Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,579,871 papers from all fields of science
Search
Sign In
Create Free Account
Business logic
Known as:
Domain logic
, BLL
, Business logic abuse
Expand
In computer software, business logic or domain logic is the part of the program that encodes the real-world business rules that determine how data…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Anemic domain model
AngularJS
Anti-pattern
Expand
Broader (2)
Business process
Software architecture
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
A QoS Control Mechanism to Provide Service Differentiation and Overload Protection to Internet Scalable Servers
D. García
,
Javier García
,
+4 authors
A. M. Campos
IEEE Transactions on Services Computing
2009
Corpus ID: 11375176
Nowadays, enterprises providing services through Internet often require online services supplied by other enterprises. This…
Expand
Highly Cited
2007
Highly Cited
2007
Vehicular ad-hoc networks: from vision to reality and back
H. Füßler
,
S. Schnaufer
,
M. Transier
,
Wolfgang Effelsberg
Fourth Annual Conference on Wireless on Demand…
2007
Corpus ID: 2483499
VANETs, or vehicular ad-hoc networks, have recently gained scientific and commercial interest. In fact, they have drawn many…
Expand
Highly Cited
2007
Highly Cited
2007
A Method for Model Based Design of Rich Internet Application Interactive User Interfaces
Marino Linaje Trigueros
,
J. C. Preciado
,
Fernando Sánchez-Figueroa
International Conference on Web Engineering
2007
Corpus ID: 6713249
During the last years, Web Models have demonstrated their utility facilitating the development of Web Applications. Nowadays, Web…
Expand
Highly Cited
2005
Highly Cited
2005
A Compromise Estimate of German Net National Product, 1851–1913, and its Implications for Growth and Business Cycles
C. Burhop
,
G. Wolff
Journal Economic History
2005
Corpus ID: 55796196
We develop a compromise estimate of the German Net National Product for the years 1851–1913 based on four estimates from Hoffmann…
Expand
2005
2005
Orchestrating composite Web services under data flow constraints
G. Chafle
,
Sunil Chandra
,
V. Mann
,
M. Nanda
IEEE International Conference on Web Services…
2005
Corpus ID: 15642613
A composite service is typically specified using a language such as BPEL4WS and orchestrated by a single coordinator node in a…
Expand
Highly Cited
2004
Highly Cited
2004
Model-driven business process recovery
Ying Zou
,
Terence C. Lau
,
K. Kontogiannis
,
Tack Tong
,
Ross McKegney
Working Conference on Reverse Engineering
2004
Corpus ID: 1647469
A business process attempts to encapsulate the delivery of a sequence of tasks, typically starting from accepting a service…
Expand
2003
2003
SmartKom: Symmetric Multimodality in an Adaptive and Reusable Dialogue Shell
W. Wahlster
2003
Corpus ID: 18277156
We introduce the notion of symmetric multimodality for dialogue systems in which all input modes (eg. speech, gesture, facial…
Expand
Highly Cited
2002
Highly Cited
2002
Macromedia Flash MX: A next-generation rich client
J. Allaire
2002
Corpus ID: 59845292
Highly Cited
2001
Highly Cited
2001
The MNM service model — Refined views on generic service management
M. Garschhammer
,
R. Hauck
,
B. Kempter
,
Igor Radisic
,
H. Rölle
,
Holger Schmidt
Journal of Communications and Networks
2001
Corpus ID: 9251556
In the last couple of years service management has gained more and more momentum in the research community. Nowadays, as…
Expand
Highly Cited
1999
Highly Cited
1999
A resource access decision service for CORBA-based distributed systems
K. Beznosov
,
Yi Deng
,
B. Blakley
,
Carol C. Burt
,
John F. Barkley
Asia-Pacific Computer Systems Architecture…
1999
Corpus ID: 11302493
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE