Author of the publication

An MDA approach for developing secure OLAP applications: Metamodels and transformations.

, , , and . Comput. Sci. Inf. Syst., 12 (2): 541-565 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Business Process Recovery Patterns through QVT Transformations., , and . ICMT@TOOLS, volume 6142 of Lecture Notes in Computer Science, page 168-183. Springer, (2010)Decreasing the cost of mutation testing with second-order mutants., , and . Softw. Test. Verification Reliab., 19 (2): 111-131 (2009)An MDA-based approach for database re-engineering., , and . J. Softw. Maintenance Res. Pract., 19 (6): 383-417 (2007)Un entorno integrado para la reingeniería., , and . JISBD, page 195-202. Thomson, (2005)Diagnosis of software erosion through fuzzy logic., , and . CIDUE, page 49-56. IEEE, (2011)Database Schema Elicitation to Modernize Relational Databases., , , and . ICEIS (1), page 126-132. SciTePress, (2012)GreCo: Green code of ethics., , , , , , and . J. Softw. Evol. Process., (2017)Automated generation of oracled test cases with regular expressions and combinatorial techniques., , , and . J. Softw. Evol. Process., (2020)A family of case studies on business process mining using MARBLE., , , and . J. Syst. Softw., 85 (6): 1370-1385 (2012)Marco MINERVA para Mejora Continua de Procesos de Negocio Orientado a Servicios Dirigido por Modelos., , , and . CIbSE, page 53-58. (2011)