乏味 发表于 2025-3-28 18:34:37

nsive information systems became apparent. The group of John Mylopoulos at the UniveISity of Toronto and their European collaboratoIS moved from semantic models of information systems design (Taxis project) towards earlier stages of the software lifecycle. Joachim Schmidt‘s group at the University o

Amorous 发表于 2025-3-28 22:04:20

https://doi.org/10.1057/9781137409997ncepts of objects, systematized by abstraction principles of.turned out to be very suitable for the specification of large Information Systems . This approach was further enhanced by adding logical assertions to express the intended meaning of the objects. This lead to the . and to its enhanced version . described in this chapter.

Negotiate 发表于 2025-3-29 01:41:20

http://reply.papertrans.cn/27/2634/263346/263346_43.png

V洗浴 发表于 2025-3-29 03:19:05

http://reply.papertrans.cn/27/2634/263346/263346_44.png

大喘气 发表于 2025-3-29 09:35:51

Conflict, Violent Extremism and Developmentositories, the focus of attention moves from merely capturing data to sharing and integration. Repositories maintain data consistency and disseminate objects and dependencies inside an environment. What then are useful data modeling facilities?

不能强迫我 发表于 2025-3-29 15:10:58

http://reply.papertrans.cn/27/2634/263346/263346_46.png

Osteoarthritis 发表于 2025-3-29 15:51:41

http://reply.papertrans.cn/27/2634/263346/263346_47.png

Dorsal-Kyphosis 发表于 2025-3-29 22:21:40

Modular and Rule-Based Database Programming in DBPL construction of correct, modular and efficient database programs integrating well-developed compilation and database technology..After an introduction to the language concepts of DBPL, two methodological aspects central to the implementation of database applications are discussed. The first task is

corpus-callosum 发表于 2025-3-30 03:43:37

http://reply.papertrans.cn/27/2634/263346/263346_49.png

讨人喜欢 发表于 2025-3-30 04:12:40

Modeling Security Requirements in Information Systemshe study of security aspects. The modeling framework is the Group Security Model (GSM) which describes access rights through a teamwork-oriented organizational model. Reasoning about GSM application models is enabled by representing them in a deductive and object-oriented database language, Telos. A
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Database Application Engineering with DAIDA; Matthias Jarke Book 1993 ECSC — EEC — EAEC, Brussels — Luxembourg 1993 Anforderungsmodellieru