Why and how should design patterns be formalized?
Textual descriptions of design patterns are ambiguous and may lead to conflicting interpretations. Since patterns are meant for communication and education, a correct and complete understanding is a prerequisite to their successful usage. Formal specification of design patterns is meant to complemen...
| Main Authors: | Taibi,, T, Ngo,, DCL |
|---|---|
| Format: | Article |
| Published: |
2001
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2681/ |
Similar Items
Formal specification of design pattern combination using BPSL
by: Taibi, T
Published: (2003)
by: Taibi, T
Published: (2003)
System Development: What, Why, When And How CASE Tools Should Support Novice Software Engineers.
by: Sulaiman, Shahida, et al.
Published: (2007)
by: Sulaiman, Shahida, et al.
Published: (2007)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
CPT443 – Automata Theory & Formal Languages (Teori Automata & Bahasa Formal)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CPT443 – AUTOMATA THEORY & FORMAL LANGUAGES [TEORI AUTOMATA & BAHASA FORMAL] JUN 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
CPT443 – AUTOMATA THEORY & FORMAL LANGUAGES
[TEORI AUTOMATA & BAHASA FORMAL] JUN 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
CPT314 - AUTOMATA THEORY & FORMAL LANGUAGES MAC 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CPT314 - TEORI AUTOMATA & BAHASA FORMAL MAC 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CPT 314 - TEORI AUTOMATA & BAHASA FORMAL MAC 05
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CPT443 – Automata Theory & Formal Languages June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CPT443 - Automata Theory & Formal Languages June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
CPT314 - Automata Theory & Formal Languages - March 2005
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CPT314 - Teori Automata & Bahasa Formal - Mac 2005
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CPT 314 - AUTOMATA THEORY & FORMAL LANGUAGES MARCH 05 - BI.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CSA 402 - FINITE AUTOMATA AND FORMAL LANGUAGES MAC-APR 1996.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
CSA 402 - TEORI AUTOMATA DAN BAHASA FORMAL APRIL 2000.
by: PPSK, Pusat Pengajian Sains
Published: (2000)
by: PPSK, Pusat Pengajian Sains
Published: (2000)
CSA 402 - TEORI AUTOMATA DAN BAHASA FORMAL - APR. 1998
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
CSA 402 - TEORI AUTOMATA DAN BAHASA FORMAL - FEB. 1998
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
CSA402 - TEORI AUTOMATA DAN BAHASA FORMAL - APR. 2000
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
Screen design: composing with dynamic symmetry
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
CPP 303 - CSA 402 - TEORI AUTOMATA & BAHASA FORMAL FEB 1999.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
CSA 402 - TEORI AUTOMATA DAN BAHASA FORMAL MAC-APR 1996.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
CPP303/CSA402 - Teori Automata & Bahasa Formal Februari 1999
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
CPT443/CPT347 – AUTOMATA THEORY & FORMAL LANGUAGES APR-MAY 2011
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000)
by: D. C. L., Ngo, et al.
Published: (2000)
Recognising individuals using their brain patterns
by: Ravi,, FVR, et al.
Published: (2005)
by: Ravi,, FVR, et al.
Published: (2005)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
A Menu Planning Model Using Hybrid Genetic Algorithm And Fuzzy Reasoning: A Study On Malaysian Geriatric Cancer Patients
by: Ngo , Hea Choon
Published: (2016)
by: Ngo , Hea Choon
Published: (2016)
Similar Items
-
Formal specification of design pattern combination using BPSL
by: Taibi, T
Published: (2003) -
System Development: What, Why, When And How CASE Tools Should Support Novice Software Engineers.
by: Sulaiman, Shahida, et al.
Published: (2007) -
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003) -
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003) -
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)