Clustering of model instances by using graph kernels. Make sure you test your models with the most diverse set of examples!
We propose an iterative modeling approach where designers can dynamically customize the level of formality required in each iteration in a visual and intuitive way
PAMELA proposes a shift in the modeling paradigm, in which models and code are developed together and at the same time in what we call a continuous modeling process.
Quantum computing is getting closer and closer to being embedded in commercial information systems. This post shows you how to modernize, via a KDM to UML transformation, “traditional systems” and them ready to become hybrid systems embedding quantum software components
Discover why we need a new traceability metamodel and the quality characteristics that enable ours to reason on the value of a trace
A domain-specific language to model multi-layered IoT systems, including the definition rules to express how the Internet of Things system should adapt in reaction to changes in its environment
Please do not define any direction in your associations when creating your domain models. This is part of a further refinement during the design phase.
MIKADO helps smart cities administrators in evaluating the degree of smartness and sustainability of their cities by providing an automated and customized evaluation of the KPIs they selected. The approach is generic, and thus, equally applicable to different smart cities for their KPIs assessment.
In numerous programming and software engineering courses, students are asked to program on paper, which has supporters and detractors. Supporters claim that, among its advantages, programming on paper allows students to focus on functionality, avoiding the...
We keep using excel, word, powerpoint and other drawing tools to model our software systems. What is wrong with us? Or maybe current modeling tools are to blame for this?
We present a novel robust hashing mechanism for models. Robust hashing algorithms (i.e. hashing algorithms that generate similar outputs from similar input data) are useful as a key building block in intellectual property protection, authenticity assessment and fast comparison and retrieval solutions