Publications
Filters: First Letter Of Last Name is V [Clear All Filters]
"Dynamic Backwards Slicing of Model Transformations",
Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.
Accepted
"An Idea of an Independent Validation of Vulnerability Discovery Models",
International Symposium on Engineering Secure Software and Systems (ESSoS), Eindhoven, 2012.
"Change-driven model transformations. Change (in) the rule to rule the change.",
Software and Systems Modeling, issue Online first.: Springer Berlin / Heidelberg, pp. 1-31, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum: CEUR-WS.org, pp. 49-56, 2011.
"Implementing Efficient Model Validation in EMF Tools: Tool Demonstration",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011.
Abstract
"A Model-driven Framework for Guided Design Space Exploration",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011.
Abstract
ACM Distinguished Paper Award, Acceptance rate: 15%
"Towards Dynamic Backward Slicing of Model Transformations",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
"Quick fix generation for DSMLs",
IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsbourgh, PA, USA, IEEE Computer Society, 09/2011.
Abstract
Acceptance rate: 33%
"Static Type Checking of Model Transformation Programs",
Electronic Communications of the EASST, International Conference on Graph Transformation 2010 - Doctoral Symposium, vol. 38, 09/2011.
Abstract
Accepted
"Towards Guided Trajectory Exploration of Graph Transformation Systems",
Electronic Communications of the EASST, Petri Nets and Graph Transformations 2010, vol. 40, 08/2011.
Abstract
"Annotation inference for separation logic based verifiers",
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"A Graph Query Language for EMF models",
Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011.
Abstract
"Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery",
Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011.
Abstract
"SeCMER: A Tool to Gain Control of Security Requirements Evolution",
Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
Abstract
10.1007/978-3-642-24755-2_35
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Dynamic constraint satisfaction problems over models",
Software and Systems Modeling, 11/2010.
Abstract
"Incremental Evaluation of Model Queries over EMF Models",
Model Driven Engineering Languages and Systems, 13th International Conference, MODELS’10: Springer, 10/2010.
Acceptance rate: 21%
"Incremental query evaluation over EMF models",
ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
"Back-annotation of Simulation Traces with Change-Driven Model Transformations",
Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.
Acceptance rate: 22%
From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2,
: Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.
Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2",
International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010.
Abstract
"Guided State Space Exploration using Back-annotation of Occurrence Vectors",
Proceedings of the Fourth International Workshop on Petri Nets and Graph Transformation, 2010.
"Synchronization of abstract and concrete syntax in domain-specific modeling languages",
Software and Systems Modeling, vol. 9, pp. 453-471, 2010.
Abstract