Egg: Fast and extensible equality saturation
An e-graph efficiently represents a congruence relation over many expressions. Although
they were originally developed in the late 1970s for use in automated theorem provers, a …
they were originally developed in the late 1970s for use in automated theorem provers, a …
Feature-based survey of model transformation approaches
K Czarnecki, S Helsen - IBM systems journal, 2006 - ieeexplore.ieee.org
Model transformations are touted to play a key role in Model Driven Development™.
Although well-established standards for creating metamodels such as the Meta-Object …
Although well-established standards for creating metamodels such as the Meta-Object …
[PDF][PDF] Classification of model transformation approaches
K Czarnecki, S Helsen - Proceedings of the 2nd OOPSLA Workshop …, 2003 - files.rsdn.org
Abstract The Model-Driven Architecture is an initiative by the Object Management Group to
automate the generation of platform-specific models from platformindependent models …
automate the generation of platform-specific models from platformindependent models …
Survey and classification of model transformation tools
Abstract Model transformation lies at the very core of model-driven engineering, and a large
number of model transformation languages and tools have been proposed over the last few …
number of model transformation languages and tools have been proposed over the last few …
A tutorial on graph transformation
Graph transformation or graph rewriting has been developed for nearly 50 years and has
become a mature and manifold formal technique. Basically, rewrite rules are used to …
become a mature and manifold formal technique. Basically, rewrite rules are used to …
Secure tropos: a security-oriented extension of the tropos methodology
H Mouratidis, P Giorgini - International Journal of Software …, 2007 - World Scientific
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …
careful analysis of software development processes shows that the definition of security …
Graph transformation in a nutshell
R Heckel - Electronic notes in theoretical computer science, 2006 - Elsevier
Even sophisticated techniques start out from simple ideas. Later, in reply to application
needs or theoretical problems new concepts are introduced and new formalisations …
needs or theoretical problems new concepts are introduced and new formalisations …
Transformation: The missing link of MDA
In this paper we explore the issue of transforming models to models, an essential part of the
OMG's Model Driven Architecture (MDA) vision. Drawing from the literature and our …
OMG's Model Driven Architecture (MDA) vision. Drawing from the literature and our …
Dynamic meta modeling: A graphical approach to the operational semantics of behavioral diagrams in UML
In this paper, dynamic meta modeling is proposed as a new approach to the operational
semantics of behavioral UML diagrams. The dynamic meta model extends the well-known …
semantics of behavioral UML diagrams. The dynamic meta model extends the well-known …
Semantic translation of simulink/stateflow models to hybrid automata using graph transformations
Embedded systems are often modeled using Matlab's Simulink and Stateflow (MSS), to
simulate plant and controller behavior but these models lack support for formal verification …
simulate plant and controller behavior but these models lack support for formal verification …