2004
DOI: 10.1016/j.entcs.2004.02.062
|View full text |Cite
|
Sign up to set email alerts
|

Joint Optimization and Reachability Analysis in Graph Transformation Systems with Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Outside the SBMDE community, there are many crossover and mutation operations proposed [16], [17], [18]. These surveys identify more than 50 crossover operations [20] -Random Kessentini et al [21] -Random Faunes et al [22], [23] N point Random Baki et al [24] Single-point Random Saada et al [5] Single-point Random Kessentini et al [25] -Random Mkaouer et al [26] Single-point Random Gyapay et al [27] --Denil et al [3] -Random Abdeen et al [28] Single-point Random Fleck et al [29] Single-point Random Nisbet et al [30] --Cooper et al [31] Single-point Random Fatiregun et al [32] --Fatiregun et al [33] Single-point Random Kulkarni et al [34] Single-point Random Fatiregun et al [35] Single-point Random Fleurey et al [4] -Random Cadavid et al [36] -Random Wang et al [37] -Random Shelburg et al [38] -Random Jilani et al [39] -Random Sahin et al [40] Single-point Random Rose and Poulding [41] -Random Batot [42] Single-point Random Kessentini et al [43], [44] Single-point Random Faunes et al [45] Single-point Random Kessentini et al [46] Single-point Random Mansoor et al [47] Single-point Random Debreceni et al [48] --Ghannem et al [49] Single-point Random Ghannem et al [50] Single-point Random Amoui et al [51] Single-point Random Jensen and Cheng …”
Section: Related Workmentioning
confidence: 99%
“…Outside the SBMDE community, there are many crossover and mutation operations proposed [16], [17], [18]. These surveys identify more than 50 crossover operations [20] -Random Kessentini et al [21] -Random Faunes et al [22], [23] N point Random Baki et al [24] Single-point Random Saada et al [5] Single-point Random Kessentini et al [25] -Random Mkaouer et al [26] Single-point Random Gyapay et al [27] --Denil et al [3] -Random Abdeen et al [28] Single-point Random Fleck et al [29] Single-point Random Nisbet et al [30] --Cooper et al [31] Single-point Random Fatiregun et al [32] --Fatiregun et al [33] Single-point Random Kulkarni et al [34] Single-point Random Fatiregun et al [35] Single-point Random Fleurey et al [4] -Random Cadavid et al [36] -Random Wang et al [37] -Random Shelburg et al [38] -Random Jilani et al [39] -Random Sahin et al [40] Single-point Random Rose and Poulding [41] -Random Batot [42] Single-point Random Kessentini et al [43], [44] Single-point Random Faunes et al [45] Single-point Random Kessentini et al [46] Single-point Random Mansoor et al [47] Single-point Random Debreceni et al [48] --Ghannem et al [49] Single-point Random Ghannem et al [50] Single-point Random Amoui et al [51] Single-point Random Jensen and Cheng …”
Section: Related Workmentioning
confidence: 99%
“…In policies, what is modeled is the possible persistence of an element in a state over a period, rather than the occurrence of specific transitions triggered by any type of events. In this line, the work in [8] capitalises on [6] translating graph transformation systems into transition systems to be input to a model checker, restricting valid execution paths to time-ordered transformation sequences. In general, several techniques have been developed to derive inputs for model-checkers from the specification of system behaviour in the form of graph transformations (see [9] for a comparison of two general approaches to the development of these techniques).…”
Section: Related Workmentioning
confidence: 99%