{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:18Z","timestamp":1742913498837,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031725777"},{"type":"electronic","value":"9783031725784"}],"license":[{"start":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T00:00:00Z","timestamp":1729296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T00:00:00Z","timestamp":1729296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72578-4_3","type":"book-chapter","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T16:02:30Z","timestamp":1729267350000},"page":"42-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Artifact Translation Into Model Transformation Processes"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Vietz","sequence":"first","affiliation":[]},{"given":"Johanna","family":"Barzen","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Harzenetter","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Leymann","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Weder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,19]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10270-003-0032-z","volume":"2","author":"D Akehurst","year":"2003","unstructured":"Akehurst, D., Kent, S., Patrascoiu, O.: A relational approach to defining and implementing transformations between metamodels. Softw. Syst. Model. 2, 215\u2013239 (2003)","journal-title":"Softw. Syst. Model."},{"key":"3_CR2","unstructured":"Alfred, V.A., Monica, S.L., Jeffrey, D.U.: Compilers: Principles, Techniques & Tools. pearson Education (2007)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Boyle, J.M., Muralidharan, M.N.: Program Reusability through Program Transformation. IEEE Trans. Softw. Eng. SE-10(5), 574\u2013588 (1984)","DOI":"10.1109\/TSE.1984.5010281"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Brambilla, M., Cabot, J., Wimmer, M.: Model-Driven Software Engineering in Practice. Morgan & Claypool Publishers (2012)","DOI":"10.1007\/978-3-031-02546-4"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Breitenb\u00fccher, U., Binz, T., K\u00e9pes, K., Kopp, O., Leymann, F., Wettinger, J.: Combining declarative and imperative cloud application provisioning based on TOSCA. In: International Conference on Cloud Engineering (IC2E 2014), pp. 87\u201396. IEEE (2014)","DOI":"10.1109\/IC2E.2014.56"},{"key":"3_CR6","unstructured":"Briand, L.C.: Software Documentation: how much is enough? In: Proceedings of the 7th European Conference on Software Maintenance And Reengineering (CSMR\u201903), pp. 13\u201315. IEEE (2003)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/11561347_28","volume-title":"Generative Programming and Component Engineering","author":"K Czarnecki","year":"2005","unstructured":"Czarnecki, K., Antkiewicz, M.: Mapping features to models: a template approach based on superimposed variants. In: Gl\u00fcck, R., Lowry, M. (eds.) Generative Programming and Component Engineering, pp. 422\u2013437. Springer Berlin Heidelberg, Berlin, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11561347_28"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1147\/sj.453.0621","volume":"45","author":"K Czarnecki","year":"2006","unstructured":"Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Syst. J. 45(3), 621\u2013645 (2006)","journal-title":"IBM Syst. J."},{"issue":"1","key":"3_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A note on two problems in connexion with graphs. Numer. Math. 1(1), 269\u2013271 (1959)","journal-title":"Numer. Math."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Georg, D., et al.: Execution patterns for quantum applications. In: Proceedings of the 18th International Conference on Software Technologies - ICSOFT, pp. 258\u2013268. SciTePress (2023)","DOI":"10.5220\/0012057700003538"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Guth, J., Leymann, F.: Pattern-based rewrite and refinement of architectures using graph theory. Software-Intensive Cyber-Physical Systems (SICS), pp. 1\u201312 (2019)","DOI":"10.1007\/s00450-019-00416-7"},{"issue":"2","key":"3_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TSSC.1968.300136","volume":"4","author":"PE Hart","year":"1968","unstructured":"Hart, P.E., Nilsson, N.J., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Trans. Syst. Sci. Cybern. 4(2), 100\u2013107 (1968)","journal-title":"IEEE Trans. Syst. Sci. Cybern."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Harzenetter, L., et al.: Pattern-based deployment models and their automatic execution. In: Proceedings of the 11th IEEE\/ACM International Conference on Utility and Cloud Computing (UCC 2018), pp. 41\u201352. IEEE (2018)","DOI":"10.1109\/UCC.2018.00013"},{"key":"3_CR14","unstructured":"Harzenetter, L., Breitenb\u00fccher, U., Falkenthal, M., Guth, J., Leymann, F.: Pattern-based deployment models revisited: automated pattern-driven deployment configuration. In: Proceedings of the Twelfth International Conference on Pervasive Patterns and Applications (PATTERNS 2020), pp. 40\u201349. Xpert Publishing Services (2020)"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/978-3-540-88873-4_17","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"R Hull","year":"2008","unstructured":"Hull, R.: Artifact-centric business process models: brief survey of research results and challenges. In: Meersman, R., Tari, Z. (eds.) On the Move to Meaningful Internet Systems: OTM 2008, pp. 1152\u20131163. Springer Berlin Heidelberg, Berlin, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88873-4_17"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"2361","DOI":"10.1007\/s10270-018-0665-6","volume":"18","author":"N Kahani","year":"2019","unstructured":"Kahani, N., Bagherzadeh, M., Cordy, J.R., Dingel, J., Varr\u00f3, D.: Survey and classification of model transformation tools. Softw. Syst. Model. 