{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:35:25Z","timestamp":1743147325936,"version":"3.40.3"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319465074"},{"type":"electronic","value":"9783319465081"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46508-1_3","type":"book-chapter","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T01:53:39Z","timestamp":1474509219000},"page":"22-46","source":"Crossref","is-referenced-by-count":23,"title":["Archimedean Points: The Essence for Mastering Change"],"prefix":"10.1007","author":[{"given":"Bernhard","family":"Steffen","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Naujokat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,23]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","first-page":"1862","DOI":"10.1007\/978-0-387-39940-9_652","volume-title":"Encyclopedia of Database Systems","author":"H Schuldt","year":"2009","unstructured":"Schuldt, H.: Multi-tier architecture. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of Database Systems, pp. 1862\u20131865. Springer, New York (2009)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Grumberg, O.: Avoiding the state explosion problem in temporal logic model checking. In: Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing (PODC 1987), pp. 294\u2013303. ACM, New York (1987)","DOI":"10.1145\/41840.41865"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-44577-3_12","volume-title":"Informatics","author":"E Clarke","year":"2001","unstructured":"Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Progress on the state explosion problem in model checking. In: Wilhelm, R. (ed.) Informatics. LNCS, vol. 2000, pp. 176\u2013194. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44577-3_12"},{"issue":"3","key":"3_CR4","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1145\/177492.177725","volume":"16","author":"O Grumberg","year":"1994","unstructured":"Grumberg, O., Long, D.E.: Model checking and modular verification. ACM Trans. Program. Lang. Syst. (TOPLAS) 16(3), 843\u2013871 (1994)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0020836","volume-title":"Compositionality, Concurrency and Partial Correctness. Proof Theories for Networks of Processes, and Their Relationship","author":"J Zwiers","year":"1989","unstructured":"Zwiers, J.: Compositionality, Concurrency and Partial Correctness. Proof Theories for Networks of Processes, and Their Relationship. LNCS, vol. 321. Springer, Heidelberg (1989). doi: 10.1007\/BFb0020836"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP\u201997 \u2014 Object-Oriented Programming","author":"G Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220\u2013242. Springer, Heidelberg (1997). doi: 10.1007\/BFb0053381"},{"key":"3_CR7","volume-title":"Domain-Specific Languages","author":"M Fowler","year":"2011","unstructured":"Fowler, M., Parsons, R.: Domain-Specific Languages. Addison-Wesley\/ACM Press, New York (2011)"},{"issue":"4","key":"3_CR8","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1145\/1118890.1118892","volume":"37","author":"M Mernik","year":"2005","unstructured":"Mernik, M., Heering, J., Sloane, A.M.: When and How to develop domain-specific languages. ACM Comput. Surv. 37(4), 316\u2013344 (2005)","journal-title":"ACM Comput. Surv."