Systematic recovery of MDE technology usage

Juri Di Rocco, Davide Di Ruscio, Johannes Härtel, Ludovico Iovino, Ralf Lämmel, Alfonso Pierantonio

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

MDE projects may use various MDE technologies (e.g., for model transformation, model comparison, or model/code generation) and thus, contain various MDE artifacts (such as models, metamodels, and model transformations). The details of using the MDE technologies and the relationships between the MDE artifacts are typically not accessible at a higher level of abstraction, which makes it hard to understand, build, and test the MDE projects and thus, to reuse the contained MDE artifacts. In this paper, we present a megamodel-based reverse engineering methodology and an infrastructure MDEprofiler for recovering details of using MDE technologies in MDE projects and modeling these details at a higher level of abstraction. We exemplify the approach for MDE projects that use ATL-based model transformations.
Original languageEnglish
Title of host publicationTheory and Practice of Model Transformation - 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Proceedings
EditorsA. Rensink, J. Sanchez Cuadrado
PublisherSpringer Verlag
Pages110-126
ISBN (Print)9783319933160
DOIs
Publication statusPublished - 2018
Externally publishedYes
Event11th International Conference on Model Transformation, ICMT 2018 Held as Part of STAF 2018 - Toulouse, France
Duration: 25 Jun 201826 Jun 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Model Transformation, ICMT 2018 Held as Part of STAF 2018
Country/TerritoryFrance
CityToulouse
Period25/06/1826/06/18

Fingerprint

Dive into the research topics of 'Systematic recovery of MDE technology usage'. Together they form a unique fingerprint.

Cite this