18, 2361\u20132397 (2019)","journal-title":"Softw. Syst. Model."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"K\u00e9pes, K., Breitenb\u00fccher, U., Leymann, F.: Situation-aware management of cyber-physical systems. In: Proceedings of the 9th International Conference on Cloud Computing and Services Science (CLOSER 2019), pp. 551\u2013560. SciTePress (2019)","DOI":"10.5220\/0007799505510560"},{"key":"3_CR18","unstructured":"Leymann, F., Roller, D.: Production Workflow: Concepts and Techniques. Prentice Hall PTR (2000)"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10270-003-0020-3","volume":"2","author":"J Ludewig","year":"2003","unstructured":"Ludewig, J.: Models in software engineering - an introduction. Softw. Syst. Model. 2, 5\u201314 (2003)","journal-title":"Softw. Syst. Model."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Mens, T., Van Gorp, P.: A taxonomy of model transformation. Electron. Notes Theor. Comput. Sci. 152, 125\u2013142 (2006), proceedings of the International Workshop on Graph and Model Transformation (GraMoT 2005)","DOI":"10.1016\/j.entcs.2005.10.021"},{"key":"3_CR21","unstructured":"OASIS: Topology and Orchestration Specification for Cloud Applications (TOSCA) Version 1.0. Organization for the Advancement of Structured Information Standards (OASIS) (2013)"},{"key":"3_CR22","unstructured":"OMG: Unified Modeling Language (UML 2.0). Object Management Group (OMG) (2005)"},{"key":"3_CR23","unstructured":"OMG: Meta Object Facility (MOF) 2.0 Query\/View\/ Transformation Specification. Object Management Group (OMG) (2011)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Santos, G., Anquetil, N., Etien, A., Ducasse, S., Valente, M.T.: System specific, source code transformations. In: 31st IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 221\u2013230 (2015)","DOI":"10.1109\/SCAM.2015.7335418"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/3-540-59071-4_45","volume-title":"Graph-Theoretic Concepts in Computer Science","author":"A Sch\u00fcrr","year":"1995","unstructured":"Sch\u00fcrr, A.: Specification of graph translators with triple graph grammars. In: Mayr, E.W., Schmidt, G., Tinhofer, G. (eds.) Graph-Theoretic Concepts in Computer Science, pp. 151\u2013163. Springer Berlin Heidelberg, Berlin, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-59071-4_45"},{"key":"3_CR26","unstructured":"Selic, B.: Model-driven development: its essence and opportunities. In: Proceedings of the 9th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC\u201906). IEEE (2006)"},{"issue":"5","key":"3_CR27","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MS.2003.1231150","volume":"20","author":"S Sendall","year":"2003","unstructured":"Sendall, S., Kozaczynski, W.: Model transformation: the heart and soul of model-driven software development. IEEE Softw. 20(5), 42\u201345 (2003)","journal-title":"IEEE Softw."},{"issue":"5","key":"3_CR28","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-031-17604-3_15","volume-title":"Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3\u20137, 2022, Proceedings","author":"D Vietz","year":"2022","unstructured":"Vietz, D., Barzen, J., Leymann, F., Weder, B.: Splitting quantum-classical scripts for\u00a0the\u00a0generation of\u00a0quantum workflows. In: Almeida, J.P.A., Karastoyanova, D., Guizzardi, G., Montali, M., Maggi, F.M., Fonseca, C.M. (eds.) Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3\u20137, 2022, Proceedings, pp. 255\u2013270. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17604-3_15"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Visser, E.: A survey of rewriting strategies in program transformation systems. Electron. Notes Theor. Comput. Sci. 57, 109\u2013143 (2001), wRS 2001, 1st International Workshop on Reduction Strategies in Rewriting and Programming","DOI":"10.1016\/S1571-0661(04)00270-1"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Weder, B., Breitenb\u00fccher, U., Leymann, F., Wild, K.: Integrating Quantum computing into workflow modeling and execution. In: Proceedings of the 13th IEEE\/ACM International Conference on Utility and Cloud Computing (UCC 2020), pp. 279\u2013291. IEEE (2020)","DOI":"10.1109\/UCC48980.2020.00046"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Wild, K., Breitenb\u00fccher, U., Harzenetter, L., Leymann, F., Vietz, D., Zimmermann, M.: TOSCA4QC: two modeling styles for tosca to automate the deployment and orchestration of quantum applications. In: Proceedings of the 24th International Enterprise Distributed Object Computing Conference (EDOC 2020), pp. 125\u2013134. IEEE (2020)","DOI":"10.1109\/EDOC49727.2020.00024"},{"key":"3_CR33","first-page":"63","volume":"35","author":"M Wurster","year":"2019","unstructured":"Wurster, M., et al.: The essential deployment metamodel: a systematic review of deployment automation technologies. SICS Softw.-Intensive Cyber-Phys. Syst. 35, 63\u201375 (2019)","journal-title":"SICS Softw.-Intensive Cyber-Phys. Syst."}],"container-title":["Communications in Computer and Information Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72578-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T16:03:33Z","timestamp":1729267413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72578-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,19]]},"ISBN":["9783031725777","9783031725784"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72578-4_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024,10,19]]},"assertion":[{"value":"19 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SummerSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Symposium and Summer School on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"summersoc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.summersoc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}