},{"key":"3_CR9","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"K Czarnecki","year":"2000","unstructured":"Czarnecki, K., Eisenecker, U.W.: Generative Programming: Methods, Tools, and Applications. ACM Press\/Addison-Wesley Publishing Co., New York (2000)"},{"key":"3_CR10","volume-title":"Code Generation in Action","author":"J Herrington","year":"2003","unstructured":"Herrington, J.: Code Generation in Action. Manning Publications Co., Greenwich (2003)"},{"key":"3_CR11","unstructured":"Object Management Group (OMG): Documents associated with Object Constraint Language (OCL), Version 2.4 (2014). http:\/\/www.omg.org\/spec\/OCL\/2.4\/"},{"key":"3_CR12","volume-title":"Handbook of Mathematical Logic","author":"J Barwise","year":"1977","unstructured":"Barwise, J.: An introduction to first-order logic. In: Barwise, J. (ed.) Handbook of Mathematical Logic. Elsevier Science Publishers B.V, Amsterdam (1977)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Giannakopoulou, D., Havelund, K.: Automata-based verification of temporal properties on running programs. In: Proceedings of 16th IEEE International Conference on Automated Software Engineering (ASE 2001), pp. 412\u2013416 (2001)","DOI":"10.1109\/ASE.2001.989841"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24622-0_5"},{"issue":"5","key":"3_CR15","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebr. Program. 78(5), 293\u2013303 (2009). The 1st Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS\u201907)","journal-title":"J. Log. Algebr. Program."},{"issue":"4","key":"3_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4), 1\u201364 (2011)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"3_CR17","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10009-011-0218-6","volume":"14","author":"O Sokolsky","year":"2011","unstructured":"Sokolsky, O., Havelund, K., Lee, I.: Introduction to the special section on runtime verification. Int. J. Softw. Tools Technol. Transf. 14(3), 243\u2013247 (2011)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"6","key":"3_CR18","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MC.2010.177","volume":"43","author":"T Margaria","year":"2010","unstructured":"Margaria, T., Steffen, B.: Simplicity as a driver for agile innovation. Computer 43(6), 90\u201392 (2010)","journal-title":"Computer"},{"issue":"10","key":"3_CR19","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MC.2009.315","volume":"42","author":"T Margaria","year":"2009","unstructured":"Margaria, T., Steffen, B.: Continuous model-driven engineering. IEEE Comput. 42(10), 106\u2013109 (2009)","journal-title":"IEEE Comput."},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-540-70889-6_7","volume-title":"Hardware and Software, Verification and Testing","author":"B Steffen","year":"2007","unstructured":"Steffen, B., Margaria, T., Nagel, R., J\u00f6rges, S., Kubczak, C.: Model-driven development with the jABC. In: Bin, E., Ziv, A., Ur, S. (eds.) HVC 2006. LNCS, vol. 4383, pp. 92\u2013108. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-70889-6_7"},{"issue":"11","key":"3_CR21","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2013.296","volume":"46","author":"J Neubauer","year":"2013","unstructured":"Neubauer, J., Steffen, B.: Plug-and-play higher-order process integration. IEEE Comput. 46(11), 56\u201362 (2013)","journal-title":"IEEE Comput."},{"key":"3_CR22","doi-asserted-by":"crossref","first-page":"259","DOI":"10.4204\/EPTCS.129.16","volume":"129","author":"J Neubauer","year":"2013","unstructured":"Neubauer, J., Steffen, B., Margaria, T.: Higher-order process modeling: product-lining, variability modeling and beyond. Electr. Proc. Theor. Comput. Sci. 129, 259\u2013283 (2013)","journal-title":"Electr. Proc. Theor. Comput. Sci."},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/3-540-48294-6_22","volume-title":"Static Analysis","author":"M M\u00fcller-Olm","year":"1999","unstructured":"M\u00fcller-Olm, M., Schmidt, D., Steffen, B.: Model-checking: a tutorial introduction. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol. 1694, pp. 330\u2013354. