First in a new series of articles to take you step by step through the construction of a complete set of Executable UML (xUML) models. Presented with an initial set of fuzzy requirements, we will transform them into an unambiguous, detailed, constrained and executable statement of the desired system.
Cognification is the application of knowledge to boost the performance and impact of a process. We believe cognification could be a revolution in the way software is built.
A detailed comparison of all methods and tools to create views on your models so that you can choose the one that works best for you
How do you choose the shapes and colors for the elements of your new domain-specific language? Why not asking the crowd of future users for their opinion? This is what we've done with surprising results.
Negative or null results are hardly ever published though they are important in showing the paths which did not pay off. This special issue is a first step to change this
Our approach for modeling gamification process and its application to the learning of modeling itself with examples for UML and SQL. Implemented on top of Papyrus.
Often, modeling tools are regarded as immature and therefore not ready for industrial adoption. Read on to see if there is any truth in this.
The introduction of new functional-like features (like lambda expressions) in the OCL suggests a functional interpretation of the language as an optimal way to exploit such features.
Our approach to automatically generate GraphQL schemas from UML class diagrams (and IFML interaction models)
Our proposal to automatically infer OpenAPI compliant specifications for REST Web APIs from a set of examples of actual API calls
A report on how scalable modeling technologies helped Ikerlan to bring its DSL editor for Wind Turbines to the next level
Details of our UML Profile to model OData Web APIs. Once you have your UML model annotated with OData stereotypes you could automate the generation of your OData definition files.
Our work helps security experts to visualize, (automatically) analyse and manipulate web security access-control policies, specially for Java EE
Read on to learn how formalizing model transformations and traceability mappings helps to chain, reuse and compose model transformations
How well does it fare the "MDE-version" of a well-known open source software project wrt the original? Find out what benefits (and shortcomings) MDE brings in this scenario
Our work “MetaScience: an Holistic Approach for Research Modeling” has been accepted at ER2016. This article
Few solutions target UML to NoSQL code-generation and even less consider OCL constraints. We present a UML/OCL transformation to Blueprints, an abstraction layer on top of a variety of graph databases
Have you ever thought about using model transformations to specify and enforce access-control policies? Check how we do it
We propose a data distribution algorithm for declarative model transformation based on static analysis of relational transformation rules.