Search Results - "Riesco, Daniel"
-
1
UML Profile for Mining Process: Supporting Modeling and Simulation Based on Metamodels of Activity Diagram
Published in Modelling and simulation in engineering (01-01-2014)“…An UML profile describes lightweight extension mechanism to the UML by defining custom stereotypes, tagged values, and constraints. They are used to adapt UML…”
Get full text
Journal Article -
2
Translating between Alloy specifications and UML class diagrams annotated with OCL
Published in Software and systems modeling (01-02-2015)“…Model-driven engineering (MDE) is a software engineering approach based on model transformations at different abstraction levels. It prescribes the development…”
Get full text
Journal Article -
3
In Silico Laboratory Experiments Using Statistical Model Checking: A New Model of the Palytoxin-Induced Pump Channel as Case Study
Published in IEEE/ACM transactions on computational biology and bioinformatics (01-11-2021)“…Studying biological systems is a difficult but important task. Traditional methods include laboratory experimentation and computer simulations. However, often…”
Get full text
Journal Article -
4
Using business process reengineering to obtain a RAISE specification
Published in Journal of computer science and technology (La Plata) (01-10-2002)“…We have proposed a technique which can be employed within the methodology known as business process reengineering. This technique has been applied in a…”
Get full text
Journal Article -
5
Using reverse engineering techniques to infer a system use case model
Published in Journal of software : evolution and process (01-02-2019)“…Summary In this article, a strategy that seeks to assist the arduous cognitive process that involves understanding a GUI‐based system is presented. In order to…”
Get full text
Journal Article -
6
Inferring Use-cases from GUI Analysis
Published in Revista IEEE América Latina (01-12-2015)“…One of the most arduous and tedious tasks in the life cycle of an application is Software Maintenance and Evolution. In this context, the most time-consuming…”
Get full text
Journal Article -
7
Management of software development projects based on SmallRUP methodology through a Standard Workflow Engine
Published in 2011 9th IEEE International Conference on Industrial Informatics (01-07-2011)“…This article approaches the improvement of the software development processes specified with the Software Process Engineering Metamodel version 2 (SPEM). The…”
Get full text
Conference Proceeding -
8
A software application to improve human rights watching activities and to prepare police stations to face the ISO 9001:2008 certification procedure
Published in 2011 9th IEEE International Conference on Industrial Informatics (01-07-2011)“…This paper is about the conceptual design of the IT support for human rights watching, police transparency and police performance evaluation. Firstly we…”
Get full text
Conference Proceeding -
9
Transformation of business process models BPMN 2.0 into components of the Java business platform
Published in IEEE 10th International Conference on Industrial Informatics (01-07-2012)“…The continuous improvement of organizations involves redesigning, improving or introducing new Business Processes effectively and efficiently while maintaining…”
Get full text
Conference Proceeding -
10
Transformation in QVT of Software Development Process based on SPEM to Workflows
Published in Revista IEEE América Latina (01-12-2008)“…This work provides a solution to automate the software development processes specified by the software process engineering metamodel (SPEM). To achieve this…”
Get full text
Journal Article -
11
Síndrome de Lesch-Nyhan y automutilación oral. Reporte de un caso
Published in Revista Chilena de pediatría (01-02-2018)Get full text
Journal Article -
12
An ontology for the interoperability of hydrological simulation model
Published in 2016 IEEE International Conference on Industrial Technology (ICIT) (01-03-2016)“…Simulation models have been used successfully to understand processes and to assist the formulation and evaluation of several systems. The general case is that…”
Get full text
Conference Proceeding -
13
A systematic method for choosing optimal parameters for storage in parallel channels of slots
Published in 2016 IEEE International Conference on Industrial Technology (ICIT) (01-03-2016)“…In many applications, such as e-voting, it is imperative that the privacy reaches a level of unconditional security. In this context, protocols that verify…”
Get full text
Conference Proceeding -
14
Workflow Models: Management and Quality of Process in the Cloud
Published in 11th International Conference on Information Technology : ITNG 2014 : proceedigns, 7-9 April 2014, Las Vegas, Nevada, USA (01-04-2014)“…It is important to implement a continuous improvement when analyzing the life cycle of Business Process (BP). As a result, organizations are searching for…”
Get full text
Conference Proceeding Journal Article -
15
Storage Optimization for Non Interactive Dining Cryptographers (NIDC)
Published in 2015 12th International Conference on Information Technology - New Generations (01-04-2015)“…In many applications, such as e-voting, it is imperative that the privacy scope unconditional security levels, i.e. that it is protected regardless of the…”
Get full text
Conference Proceeding -
16
Verifying Bigraphical Models of Architectural Reconfigurations
Published in 2013 International Symposium on Theoretical Aspects of Software Engineering (01-07-2013)“…ARCHERY is an architectural description language for modelling and reasoning about distributed, heterogeneous and dynamically reconfigurable systems. This…”
Get full text
Conference Proceeding -
17
Síndrome de Lesch-Nyhan y automutilación oral. Reporte de un caso
Published in Revista Chilena de pediatría (01-02-2018)“…Resumen: Introducción: El síndrome de Lesch-Nyhan (SLN) es un trastorno hereditario recesivo relacionado con el cromosoma X, causado por la deficiencia de la…”
Get full text
Journal Article -
18
Analysing Tactics in Architectural Patterns
Published in 2012 35th Annual IEEE Software Engineering Workshop (01-10-2012)“…This paper presents an approach to analyse the application of tactics in architectural patterns. We define and illustrate the approach using ARCHERY, a…”
Get full text
Conference Proceeding -
19
SIP: A Simple Tool for Inspecting and Evaluating WSDL Specifications
Published in 2013 10th International Conference on Information Technology: New Generations (01-04-2013)“…Understanding a web application is not a simple task. It implies being available to interpret both their descriptions and several systems that really implement…”
Get full text
Conference Proceeding -
20
Web Application to Improve Police Management Performance: A Web Application to Prepare Police Stations to Face an ISO 9001: 2008 Certification Process and to Improve Watching Activities of Human Rights
Published in 2010 Seventh International Conference on Information Technology: New Generations (01-04-2010)“…We are reporting a very specific and innovative development project, based on Internet technology, oriented both to support human right watch activities and to…”
Get full text
Conference Proceeding