Collaboration Techniques to Design a Database

نویسندگان

  • Sergio Gálvez
  • Antonio Guevara
  • José Luís Caro
  • Iván Gómez
  • Andrés Aguayo
چکیده

In this paper, we describe methods for the analysis and design of Cooperative Object-oriented Information Systems. These methods involve users in the development of general Information Systems much more than traditional ones like Metrica or UML. We introduce a set of cooperative tools, based on a powerful and user friendly graphic interface that facilitates user participation in new stages of system construction and in re-engineering processes. We focus on the database definition tool: CDB (Cooperative Data Base), and show the need for cooperation among users and the specific collaboration characteristics of this tool.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Visualizing Multiple System Atrophy Studies Based on Collaboration Network and Centrality Indices in Web of Science Database

Introduction: Social network analysis is an analytical method based on graph theories that identifies relationships between individuals or factors to analyze the social structures resulted from those relationships. The objective of this study was to analyze co-authorship and co-word networks based on scientometric indicators and centrality measures in the studies on multiple atrophy system dise...

متن کامل

Visualizing Multiple System Atrophy Studies Based on Collaboration Network and Centrality Indices in Web of Science Database

Introduction: Social network analysis is an analytical method based on graph theories that identifies relationships between individuals or factors to analyze the social structures resulted from those relationships. The objective of this study was to analyze co-authorship and co-word networks based on scientometric indicators and centrality measures in the studies on multiple atrophy system dise...

متن کامل

تحلیل و مصورسازی شبکه هم‌تألیفی دانشگاه‌های علوم پزشکی وابسته به وزارت بهداشت با استفاده از سنجه‌های تحلیل شبکه اجتماعی بر اساس داده‌های Web of Science

Background and Aim: Research in the medical field requires large budgets, specialist human resources and modern equipment and instruments. Scientific collaboration is a way to overcome such problems. Main goal of this study was analyzing scientific collaboration of universities of medical sciences in different aspects. Materials and Methods: In this research, by using scientometrics methods an...

متن کامل

Needed: Global Collaboration for Comparative Research on Cities and Health

Over half of the world’s population lives in cities and United Nations (UN) demographers project an increase of 2.5 billion more urban dwellers by 2050. Yet there is too little systematic comparative research on the practice of urban health policy and management (HPAM), particularly in the megacities of middle-income and developing nations. We make a case for creating a global database on citie...

متن کامل

“Seeing” the Difference: The Importance of Visibility and Action as a Mark of “Authenticity” in Co-production; Comment on “Collaboration and Co-production of Knowledge in Healthcare: Opportunities and Challenges”

The Rycroft-Malone paper states that co-production relies on ‘authentic’ collaboration as a context for action. Our commentary supports and extends this assertion. We suggest that ‘authentic’ co-production involves processes where participants can ‘see’ the difference that they have made within the project and beyond. We provide examples including: the use of design in health projects which see...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004