Zum Inhalt

Software and Systems Modeling

Ausgabe 2/2020

Inhalt (14 Artikel)

Compositional model analysis

  • Editorial

Jeff Gray, Bernhard Rumpe

The Software Language Extension Problem

  • EXPERT’S VOICE

Manuel Leduc, Thomas Degueule, Eric Van Wyk, Benoit Combemale

Guest editorial for EMMSAD’2018 special section

  • Guest Editorial

Iris Reinhartz-Berger, Sérgio Guerreiro

A security requirements modelling language for cloud computing environments

  • Special Section Paper

Haralambos Mouratidis, Shaun Shei, Aidan Delaney

Design methods for the new database era: a systematic literature review

  • Special Section Paper

Noa Roy-Hubara, Arnon Sturm

Mining reading patterns from eye-tracking data: method and demonstration

  • Special Section Paper

Constantina Ioannou, Indira Nurdiani, Andrea Burattin, Barbara Weber

Extending organizational capabilities with Open Data to support sustainable and dynamic business ecosystems

  • Special Section Paper

Jānis Kampars, Jelena Zdravkovic, Janis Stirna, Jānis Grabis

Special section on ICMT at STAF 2018

  • Guest Editorial

Jesús Sánchez Cuadrado, Arend Rensink

Understanding MDE projects: megamodels to the rescue for architecture recovery

  • Special Section Paper

Juri Di Rocco, Davide Di Ruscio, Johannes Härtel, Ludovico Iovino, Ralf Lämmel, Alfonso Pierantonio

CoqTL: a Coq DSL for rule-based model transformation

  • Special Section Paper

Zheng Cheng, Massimo Tisi, Rémi Douence

Comparing and classifying model transformation reuse approaches across metamodels

  • Special Section Paper

Jean-Michel Bruel, Benoit Combemale, Esther Guerra, Jean-Marc Jézéquel, Jörg Kienzle, Juan de Lara, Gunter Mussbacher, Eugene Syriani, Hans Vangheluwe

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach

  • Regular Paper

Mattia Salnitri, Konstantinos Angelopoulos, Michalis Pavlidis, Vasiliki Diamantopoulou, Haralambos Mouratidis, Paolo Giorgini

ExpRunA : a domain-specific approach for technology-oriented experiments

  • Regular Paper

Eneias Silva, Alessandro Leite, Vander Alves, Sven Apel

    Bildnachweise
    AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, ams.solutions GmbH/© ams.solutions GmbH, Wildix/© Wildix, arvato Systems GmbH/© arvato Systems GmbH, Ninox Software GmbH/© Ninox Software GmbH, Nagarro GmbH/© Nagarro GmbH, GWS mbH/© GWS mbH, CELONIS Labs GmbH, USU GmbH/© USU GmbH, G Data CyberDefense/© G Data CyberDefense, Vendosoft/© Vendosoft, Kumavision/© Kumavision, Noriis Network AG/© Noriis Network AG, tts GmbH/© tts GmbH, Asseco Solutions AG/© Asseco Solutions AG, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, Ferrari electronic AG/© Ferrari electronic AG, Doxee AT GmbH/© Doxee AT GmbH , Haufe Group SE/© Haufe Group SE, NTT Data/© NTT Data, Bild 1 Verspätete Verkaufsaufträge (Sage-Advertorial 3/2026)/© Sage, IT-Director und IT-Mittelstand: Ihre Webinar-Matineen in 2025 und 2026/© amgun | Getty Images