Author of the publication

Incremental Evaluation of Model Queries over EMF Models.

, , , , , , and . MoDELS (1), volume 6394 of Lecture Notes in Computer Science, page 76-90. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Opportunities of Scalable Modeling Technologies: An Experience Report on Wind Turbines Control Applications Development., , , , , , , , and . ECMFA, volume 10376 of Lecture Notes in Computer Science, page 300-315. Springer, (2017)Graph Query by Example., , , and . CMSEBA@MoDELS, volume 1340 of CEUR Workshop Proceedings, page 17-24. CEUR-WS.org, (2014)Deriving Effective Permissions for Modeling Artifacts from Fine-grained Access Control Rules., , , and . COMMitMDE@MoDELS, volume 1717 of CEUR Workshop Proceedings, page 17-26. CEUR-WS.org, (2016)Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery., , , and . ECMFA, volume 6698 of Lecture Notes in Computer Science, page 389-390. Springer, (2011)Translating OCL to Graph Patterns.. MoDELS, volume 8767 of Lecture Notes in Computer Science, page 670-686. Springer, (2014)Incremental Evaluation of Model Queries over EMF Models., , , , , , and . MoDELS (1), volume 6394 of Lecture Notes in Computer Science, page 76-90. Springer, (2010)IncQuery-D: A Distributed Incremental Model Query Framework in the Cloud., , , , , and . MoDELS, volume 8767 of Lecture Notes in Computer Science, page 653-669. Springer, (2014)Applying Incremental Graph Transformation to Existing Models in Relational Databases., , and . ICGT, volume 7562 of Lecture Notes in Computer Science, page 371-385. Springer, (2012)Rete Network Slicing for Model Queries., , and . ICGT, volume 9761 of Lecture Notes in Computer Science, page 137-152. Springer, (2016)A Tool for Managing Evolving Security Requirements., , , , , and . CAiSE Forum, volume 734 of CEUR Workshop Proceedings, page 49-56. CEUR-WS.org, (2011)