2012
DOI: 10.1007/978-3-642-33666-9_7
|View full text |Cite
|
Sign up to set email alerts
|

An Eclipse Modelling Framework Alternative to Meet the Models@Runtime Requirements

Abstract: Abstract. Models@Runtime aims at taming the complexity of software dynamic adaptation by pushing further the idea of reflection and considering the reflection layer as a first-class modeling space. A natural approach to Models@Runtime is to use MDE techniques, in particular those based on the Eclipse Modeling Framework. EMF provides facilities for building DSLs and tools based on a structured data model, with tight integration with the Eclipse IDE. EMF has rapidly become the defacto standard in the MDE communi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 33 publications
(31 citation statements)
references
References 12 publications
0
31
0
Order By: Relevance
“…This actual adaptation process takes only some milliseconds by using the low-level APIs to reconfigure a system at runtime provided by the modern adaptive execution platforms, i.e. OSGi [33] and Kevoree [13]. Right after the new proxy components are up and running, the new security policy is really enforced in the running system.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…This actual adaptation process takes only some milliseconds by using the low-level APIs to reconfigure a system at runtime provided by the modern adaptive execution platforms, i.e. OSGi [33] and Kevoree [13]. Right after the new proxy components are up and running, the new security policy is really enforced in the running system.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…In Section 5, we show how our approach is applied for two different adaptive execution platforms, i.e. OSGi [33] and Kevoree [13] 1 . It is important to note that the security-enforced architecture model is not used for generating the whole system but only the proxy components.…”
Section: A Running Examplementioning
confidence: 99%
See 3 more Smart Citations