Automate Model Transformation From CIM to PIM up to PSM in Model-Driven Architecture
暂无分享,去创建一个
[1] Stéphane S. Somé,et al. Towards a Semi-Automated Model-Driven Method for the Generation of Web-based Applications from Use Cases , 2008, MDWE@MoDELS.
[2] Gugulothu Narsimha,et al. Secure NoSQL for the Social Networking and E-Commerce Based Bigdata Applications Deployed in Cloud , 2018, Int. J. Cloud Appl. Comput..
[3] Manu Vardhan,et al. Distributed Ledger Technology based Property Transaction System with Support for IoT Devices , 2019, Int. J. Cloud Appl. Comput..
[4] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[5] Abdelaziz Mouloudi,et al. Transformation approach CIM to PIM: from business processes models to state machine and package models , 2015, 2015 International Conference on Open Source Software Computing (OSSCOM).
[6] Nawfal El Moukhi,et al. A New PHP Discoverer for Modisco , 2019 .
[7] Abdelaziz Mouloudi,et al. A methodology for transforming CIM to PIM through UML: From business view to information system view , 2015, 2015 Third World Conference on Complex Systems (WCCS).
[8] Heinrich Hußmann,et al. Using UML/OCL Constraints for Relational Database Design , 1999, UML.
[9] He Zhang,et al. A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism , 2016, Int. J. Grid High Perform. Comput..
[10] Yan Zhang,et al. Handbook of Research on End-to-End Cloud Computing Architecture Design , 2016 .
[11] Paul W. P. J. Grefen,et al. A Method for Operationalizing Service-Dominant Business Models into Conceptual Process Models , 2018, BMSD.
[12] Ghalib Bello,et al. Chemometrics: From Data Preprocessing to Fog Computing , 2019, Int. J. Fog Comput..
[13] Sanjay P. Ahuja,et al. On the Performance Evaluation of IaaS Cloud Services With System-Level Benchmarks , 2018, Int. J. Cloud Appl. Comput..
[14] Brij B. Gupta,et al. Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT , 2018, IEEE Access.
[15] Abdelaziz Mouloudi,et al. A Based-Rule Method to Transform CIM to PIM into MDA , 2016, Int. J. Cloud Appl. Comput..
[16] Haiyan Zhao,et al. Transformation from CIM to PIM: a feature-oriented component-based approach , 2005, MoDELS'05.
[17] Birgit Grammel,et al. A generic traceability framework for facet-based traceability data extraction in model-driven software development , 2010, ECMFA-TW '10.
[18] Mario Piattini,et al. Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach , 2010, Inf. Softw. Technol..
[19] Mizanur Rahman,et al. IoT Data Compression and Optimization Techniques in Cloud Storage: Current Prospects and Future Directions , 2019, Int. J. Cloud Appl. Comput..
[20] Douglas C. Schmidt,et al. Guest Editor's Introduction: Model-Driven Engineering , 2006, Computer.
[21] Clémentine Nebut,et al. Visualization of Use Cases through Automatically Generated Activity Diagrams , 2008, MoDELS.
[22] Ubaidullah Alias Kashif,et al. Architectural Design of Trusted Platform for IaaS Cloud Computing , 2018, Int. J. Cloud Appl. Comput..
[23] Martin Kardos,et al. Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA) , 2010 .
[24] Jaap Gordijn,et al. Value-based requirements engineering: exploring innovative e-commerce ideas , 2003, Requirements Engineering.
[25] Nadia Bouassida,et al. Towards naturalistic programming: Mapping language-independent requirements to constrained language specifications , 2018, Sci. Comput. Program..
[26] Amina Bouraoui,et al. Model driven engineering of accessible and multi-platform graphical user interfaces by parameterized model transformations , 2019, Sci. Comput. Program..
[27] Abdelaziz Mouloudi,et al. A new methodology CIM to PIM transformation resulting from an analytical survey , 2016, 2016 4th International Conference on Model-Driven Engineering and Software Development (MODELSWARD).
[28] Stephen Musyoki,et al. Analysis of Electromagnetic Field Radiation from a Rectangular Cavity-Backed Slot Antenna Using ADI-FDTD Method , 2012 .
[29] Abdelaziz Mouloudi,et al. A model transformation in MDA from CIM to PIM represented by web models through SoaML and IFML , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[30] Esperanza Marcos,et al. Applying CIM-to-PIM model transformations for the service-oriented development of information systems , 2011, Inf. Softw. Technol..
[31] Brij B. Gupta,et al. Classification of various attacks and their defence mechanism in online social networks: a survey , 2019, Enterp. Inf. Syst..
[32] Witold Suryn,et al. Transformation from CIM to PIM Using Patterns and Archetypes , 2008 .
[33] Abdelaziz Mouloudi,et al. A Methodology of Model Transformation in MDA: from CIM to PIM , 2015 .
[34] Abdelaziz Mouloudi,et al. Disciplined approach for transformation CIM to PIM in MDA , 2015, 2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD).
[35] Abdelaziz Mouloudi,et al. CIM to PIM Transformation in MDA: from Service-Oriented Business Models to Web-Based Design Models , 2016 .
[36] Abdelaziz Mouloudi,et al. Model Transformation with ATL into MDA from CIM to PIM Structured through MVC , 2016, ANT/SEIT.
[37] Yutaka Ishibashi,et al. An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework , 2017, Future Gener. Comput. Syst..
[38] Jose-Norberto Mazón,et al. A Model-Driven Goal-Oriented Requirement Engineering Approach for Data Warehouses , 2007, ER Workshops.