The complexity of embedded systems and their safety requirements have risen significantly in recent years. Models and the model based development approach help to keep overview and...
This paper introduces an extractive approach to building-up a product line based on existing systems. Thereby, we focus on the analysis of common functionalities across different ...
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
In this paper we introduce a static analysis technique for graph transformation systems. We present an algorithm which, given a graph transformation system and a start graph, produ...
The co-evolution of business processes and supporting software systems is needed for keeping them aligned and it requires managerial and technological effort for adequately plannin...