
Lu, S.1
Halang, W.A.2
Zhang, L.3
-
68
-
-
34547237820
-
A mda-based soc modeling approach using uml and systemc
-
IEEE, Baridhara, Bangladesh
-
Wang,Y., Zhou, X., Liang, L. and Peng, C. (2006) A mda-Based Soc Modeling Approach Using UML and SystemC. Int. Conf. on Computer and Information Technology, Baridhara, Bangladesh, pp. 245-251. IEEE.
-
(2006)
Int. Conf. on Computer and Information Technology
, pp. 245-251
-
-
Wang, Y.1
Zhou, X.2
Liang, L.3
Peng, C.4
|