Author of the publication

Pinset: A DSL for Extracting Datasets from Models for Data Mining-Based Quality Analysis.

, , and . QUATIC, page 83-91. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

transML: A Family of Languages to Model Model Transformations., , , , and . MoDELS (1), volume 6394 of Lecture Notes in Computer Science, page 106-120. Springer, (2010)The Epsilon Generation Language., , , and . ECMDA-FA, volume 5095 of Lecture Notes in Computer Science, page 1-16. Springer, (2008)Model Migration with Epsilon Flock., , , and . ICMT@TOOLS, volume 6142 of Lecture Notes in Computer Science, page 184-198. Springer, (2010)Rigorous identification and encoding of trace-links in model-driven engineering., , , , , , and . Softw. Syst. Model., 10 (4): 469-487 (2011)OCR post-correction for detecting adversarial text images., , and . J. Inf. Secur. Appl., (2022)Update Transformations in the Small with the Epsilon Wizard Language., , , and . J. Object Technol., 6 (9): 53-69 (2007)An Architecture for the Development of Distributed Analytics Based on Polystore Events., , , , , and . Poly/DMAH@VLDB, volume 12633 of Lecture Notes in Computer Science, page 54-65. Springer, (2020)MONDO: Scalable Modelling and Model Management on the Cloud., , , , , , , , , and . STAF Doctoral Symposium / Showcase, volume 1675 of CEUR Workshop Proceedings, page 55-64. CEUR-WS.org, (2016)Different models for model matching: An analysis of approaches to support model differencing., , , and . CVSM@ICSE, page 1-6. IEEE Computer Society, (2009)Model-Driven Engineering and Model Transformation: for Fun and Profit., and . Engineering Dependable Software Systems, volume 34 of NATO Science for Peace and Security Series, D: Information and Communication Security, IOS Press, (2013)