Proceedings. 34th International Conference on Technology of Object-Oriented Languages and Systems - TOOLS 34
DOI: 10.1109/tools.2000.868979
|View full text |Cite
|
Sign up to set email alerts
|

Business rules=meta-data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 2 publications
0
5
0
2
Order By: Relevance
“…Subsequently, building prototypes will help users to confirm the elicited requirements and align these with their needs (O'Donnell, Sipsma & Watt, 2012). • Elicit business rules: business rules define or constraint the aspects of a business, while they intend to control and influence its behavior (Perkins, 2000). According to the literature, business rules must be elicited to regulate the DW and the Data Mart functionalities.…”
Section: Elicitationmentioning
confidence: 99%
“…Subsequently, building prototypes will help users to confirm the elicited requirements and align these with their needs (O'Donnell, Sipsma & Watt, 2012). • Elicit business rules: business rules define or constraint the aspects of a business, while they intend to control and influence its behavior (Perkins, 2000). According to the literature, business rules must be elicited to regulate the DW and the Data Mart functionalities.…”
Section: Elicitationmentioning
confidence: 99%
“…A saying from software engineering is [29] "If you can model it, you can implement it." We have designed the class diagram, the activity diagram, the use case diagram, and the sequence diagram for modeling the static view of the medical data quality and the dynamic behavior of the medical data extraction process using UML.…”
Section: B Modeling the Medical Data Quality Using Umlmentioning
confidence: 99%
“…Quite often the differences in the business rotes can be parameterized [14]. By storing these differences in a database, the running system can either interpret these changes from a database table or the appropriate function can be called with the differing values from the database.…”
Section: Figure 13 -Refugee Tracking Systemmentioning
confidence: 99%