-
1
-
-
0033116147
-
Graph transformation for specification and programming
-
Andries, M., Engels, G., Habel, A., Hoffmann, B., Kreowski, H.-J., Kuske, S., Plump, D., Schürr, A., Taentzer, G.: Graph transformation for specification and programming. Science of Computer Programming 34(1), 1-54 (1999)
-
(1999)
Science of Computer Programming
, vol.34
, Issue.1
, pp. 1-54
-
-
Andries, M.1
Engels, G.2
Habel, A.3
Hoffmann, B.4
Kreowski, H.-J.5
Kuske, S.6
Plump, D.7
Schürr, A.8
Taentzer, G.9
-
2
-
-
33750370954
-
Model transformations? Transformation models!
-
Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. Springer, Heidelberg
-
Bézivin, J., Büttner, F., Gogolla, M., Jouault, F., Kurtev, I., Lindow, A.: Model transformations? Transformation models! In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 440-453. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4199
, pp. 440-453
-
-
Bézivin, J.1
Büttner, F.2
Gogolla, M.3
Jouault, F.4
Kurtev, I.5
Lindow, A.6
-
3
-
-
74349120926
-
Evolution styles: Foundations and tool support for software architecture evolution
-
September
-
Garlan, D., Barnes, J., Schmerl, B., Celiku, O.: Evolution styles: Foundations and tool support for software architecture evolution. In: WICSA/ECSA 2009, pp. 131-140 (September 2009)
-
(2009)
WICSA/ECSA 2009
, pp. 131-140
-
-
Garlan, D.1
Barnes, J.2
Schmerl, B.3
Celiku, O.4
-
4
-
-
84957107637
-
Compositional verification of reactive systems specified by graph transformation
-
Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. Springer, Heidelberg
-
Heckel, R.: Compositional verification of reactive systems specified by graph transformation. In: Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. LNCS, vol. 1382, pp. 138-153. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1382
, pp. 138-153
-
-
Heckel, R.1
-
5
-
-
15844405487
-
Instant and incremental transformation of models
-
IEEE Computer Society, Washington, DC, USA
-
Johann, S., Egyed, A.: Instant and incremental transformation of models. In: Proceedings of the International Conference on Automated Software Engineering (ASE), pp. 362-365. IEEE Computer Society, Washington, DC, USA (2004)
-
(2004)
Proceedings of the International Conference on Automated Software Engineering (ASE)
, pp. 362-365
-
-
Johann, S.1
Egyed, A.2
-
7
-
-
79959225818
-
Modelling secure systems evolution: Abstract and concrete change specifications (invited lecture)
-
Bernardo, I. (ed.) 11th School on Formal Methods (SFM 2011), Bertinoro, Italy, June 13-18. Springer, Heidelberg
-
Jürjens, J., Ochoa, M., Schmidt, H., Marchal, L., Houmb, S., Islam, S.: Modelling secure systems evolution: Abstract and concrete change specifications (invited lecture). In: Bernardo, I. (ed.) 11th School on Formal Methods (SFM 2011), Bertinoro, Italy, June 13-18. LNCS. Springer, Heidelberg (2011)
-
(2011)
LNCS
-
-
Jürjens, J.1
Ochoa, M.2
Schmidt, H.3
Marchal, L.4
Houmb, S.5
Islam, S.6
-
8
-
-
35348959376
-
Tools for secure systems development with UML. Intern
-
Invited submission to the special issue for FASE 2004/05
-
Jürjens, J., Shabalin, P.: Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 9(5-6), 527-544 (2007); Invited submission to the special issue for FASE 2004/05
-
(2007)
Journal on Software Tools for Technology Transfer
, vol.9
, Issue.5-6
, pp. 527-544
-
-
Jürjens, J.1
Shabalin, P.2
-
9
-
-
36048961543
-
Update transformations in the small with the epsilon wizard language
-
Kolovos, D.S., Paige, R.F., Polack, F., Rose, L.M.: Update transformations in the small with the epsilon wizard language. Journal of Object Technology 6(9), 53-69 (2007)
-
(2007)
Journal of Object Technology
, vol.6
, Issue.9
, pp. 53-69
-
-
Kolovos, D.S.1
Paige, R.F.2
Polack, F.3
Rose, L.M.4
-
10
-
-
0031335655
-
Metrics and Laws of Software Evolution - The Nineties View
-
IEEE Computer Society, Washington, DC, USA
-
Lehman, M.M., Ramil, J.F., Wernick, P.D., Perry, D.E., Turski, W.M.: Metrics and Laws of Software Evolution - The Nineties View. In: METRICS 1997, pp. 20-32. IEEE Computer Society, Washington, DC, USA (1997)
-
(1997)
METRICS 1997
, pp. 20-32
-
-
Lehman, M.M.1
Ramil, J.F.2
Wernick, P.D.3
Perry, D.E.4
Turski, W.M.5
-
11
-
-
70349662487
-
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
-
IEEE Computer Society, Los Alamitos, CA, USA
-
Mellado, D., Rodriguez, J., Fernandez-Medina, E., Piattini, M.: Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. In: AReS 2009, pp. 224-231. IEEE Computer Society, Los Alamitos, CA, USA (2009)
-
(2009)
AReS 2009
, pp. 224-231
-
-
Mellado, D.1
Rodriguez, J.2
Fernandez-Medina, E.3
Piattini, M.4
-
13
-
-
77953088569
-
Evolving Software Architecture Descriptions of Critical Systems
-
Mens, T., Magee, J., Rumpe, B.: Evolving Software Architecture Descriptions of Critical Systems. Computer 43(5), 42-48 (2010)
-
(2010)
Computer
, vol.43
, Issue.5
, pp. 42-48
-
-
Mens, T.1
Magee, J.2
Rumpe, B.3
-
14
-
-
35048897606
-
Model checking graph transformations: A comparison of two approaches
-
Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. Springer, Heidelberg
-
Rensink, A., Schmidt, Á., Varró, D.: Model checking graph transformations: A comparison of two approaches. In: Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. LNCS, vol. 3256, pp. 226-241. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3256
, pp. 226-241
-
-
Rensink, A.1
Schmidt, Á.2
Varró, D.3
-
15
-
-
84911359649
-
-
Deliverable 4.2
-
Secure Change Project. Deliverable 4.2, http://www-jj.cs.tu-dortmund.de/ jj/deliverable-4-2.pdf
-
Secure Change Project
-
-
-
16
-
-
33947608669
-
Software requirements and architecture modeling for evolving non-secure applications into secure applications
-
Shin, M.E., Gomaa, H.: Software requirements and architecture modeling for evolving non-secure applications into secure applications. Science of Computer Programming 66(1), 60-70 (2007)
-
(2007)
Science of Computer Programming
, vol.66
, Issue.1
, pp. 60-70
-
-
Shin, M.E.1
Gomaa, H.2
-
17
-
-
77954833400
-
Model-based argument analysis for evolving security requirements
-
IEEE Computer Society, Los Alamitos
-
Tun, T.T., Yu, Y., Haley, C.B., Nuseibeh, B.: Model-based argument analysis for evolving security requirements. In: SSIRI 2010, pp. 88-97. IEEE Computer Society, Los Alamitos (2010)
-
(2010)
SSIRI 2010
, pp. 88-97
-
-
Tun, T.T.1
Yu, Y.2
Haley, C.B.3
Nuseibeh, B.4
|