No abstract available.
Cited By
- Zaboleeva-Zotova A and Petrovsky A (2023). Formalization of the Structural Synthesis of Technical Systems at the Initial Stage of Design, Scientific and Technical Information Processing, 50:5, (486-493), Online publication date: 1-Dec-2023.
- Lefevre F, Bombardier V, Charpentier P and Krommenacker N (2022). Context-based camera selection from multiple video streams, Multimedia Tools and Applications, 81:2, (2803-2826), Online publication date: 1-Jan-2022.
- Makarov A and Shabunin A On Design of Secure E-Services for Public Authority in the Russian Federation Proceedings of the 20th Conference of Open Innovations Association FRUCT, (260-267)
- Taha A, Metzler P, Trapero R, Luna J and Suri N Identifying and Utilizing Dependencies Across Cloud Security Services Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (329-340)
- Jensen K and Kristensen L (2015). Colored Petri nets, Communications of the ACM, 58:6, (61-70), Online publication date: 21-May-2015.
- Kolfschoten G, van der Hulst S, den Hengst-Bruggeling M and de Vreede G (2012). Transferring Collaboration Process Designs to Practitioners, International Journal of e-Collaboration, 8:3, (36-55), Online publication date: 1-Jul-2012.
- Mavridis I (2011). Deploying Privacy Improved RBAC in Web Information Systems, International Journal of Information Technologies and Systems Approach, 4:2, (70-87), Online publication date: 1-Jul-2011.
- Brand E, Honig W and Wojtowicz M Intelligent systems development in a non engineering curriculum Proceedings of the 16th annual joint conference on Innovation and technology in computer science education, (48-52)
- Botaschanjan J and Hummel B Material flow abstraction of manufacturing systems Proceedings of the 7th International colloquium conference on Theoretical aspects of computing, (153-167)
- Farcas C, Farcas E and Krüger I Requirements for service composition in ultra-large scale software-intensive systems Proceedings of the 15th Monterey conference on Foundations of Computer Software: future Trends and Techniques for Development, (93-115)
- Zhuge H, Xing Y and Shi P (2008). Resource space model, OWL and database, ACM Transactions on Internet Technology, 8:4, (1-31), Online publication date: 1-Sep-2008.
- Grant T, Venter H and Eloff J Simulating adversarial interactions between intruders and system administrators using OODA-RR Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (46-55)
- Kolfschoten G, De Vreede G and Briggs R Computer aided pattern-based collaboration process design Proceedings of the 13th international conference on Groupware: design implementation, and use, (165-172)
- Zhuge H, Shi P, Xing Y and He C Transformation from OWL description to resource space model Proceedings of the First Asian conference on The Semantic Web, (4-23)
- Sharpanskykh A and Treur J Verifying Interlevel Relations within Multi-Agent Systems Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (290-294)
- Hadzilias E Integrating ABC and IDEF0 techniques for the evaluation of workflow management systems Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases, (436-440)
- Sharma A (2005). Collaborative product innovation, Computer-Aided Design, 37:13, (1425-1434), Online publication date: 1-Nov-2005.
- Grant T Unifying planning and control using an OODA-based architecture Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (159-170)
- Hadzilias E A methodology framework for calculating the cost of e-government services Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy, (247-256)
- Cechich A and Piattini M Filtering COTS components through an improvement-based process Proceedings of the 4th international conference on COTS-Based Software Systems, (112-121)
- Manolessos Y, Prezerakos G, Meliones A and Theologou M (2000). A TQM-Based Approach to QoS Management, Journal of Network and Systems Management, 8:2, (191-218), Online publication date: 1-Jun-2000.
- Kim T, Shin G and Hong E Experience with Porting a Unix Version CASE Tool to the Corresponding Java Version Proceedings of the Sixth Asia Pacific Software Engineering Conference
- Dami S, Estublier J and Amiour M (1998). Apel, Automated Software Engineering, 5:1, (61-96), Online publication date: 1-Jan-1998.
