To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Abstract. Recently, many researchers are working on semantics preserving model transformation. In the field of graph transformation one can think of translating graph grammars writ...
Sure that quality applications must be well thought and described before the development phase and that a design methodology can be much more than a help in most occasions, we pro...
A current trend in the software engineering community is to integrate different tools in a friendly and powerful development environment for use by final users. This is also the c...
—We have defined a software component model which specifies components and composition operators. These operators coordinate and encapsulate concurrency between components. In ...