Sciweavers

53 search results - page 9 / 11
» Secrecy UML Method for Model Transformations
Sort
View
IJWGS
2006
125views more  IJWGS 2006»
14 years 9 months ago
Compiling business processes: untangling unstructured loops in irreducible flow graphs
: This paper presents a systematic study of some major problems involved in the transformation of business process modelling languages to executable business process representation...
Wei Zhao, Rainer Hauser, Kamal Bhattacharya, Barre...
KBSE
2007
IEEE
15 years 3 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
ECMDAFA
2006
Springer
137views Hardware» more  ECMDAFA 2006»
15 years 1 months ago
Harvesting Software Systems for MDA-Based Reengineering
Abstract. In this paper we report on a feasibility study in reengineering legacy systems towards a model-driven architecture (MDA). Steps in our approach consist of (1) parsing the...
Thijs Reus, Hans Geers, Arie van Deursen
87
Voted
UML
2005
Springer
15 years 3 months ago
Representing and Applying Design Patterns: What Is the Problem?
Design patterns embody proven solutions to recurring design problems. Ever since the gang of four popularized the concept, researchers have been trying to develop methods for repre...
Hafedh Mili, Ghizlane El-Boussaidi
100
Voted
UML
2005
Springer
15 years 3 months ago
Using Process Algebra to Validate Behavioral Aspects of Object-Oriented Models
We present in this paper a rigorous and automated based approach for the behavioral validation of control software systems. This approach relies on metamodeling, model-transformati...
Alban Rasse, Jean-Marc Perronne, Pierre-Alain Mull...