Search Results

There are 28209 results for: content related to: Scheduling model-to-model transformations with continuations

  1. Toward the adaptation of component-based architectures by model transformation: behind smart user interfaces

    Software: Practice and Experience

    Volume 45, Issue 12, December 2015, Pages: 1677–1718, Javier Criado, Diego Rodríguez-Gracia, Luis Iribarne and Nicolás Padilla

    Version of Record online : 12 DEC 2014, DOI: 10.1002/spe.2306

  2. A case study on business process recovery using an e-government system

    Software: Practice and Experience

    Volume 42, Issue 2, February 2012, Pages: 159–189, Ricardo Pérez-Castillo, Ignacio García-Rodríguez de Guzmán, Mario Piattini and Ángeles S. Places

    Version of Record online : 11 FEB 2011, DOI: 10.1002/spe.1057

  3. Modeling and verification of Web services composition based on model transformation

    Software: Practice and Experience

    Yi Zhu, Zhiqiu Huang and Hang Zhou

    Version of Record online : 16 AUG 2016, DOI: 10.1002/spe.2434

  4. Understanding design patterns — what is the problem?

    Software: Practice and Experience

    Volume 42, Issue 12, December 2012, Pages: 1495–1529, Ghizlane El Boussaidi and Hafedh Mili

    Version of Record online : 11 NOV 2011, DOI: 10.1002/spe.1145

  5. Design pattern based model transformation with tool support

    Software: Practice and Experience

    Volume 45, Issue 4, April 2015, Pages: 473–499, Dae-Kyoo Kim

    Version of Record online : 11 NOV 2013, DOI: 10.1002/spe.2238

  6. Towards an automation of the mutation analysis dedicated to model transformation

    Software Testing, Verification and Reliability

    Volume 25, Issue 5-7, August-November 2015, Pages: 653–683, Vincent Aranega, Jean-Marie Mottu, Anne Etien, Thomas Degueule, Benoit Baudry and Jean-Luc Dekeyser

    Version of Record online : 25 APR 2014, DOI: 10.1002/stvr.1532

  7. Integrated static code analysis and runtime verification

    Software: Practice and Experience

    Volume 45, Issue 10, October 2015, Pages: 1359–1373, H. Sözer

    Version of Record online : 19 AUG 2014, DOI: 10.1002/spe.2287

  8. Breeze graph grammar: a graph grammar approach for modeling the software architecture of big data-oriented software systems

    Software: Practice and Experience

    Volume 45, Issue 8, August 2015, Pages: 1023–1050, Chen Li, Linpeng Huang and Luxi Chen

    Version of Record online : 16 MAY 2014, DOI: 10.1002/spe.2271

  9. Model-driven physical-design automation for FPGAs: fast prototyping and legacy reuse

    Software: Practice and Experience

    Volume 44, Issue 4, April 2014, Pages: 455–482, Ciprian Teodorov and Loïc Lagadec

    Version of Record online : 6 MAR 2013, DOI: 10.1002/spe.2190

  10. Interoperable domain-specific languages families for code generation

    Software: Practice and Experience

    Volume 43, Issue 5, May 2013, Pages: 479–499, Michal Malohlava, Frantisek Plasil, Tomas Bures and Petr Hnetynka

    Version of Record online : 27 APR 2012, DOI: 10.1002/spe.2118

  11. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1160

  12. Towards the systematic measurement of ATL transformation models

    Software: Practice and Experience

    Volume 41, Issue 7, June 2011, Pages: 789–815, José Barranquero Tolosa, Oscar Sanjuán-Martínez, Vicente García-Díaz, B. Cristina Pelayo G-Bustelo and Juan Manuel Cueva Lovelle

    Version of Record online : 26 NOV 2010, DOI: 10.1002/spe.1033

  13. A feedback technique for unsatisfiable UML/OCL class diagrams

    Software: Practice and Experience

    Volume 44, Issue 11, November 2014, Pages: 1379–1393, Asadullah Shaikh and Uffe Kock Wiil

    Version of Record online : 24 JUN 2013, DOI: 10.1002/spe.2211

  14. Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1525–1536, Jinyong Chang and Rui Xue

    Version of Record online : 2 SEP 2014, DOI: 10.1002/sec.1101

  15. Comparison of the effectiveness of three different growth media for primary isolation of Renibacterium salmoninarum from Atlantic salmon, Salmo salar L., broodfish

    Journal of Fish Diseases

    Volume 14, Issue 1, January 1991, Pages: 89–96, S. GUDMUNDSDóTTIR, S. HELGASON and E. BENEDIKTSDOTTIR

    Version of Record online : 7 APR 2006, DOI: 10.1111/j.1365-2761.1991.tb00579.x

  16. A business process-driven approach for generating software modules

    Software: Practice and Experience

    Volume 41, Issue 10, September 2011, Pages: 1049–1071, Xulin Zhao and Ying Zou

    Version of Record online : 1 APR 2011, DOI: 10.1002/spe.1068

  17. Model transformation testing: a bi-level search-based software engineering approach

    Journal of Software: Evolution and Process

    Volume 27, Issue 11, November 2015, Pages: 821–837, Dilan Sahin, Marouane Kessentini, Manuel Wimmer and Kalyanmoy Deb

    Version of Record online : 18 AUG 2015, DOI: 10.1002/smr.1735

  18. Adapting FreeRTOS for multicores: an experience report

    Software: Practice and Experience

    Volume 44, Issue 9, September 2014, Pages: 1129–1154, James Mistry, Matthew Naylor and Jim Woodcock

    Version of Record online : 19 FEB 2013, DOI: 10.1002/spe.2188

  19. Effective strategic programming for Java developers

    Software: Practice and Experience

    Volume 44, Issue 2, February 2014, Pages: 129–162, Emilie Balland, Pierre-Etienne Moreau and Antoine Reilles

    Version of Record online : 4 OCT 2012, DOI: 10.1002/spe.2159

  20. A novel model-driven approach for seamless integration

    Software: Practice and Experience

    Ahmet F. Mustacoglu

    Version of Record online : 15 SEP 2016, DOI: 10.1002/spe.2440