Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime support for rule-based access-control evaluation through model-transformation., , and . SLE, page 57-69. ACM, (2016)From Declarative to Imperative UML/OCL Operation Specifications.. ER, volume 4801 of Lecture Notes in Computer Science, page 198-213. Springer, (2007)Paraphrasing OCL Expressions with SBVR., and . NLDB, volume 5039 of Lecture Notes in Computer Science, page 311-316. Springer, (2008)Object Constraint Language (OCL): A Definitive Guide., and . SFM, volume 7320 of Lecture Notes in Computer Science, page 58-90. Springer, (2012)JSONDiscoverer: Visualizing the schema lurking behind JSON documents., and . Knowl. Based Syst., (2016)On the verification of UML/OCL class diagrams using constraint programming., , and . J. Syst. Softw., (2014)Extending Conceptual Schemas with Business Process Information., , and . Adv. Softw. Eng., (2010)Test Data Generation for Model Transformations Combining Partition and Constraint Analysis., and . ICMT, volume 8568 of Lecture Notes in Computer Science, page 25-41. Springer, (2014)Determining the Structural Events That May Violate an Integrity Constraint., and . UML, volume 3273 of Lecture Notes in Computer Science, page 320-334. Springer, (2004)The MDE Diploma: first international postgraduate specialization in model-driven engineering., and . Computer Science Education, 21 (4): 389-402 (2011)