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48294-6_22"},{"key":"3_CR24","unstructured":"Steffen, B., Margaria, T., Freitag, B.: Module configuration by minimal model construction. Technical report, Fakult\u00e4t f\u00fcr Mathematik und Informatik, Universit\u00e4t Passau (1993)"},{"key":"3_CR25","first-page":"847","volume":"51","author":"B Steffen","year":"1997","unstructured":"Steffen, B., Margaria, T., Braun, V., Kalt, N.: Hierarchical service definition. Ann. Rev. Commun. ACM 51, 847\u2013856 (1997)","journal-title":"Ann. Rev. Commun. ACM"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","volume-title":"Correct System Design","year":"1999","unstructured":"Olderog, E.-R., Steffen, B. (eds.): Correct System Design. LNCS, vol. 1710. Springer, Heidelberg (1999)"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/BFb0014354","volume-title":"Algebraic Methodology and Software Technology","author":"B Steffen","year":"1996","unstructured":"Steffen, B., Margaria, T., Cla\u00dfen, A., Braun, V.: Incremental formalization. In: Wirsing, M., Nivat, M. (eds.) AMAST 1996. LNCS, vol. 1101, pp. 608\u2013611. Springer, Heidelberg (1996). doi: 10.1007\/BFb0014354"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Neubauer, J., Margaria, T., Steffen, B.: Design for verifiability: the OCS case study. In: Formal Methods for Industrial Critical Systems: A Survey of Applications, pp. 153\u2013178. Wiley-IEEE Computer Society Press, March 2013","DOI":"10.1002\/9781118459898.ch8"},{"key":"3_CR29","first-page":"65","volume":"8","author":"B Jonsson","year":"2001","unstructured":"Jonsson, B., Margaria, T., Naeser, G., Nystr\u00f6m, J., Steffen, B.: Incremental requirement specification for evolving systems. Nordic J. Comput. 8, 65\u201387 (2001)","journal-title":"Nordic J. Comput."},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Lamprecht, A.L., Naujokat, S., Margaria, T., Steffen, B.: Synthesis-based loose programming. In: Proceedings of the 7th International Conference on the Quality of Information and Communications Technology (QUATIC 2010), Porto, Portugal, pp. 262\u2013267. IEEE, September 2010","DOI":"10.1109\/QUATIC.2010.53"},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-28872-2_7","volume-title":"Fundamental Approaches to Software Engineering","author":"S Naujokat","year":"2012","unstructured":"Naujokat, S., Lamprecht, A.-L., Steffen, B.: Loose programming with PROPHETS. In: Lara, J., Zisman, A. (eds.) FASE 2012. LNCS, vol. 7212, pp. 94\u201398. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28872-2_7"},{"issue":"5","key":"3_CR32","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/s10009-012-0254-x","volume":"14","author":"S J\u00f6rges","year":"2012","unstructured":"J\u00f6rges, S., Lamprecht, A.L., Margaria, T., Schaefer, I., Steffen, B.: A constraint-based variability modeling framework. Int. J. Softw. Tools Technol. Transf. (STTT) 14(5), 511\u2013530 (2012)","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"issue":"11","key":"3_CR33","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2013.299","volume":"46","author":"AL Lamprecht","year":"2013","unstructured":"Lamprecht, A.L., Naujokat, S., Schaefer, I.: Variability management beyond feature models. IEEE Comput. 46(11), 48\u201354 (2013)","journal-title":"IEEE Comput."},{"issue":"5","key":"3_CR34","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/s10009-012-0253-y","volume":"14","author":"I Schaefer","year":"2012","unstructured":"Schaefer, I., Rabiser, R., Clarke, D., Bettini, L., Benavides, D., Botterweck, G., Pathak, A., Trujilol, S., Villela, K.: Software diversity - state of the art and perspectives. Int. J. Softw. Tools Technol. Transf. (STTT) 14(5), 477\u2013495 (2012)","journal-title":"Int. J. Softw. Tools Technol. Transf. (STTT)"},{"key":"3_CR35","unstructured":"Parr, A.: Industrial Control Handbook, 3rd edn. Newnes, Oxford, Auckland, Boston, Johannesburg, Melbourne, New Delhi (1998)"},{"key":"3_CR36","volume-title":"Programmable Logic Controllers","author":"W Bolton","year":"2015","unstructured":"Bolton, W.: Programmable Logic Controllers, 6th edn. Newnes\/Elsevier, Amsterdam\/Boston (2015)","edition":"6"},{"key":"3_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-60365-4_116","volume-title":"Rules in Database Systems","author":"KR Dittrich","year":"1995","unstructured":"Dittrich, K.R., Gatziu, S., Geppert, A.: The active database management system manifesto: a rulebase of ADBMS features. In: Sellis, T. (ed.) RIDS 1995. LNCS, vol. 985, pp. 1\u201317. Springer, Heidelberg (1995). doi: 10.1007\/3-540-60365-4_116"},{"issue":"2","key":"3_CR38","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/TASE.2006.880857","volume":"4","author":"EE Almeida","year":"2007","unstructured":"Almeida, E.E., Luntz, J.E., Tilbury, D.M.: Event-condition-action systems for reconfigurable logic control. IEEE T. Autom. Sci. Eng. 4(2), 167\u2013181 (2007)","journal-title":"IEEE T. Autom. Sci. Eng."},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Naujokat, S., Lybecait, M., Kopetzki, D., Steffen, B.: CINCO: A Simplicity-Driven Approach to Full Generation of Domain-Specific Graphical Modeling Tools (2016, to appear)","DOI":"10.1007\/s10009-017-0453-6"},{"key":"3_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-54415-1_54","volume-title":"Theoretical Aspects of Computer Software","author":"B Steffen","year":"1991","unstructured":"Steffen, B.: Data flow analysis as model checking. In: Ito, T., Meyer, A.R. (eds.) TACS 1991. LNCS, vol. 526, pp. 346\u2013364. Springer, Heidelberg (1991). doi: 10.1007\/3-540-54415-1_54"},{"issue":"2","key":"3_CR41","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/0167-6423(93)90003-8","volume":"21","author":"B Steffen","year":"1993","unstructured":"Steffen, B.: Generating data flow analysis algorithms from modal specifications. Sci. Comput. Program. 21(2), 115\u2013139 (1993)","journal-title":"Sci. Comput. Program."},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Windm\u00fcller, S., Neubauer, J., Steffen, B., Howar, F., Bauer, O.: Active continuous quality control. In: 16th International ACM SIGSOFT Symposium on Component-Based Software Engineering, CBSE 2013, pp. 111\u2013120. ACM SIGSOFT, New York (2013)","DOI":"10.1145\/2465449.2465469"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Isberner, M., Howar, F., Steffen, B.: The open-source LearnLib: a framework for active automata learning. In: CAV 2015 (2015)","DOI":"10.1007\/978-3-319-21690-4_32"},{"key":"3_CR44","unstructured":"Object Management Group (OMG): Documents Associated with BPMN Version 2.0.1 (2013). http:\/\/www.omg.org\/spec\/BPMN\/2.0.1\/ . Accessed 09 September 2015"},{"key":"3_CR45","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03241-1","volume-title":"Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use","author":"K Jensen","year":"1996","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, vol. 1, 2nd edn. Springer, Heidelberg (1996)","edition":"2"},{"key":"3_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/11596141_34","volume-title":"Service-Oriented Computing - ICSOC 2005","author":"T Margaria","year":"2005","unstructured":"Margaria, T., Steffen, B., Reitenspie\u00df, M.: Service-oriented design: the roots. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 450\u2013464. Springer, Heidelberg (2005). doi: 10.1007\/11596141_34"},{"key":"3_CR47","volume-title":"SOA: Principles of Service Design","author":"T Erl","year":"2007","unstructured":"Erl, T.: SOA: Principles of Service Design. Prentice Hall, Upper Saddle River (2007)"},{"key":"3_CR48","unstructured":"H\u00fcrsch, W.L., Lopes, C.V.: Separation of concerns. Technical Report NU-CCS-95-03, Northeastern University, Boston, MA, February 1995"},{"key":"3_CR49","unstructured":"JetBrains: Meta Programming System. https:\/\/www.jetbrains.com\/mps\/ . Accessed 07 April 2016"},{"key":"3_CR50","volume-title":"Eclipse Modeling Project: A Domain-Specific Language (DSL) Toolkit","author":"RC