Notable design patterns for domain-specific languages

D Spinellis - Journal of systems and software, 2001 - Elsevier
The realisation of domain-specific languages (dsls) differs in fundamental ways from that of
traditional programming languages. We describe eight recurring patterns that we have …

Das Data Warehouse-Konzept als Basis einer unternehmensweiten Informationslogistik

H Mucksch, W Behme - Das Data Warehouse-Konzept: Architektur …, 2000 - Springer
Zusammenfassung Im Mittelpunkt dieses Beitrages steht das Data Warehouse-Konzept, das
als neue Möglichkeit einer durchgängigen, konsistenten und Endbenutzer-orientierten …

The information furnace: consolidated home control

DD Spinellis - Personal and Ubiquitous Computing, 2003 - Springer
Abstract The Information Furnace is a basement-installed PC-type device that integrates
existing consumer home-control, infotainment, security and communication technologies to …

[HTML][HTML] Curl: a gentle slope language for the Web.

M Hostetter, DA Kranz, C Seed, C Terman… - World Wide Web …, 1997 - groups.csail.mit.edu
The work described here explores the design of Curl, a single, coherent linguistic basis for
expression of Web content at levels ranging from simple formatted text to contemporary …

Tracing the origins of the semantic web

R Guns - Journal of the American Society for Information …, 2013 - Wiley Online Library
The Semantic Web has been criticized for not being semantic. This article examines the
questions of why and how the Web of Data, expressed in the Resource Description …

[PDF][PDF] nformation Security Best Practise Dissemination: The ISA-EUNET Approach

D Spinellis, D Gritzalis - WISE 1: First World Conference on …, 1999 - academia.edu
The rising deployment of mission-critical systems over public data networks is prompting
enterprises of all types and sizes to re-examine their approach towards the security of their …

[PDF][PDF] Attacking browser extensions

N Golubovic - Ruhr-Universitat Bochum, 2016 - golubovic.net
Browser extensions are extremely profitable targets for attackers due to their popularity and
privileges. This thesis examines both old and new attack techniques for Mozilla Firefox and …

A conceptual model for Socio-Pragmatic Web based on activity theory

MN Fesharaki, AH Fetanat, DF Shooshtari - Cogent Education, 2020 - Taylor & Francis
How is the future of the Web, as one of the most influential inventions of the twentieth
century? Today, there are great conceptual gaps between the Web 2.0 (Social Web), Web …

[PDF][PDF] Reliable software implementation using domain specific languages

D Spinellis - Proc. ESREL, 1999 - spinellis.gr
We describe the use of domain-specific languages for expressing critical design values and
constraints in a civil engineering CAD software application. Through the use of these …

[PDF][PDF] The shape of an instant: measuring and modeling perceptual attack time with probability density functions (if a tree falls in the forest, when did 57 people hear it …

MJ Wright - 2008 - Citeseer
A musical event's Perceptual Attack Time (“PAT”) is its perceived moment of rhythmic
placement; in general it is after physical or perceptual onset. If two or more events sound like …