Personensuche
X
?
1
Zentral administrierbares Identitäts- und Berechtigungs-Ma..
Schlussbericht zu 16KIS0844 sec2scada IKT 2020 : Fördermaß...
?
Graph Transformation; Lecture Notes in Computer Science ,
3
Constructing Optimized Validity-Preserving Application Cond..:
, In:
?
Proceedings of the Fifth Workshop on Refactoring Tools ,
6
Integration of smells and refactorings within the Eclipse m..:
, In:
?
Proceedings of the First Workshop on the Analysis of Model Transformations ,
7
Towards refactoring of rule-based, in-place model transform..:
, In:
?
Model Driven Engineering Languages and Systems; Lecture Notes in Computer Science ,
9
Henshin: Advanced Concepts and Tools for In-Place EMF Model..:
, In:
?
Proceedings of the 13th international conference on Model driven engineering languages and systems: Part I ,
10