An information system maintains a representation of the state of the domain in its Information Base (IB). The state of the IB changes due to the execution of the operations defined in the behavioral schema. There are two different approaches for specifying the effect of an operation: the imperative and the declarative approaches. In conceptual modeling, the declarative approach is preferable since it allows a more abstract and concise definition of the operation effect and conceals all implementation issues. Nevertheless, in order to execute the conceptual schema, declarative specifications must be transformed into equivalent imperative ones. Unfortunately, declarative specifications may be non-deterministic. This implies that there may be...
While specifications of queries usually are of a declarative nature (since the work of Codd in the e...
AbstractConstraints play a key role in the definition of conceptual schemas. In the UML, constraints...
Abstract Information system specification requires careful consideration of data integrity. We prese...
ABSTRACT The purpose of the paper is to present our approach for specifying system behavior. Our app...
The purpose of the paper is to present our approach for specifying system behavior during analysis, ...
A complete information modeling method must address both the process- and data-perspectives, prefera...
Various tools for program analysis, including run-time assertion checkers and static analyzers such ...
The specification of an information system must include all relevant static and dynamic aspects of t...
Many software applications involve models of data that are manipulated by the application. There is ...
The translation from UML specifications to B specifications may give a way to use jointly UML and B ...
Updating the contents of an information base may violate some of the constraints defined over the sc...
Constraints play a key role in the definition of conceptual schemas. In the UML, constraints are usu...
Constraints play a key role in the definition of conceptual schemas. In the UML, constraints are usu...
Abstract: In this paper we study a formal concept of redesign for object-oriented specifications. Th...
Integrity constraints (ICs) play a key role in the definition of conceptual schemas. In the UML, I...
While specifications of queries usually are of a declarative nature (since the work of Codd in the e...
AbstractConstraints play a key role in the definition of conceptual schemas. In the UML, constraints...
Abstract Information system specification requires careful consideration of data integrity. We prese...
ABSTRACT The purpose of the paper is to present our approach for specifying system behavior. Our app...
The purpose of the paper is to present our approach for specifying system behavior during analysis, ...
A complete information modeling method must address both the process- and data-perspectives, prefera...
Various tools for program analysis, including run-time assertion checkers and static analyzers such ...
The specification of an information system must include all relevant static and dynamic aspects of t...
Many software applications involve models of data that are manipulated by the application. There is ...
The translation from UML specifications to B specifications may give a way to use jointly UML and B ...
Updating the contents of an information base may violate some of the constraints defined over the sc...
Constraints play a key role in the definition of conceptual schemas. In the UML, constraints are usu...
Constraints play a key role in the definition of conceptual schemas. In the UML, constraints are usu...
Abstract: In this paper we study a formal concept of redesign for object-oriented specifications. Th...
Integrity constraints (ICs) play a key role in the definition of conceptual schemas. In the UML, I...
While specifications of queries usually are of a declarative nature (since the work of Codd in the e...
AbstractConstraints play a key role in the definition of conceptual schemas. In the UML, constraints...
Abstract Information system specification requires careful consideration of data integrity. We prese...