A complete approach for CIM modelling and model formalising
暂无分享,去创建一个
Zonghua Li | Xiaofeng Zhou | Aihua Gu | Qinfeng Li | Zonghua Li | Xiaofeng Zhou | Aihua Gu | Qinfeng Li
[1] Jeremy Gibbons,et al. Formalisations and applications of BPMN , 2011, Sci. Comput. Program..
[2] John Mylopoulos,et al. From object-oriented to goal-oriented requirements analysis , 1999, CACM.
[3] Dimitris Plexousakis,et al. A Formal Framework for Business Process Modeling and Design , 2002 .
[4] Wil M. P. van der Aalst,et al. Verification Of Workflow Task Structures: A Petri-net-baset Approach , 2000, Inf. Syst..
[5] Mira Balaban,et al. A pattern-based approach for improving model quality , 2014, Software & Systems Modeling.
[6] Daniel Amyot,et al. Generating scenarios from use case map specifications , 2003, Third International Conference on Quality Software, 2003. Proceedings..
[7] Jacques H. Trienekens,et al. Process modelling in demand-driven supply chains: A reference model for the fruit industry , 2010 .
[8] Brian Henderson-Sellers,et al. Bridging metamodels and ontologies in software engineering , 2011, J. Syst. Softw..
[9] Daniel Amyot,et al. Modeling and Analysis of URN Goals and Scenarios with jUCMNav , 2009, 2009 17th IEEE International Requirements Engineering Conference.
[10] Manuel I. Capel,et al. Conceptual framework for business processes compositional verification , 2012, Inf. Softw. Technol..
[11] Paulo F. Pires,et al. Integrating ontologies, model driven, and CNL in a multi-viewed approach for requirements engineering , 2011, Requirements Engineering.
[12] Esperanza Marcos,et al. Applying CIM-to-PIM model transformations for the service-oriented development of information systems , 2011, Inf. Softw. Technol..
[13] Alexander E. Kostin,et al. Reachability analysis in T-invariant-less Petri nets , 2003, IEEE Trans. Autom. Control..
[14] Zhibin Jiang,et al. Extended event-condition-action rules and fuzzy Petri nets based exception handling for workflow management , 2011, Expert Syst. Appl..
[15] Gregory Zacharewicz,et al. Product-service systems scenarios simulation based on G-DEVS/HLA: Generalized discrete event specification/high level architecture , 2012, Comput. Ind..
[16] Uldis Donins,et al. Formalization of the UML Class Diagrams , 2009, ENASE.
[17] Mario Piattini,et al. Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases , 2007, BPM.
[18] Jaap Gordijn,et al. E-service design using i* and e/sup 3/ value modeling , 2006, IEEE Software.
[19] Claus Pahl,et al. Semantic model-driven architecting of service-based software systems , 2007, Inf. Softw. Technol..
[20] Ian Beeson,et al. Modelling non-functional requirements of business processes , 2007, Inf. Softw. Technol..
[21] Haiyan Zhao,et al. Transformation from CIM to PIM: a feature-oriented component-based approach , 2005, MoDELS'05.
[22] Pierre-Yves Schobbens,et al. Clear justification of modeling decisions for goal-oriented requirements engineering , 2008, Requirements Engineering.
[23] Eduardo B. Fernández,et al. Engineering Security into Distributed Systems: A Survey of Methodologies , 2012, J. Univers. Comput. Sci..
[24] Jelena Zdravkovic,et al. A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks , 2010, 2010 14th IEEE International Enterprise Distributed Object Computing Conference.
[25] Haralambos Mouratidis,et al. When security meets software engineering: a case of modelling secure information systems , 2005, Inf. Syst..
[26] Steve Awodey,et al. Category Theory , 2006 .
[27] Janis Grundspenkis,et al. What Is CIM: An Information System Perspective , 2009, ADBIS.
[28] Axel van Lamsweerde,et al. Goal-Oriented Requirements Engineering: A Guided Tour , 2001, RE.
[29] Hervé Pingaud,et al. A model-driven approach for collaborative service-oriented architecture design , 2009 .
[30] Daniel Amyot,et al. Introduction to the User Requirements Notation: learning by example , 2003, Comput. Networks.
[31] Erika Asnina,et al. Computation Independent Modeling within the MDA , 2007, IEEE International Conference on Software-Science, Technology & Engineering (SwSTE'07).
[32] Parastoo Mohagheghi,et al. Where Is the Proof? - A Review of Experiences from Applying MDE in Industry , 2008, ECMDA-FA.
[33] Gadi Taoufiq,et al. A methodology for CIM modelling and its transformation to PIM , 2013 .
[34] Frank Budinsky,et al. Eclipse Modeling Framework , 2003 .
[35] Nora Szasz,et al. Verification of Model Transformations: A Survey of the State-of-the-Art , 2013, CLEI Selected Papers.
[36] Bo Chen,et al. Model Transformation Method for Compensation Events and Tasks from Business Process Model to Flowchart , 2012, ICICA.
[37] Ghassan Beydoun,et al. A security-aware metamodel for multi-agent systems (MAS) , 2009, Inf. Softw. Technol..
[38] Marcelo Fantinato,et al. The use of software product lines for business process management: A systematic literature review , 2013, Inf. Softw. Technol..
[39] Inger Anne Tøndel,et al. An Architectural Foundation for Security Model Sharing and Reuse , 2009, 2009 International Conference on Availability, Reliability and Security.
[40] Marco Brambilla,et al. Large-scale Model-Driven Engineering of web user interaction: The WebML and WebRatio experience , 2014, Sci. Comput. Program..
[41] Jean Bézivin,et al. ATL: A model transformation tool , 2008, Sci. Comput. Program..
[42] Remco M. Dijkman,et al. Semantics and analysis of business process models in BPMN , 2008, Inf. Softw. Technol..
[43] W. L. Yeung,et al. Behavioral modeling and verification of multi-agent systems for manufacturing control , 2011, Expert Syst. Appl..
[44] Paolo Giorgini,et al. Threat Analysis in Goal-Oriented Security Requirements Modelling , 2014, Int. J. Secur. Softw. Eng..
[45] Fang Deng,et al. A Petri Net-based approach for data race detection in BPEL , 2010 .
[46] Mario Piattini,et al. Secure business process model specification through a UML 2.0 activity diagram profile , 2011, Decis. Support Syst..
[47] José Luis Garrido,et al. Definition and use of Computation Independent Models in an MDA-based groupware development process , 2007, Sci. Comput. Program..
[48] Li Zhang,et al. Transforming Business Requirements into BPEL: A MDA-Based Approach to Web Application Development , 2008, IEEE International Workshop on Semantic Computing and Systems.
[49] Hyunbo Cho,et al. A Petri Nets based functional validation for services composition , 2010, Expert Syst. Appl..
[50] Daniel Amyot,et al. Towards Advanced Goal Model Analysis with jUCMNav , 2012, ER Workshops.
[51] Javier Fabra,et al. Automatic execution of business process models: Exploiting the benefits of Model-driven Engineering approaches , 2012, J. Syst. Softw..