- Whitman L, Huff B and Presley A Structured models and dynamic systems analysis Proceedings of the 29th conference on Winter simulation, (518-524)
- Ohnishi A and Tokuda N Visual software requirements definition environment Proceedings of the 21st International Computer Software and Applications Conference, (624-629)
- Klingler C and Solderitsch J DAGAR Proceedings of the conference on TRI-Ada '96: disciplined software development with Ada, (231-245)
- (1995). Achieving Multiple Timeliness Goals for Auto Loans, Interfaces, 25:4, (81-91), Online publication date: 1-Aug-1995.
- Dean D, Lee J, Orwig R and Vogel D (1994). Technological support for group process modeling, Journal of Management Information Systems, 11:3, (43-63), Online publication date: 1-Dec-1994.
- Marca D and McGowan C Specification approaches express different world hypotheses Proceedings of the 7th international workshop on Software specification and design, (214-223)
- Lee J Goal-based process analysis Proceedings of the conference on Organizational computing systems, (196-201)
- Klingler C A case study in process definition Proceedings of the conference on TRI-Ada '93, (65-79)
- McGowan C and Bohner S Model based process assessments Proceedings of the 15th international conference on Software Engineering, (202-211)
- Bollinger T and McGowan C (1991). A Critical Look at Software Capability Evaluations, IEEE Software, 8:4, (25-41), Online publication date: 1-Jul-1991.
- Berry R and Wedberg G Metrics for competitiveness Proceedings of the eighth annual Washington Ada symposium & summer SIGAda meeting on Ada: software: foundation for competitveness, (119-123)
- Marca D Augmenting SADT to develop computer support for cooperative work Proceedings of the 13th international conference on Software engineering, (94-103)
- Joseph L, Watt J and Wigglesworth N Modeling and analysis of a new product development in electronic sub-assembly manufacturing Proceedings of the 22nd conference on Winter simulation, (899-903)
- De Antonellis V and Zonta B (1990). A Disciplined Approach to Office Analysis, IEEE Transactions on Software Engineering, 16:8, (822-828), Online publication date: 1-Aug-1990.
- Marca D (1989). Specifying coordinators: guidelines for groupware developers, ACM SIGSOFT Software Engineering Notes, 14:3, (235-237), Online publication date: 1-May-1989.
- Arango G (1989). Domain analysis: from art form to engineering discipline, ACM SIGSOFT Software Engineering Notes, 14:3, (152-159), Online publication date: 1-May-1989.
- Marca D Specifying coordinators: guidelines for groupware developers Proceedings of the 5th international workshop on Software specification and design, (235-237)
- Arango G Domain analysis: from art form to engineering discipline Proceedings of the 5th international workshop on Software specification and design, (152-159)
- Alabiso B (1988). Transformation of data flow analysis models to object oriented design, ACM SIGPLAN Notices, 23:11, (335), Online publication date: 1-Nov-1988.
- Alabiso B Transformation of data flow analysis models to object oriented design Conference proceedings on Object-oriented programming systems, languages and applications
Index Terms
- SADT: structured analysis and design technique
Recommendations
Performance analysis of structured peer-to-peer overlays for mobile networks
Distributed Hash Table DHT based Peer-to-Peer P2P overlays have been widely researched and deployed in many applications such as file sharing, IP telephony, content distribution and media streaming applications. However, their deployment has largely ...
Structured design methodologies
DAC '78: Proceedings of the 15th Design Automation ConferenceThis tutorial considers the structure and construction of reliable software.
By way of introduction, several of the structured programming and software engineering techniques are classified into three groups; those which impact primarily on the program ...
SADT@@@@ /SAINT: Large scale analysis simulation methodology
WSC '81: Proceedings of the 13th conference on Winter simulation - Volume 1SADT/SAINT is a highly structured, top-down simulation methodology for defining, analyzing, communicating, and documenting large-scale systems. Structured Analysis and Design Technique (SADT), developed by SofTech, provides a functional representation ...