Anderson et al., 1989 - Google Patents
A proposed perspective shift: Viewing specification design as a planning problemAnderson et al., 1989
View PDF- Document ID
- 81776260708865650
- Author
- Anderson J
- Fickas S
- Publication year
- Publication venue
- ACM SIGSOFT Software Engineering Notes
External Links
Snippet
Our interest is in formal models of the specification process. In this paper we argue that with the right perspective and set of assumptions, work in AI planning may be brought to bear on three aspects of designing a software specification: proposing a specification (generation); …
- 238000000034 method 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Anderson et al. | A proposed perspective shift: Viewing specification design as a planning problem | |
| US7080355B2 (en) | Targeted asset capture, identification, and management | |
| US6442557B1 (en) | Evaluation of enterprise architecture model including relational database | |
| US7895563B2 (en) | Managing reusable software assets | |
| Proper | A theory for conceptual modelling of evolving application domains | |
| Bertolissi et al. | Automated synthesis of run-time monitors to enforce authorization policies in business processes | |
| Rouvellou et al. | Extending business objects with business rules | |
| Milliner et al. | A scalable architecture for autonomous heterogeneous database interactions | |
| Wijesekera et al. | Policy algebras for access control: the propositional case | |
| dos Santos et al. | Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: Scalability and reusability | |
| Chen-Burger | Knowledge sharing and inconsistency checking on multiple enterprise models | |
| Fordham et al. | Evolving databases: An application to electronic commerce | |
| Reuber | Opportunities for Accounting Information Systems Research from a Database Perspective. | |
| Elgedawy | USTA: an aspect-oriented knowledge management framework for reusable assets discovery | |
| Lauzon et al. | Task-oriented and similarity-based retrieval | |
| Ledru et al. | Validation of security policies by the animation of z specifications | |
| Chang et al. | A formal approach to software components classification and retrieval | |
| Carvalho et al. | Using alloy for verifying the integration of OLAP preferences in a hybrid what-if scenario application | |
| Babin et al. | Application of formal methods to scenario-based requirements engineering | |
| Patterson | A Data Base Management System | |
| Ghani et al. | Semantics-oriented approach for information interoperability and governance: towards user-centric enterprise architecture management | |
| Blanco Bueno et al. | Security policies by design in NoSQL document databases | |
| Woodall et al. | A systematic literature review of inference strategies | |
| Jajodia et al. | A flexible authorization framework for e-commerce | |
| Sconyers | Characterizing software specifications for domain-specific reuse |