Gronback","year":"2008","unstructured":"Gronback, R.C.: Eclipse Modeling Project: A Domain-Specific Language (DSL) Toolkit. Addison-Wesley, Boston (2008)"},{"key":"3_CR51","volume-title":"EMF: Eclipse Modeling Framework","author":"D Steinberg","year":"2008","unstructured":"Steinberg, D., Budinsky, F., Paternostro, M., Merks, E.: EMF: Eclipse Modeling Framework, 2nd edn. Addison-Wesley, Boston (2008)","edition":"2"},{"key":"3_CR52","unstructured":"Eclipse Modeing Framework. http:\/\/www.eclipse.org\/modeling\/emf\/"},{"key":"3_CR53","unstructured":"Kolovos, D., Rose, L., Garc\u00eda-Dom\u00ednguez, A., Paige, R.: The Epsilon Book (2015). http:\/\/eclipse.org\/epsilon\/doc\/book\/ . Accessed 4 February 2015"},{"key":"3_CR54","unstructured":"Epsilon. www.eclipse.org\/epsilon\/ . Accessed 21 May 2014"},{"key":"3_CR55","unstructured":"Epsilon EuGENia. http:\/\/www.eclipse.org\/epsilon\/doc\/eugenia\/ . Accessed 21 May 2014"},{"key":"3_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-16145-2_15","volume-title":"Model Driven Engineering Languages and Systems","author":"DS Kolovos","year":"2010","unstructured":"Kolovos, D.S., Rose, L.M., Abid, S.B., Paige, R.F., Polack, F.A.C., Botterweck, G.: Taming EMF and GMF using model transformation. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010. LNCS, vol. 6394, pp. 211\u2013225. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16145-2_15"},{"key":"3_CR57","unstructured":"Spray - a quick way of creating Graphiti. http:\/\/code.google.com\/a\/eclipselabs.org\/p\/spray\/ . Accessed 23 April 20014"},{"key":"3_CR58","unstructured":"Eclipse Sirius. http:\/\/www.eclipse.org\/sirius\/ . Accessed 07 November 2014"},{"issue":"4","key":"3_CR59","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1109\/TSE.2012.33","volume":"39","author":"J Grundy","year":"2013","unstructured":"Grundy, J., Hosking, J., Li, K.N., Ali, N.M., Huh, J., Li, R.L.: Generating domain-specific visual language tools from abstract visual specifications. IEEE Trans. Softw. Eng. 39(4), 487\u2013515 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3_CR60","unstructured":"Marama. https:\/\/wiki.auckland.ac.nz\/display\/csidst\/Welcome . Accessed 23 April 2014"},{"key":"3_CR61","unstructured":"Zhu, N., Grundy, J., Hosking, J.: Pounamu: a meta-tool for multi-view visual language environment construction. In: 2004 IEEE Symposium on Visual Languages and Human Centric Computing (2004)"},{"key":"3_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-61292-0_1","volume-title":"Advanced Information Systems Engineering","author":"S Kelly","year":"1996","unstructured":"Kelly, S., Lyytinen, K., Rossi, M.: MetaEdit+ a fully configurable multi-user and multi-tool CASE and CAME environment. In: Constantopoulos, P., Mylopoulos, J., Vassiliou, Y. (eds.) CAiSE 1996. LNCS, vol. 1080, pp. 1\u201321. Springer, Heidelberg (1996). doi: 10.1007\/3-540-61292-0_1"},{"key":"3_CR63","unstructured":"MetaCase Website. http:\/\/www.metacase.com\/ . Accessed 08 July 2015"},{"key":"3_CR64","doi-asserted-by":"crossref","DOI":"10.1002\/9780470249260","volume-title":"Domain-Specific Modeling: Enabling Full Code Generation","author":"S Kelly","year":"2008","unstructured":"Kelly, S., Tolvanen, J.P.: Domain-Specific Modeling: Enabling Full Code Generation. Wiley-IEEE Computer Society Press, Hoboken (2008)"},{"key":"3_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/BFb0026439","volume-title":"Compiler Construction","author":"U Kastens","year":"1998","unstructured":"Kastens, U., Pfahler, P., Jung, M.: The Eli system. In: Koskimies, K. (ed.) CC 1998. LNCS, vol. 1383, pp. 294\u2013297. Springer, Heidelberg (1998). doi: 10.1007\/BFb0026439"},{"key":"3_CR66","unstructured":"Schmidt, C., Cramer, B., Kastens, U.: Generating visual structure editors from high-level specifications. Technical report, University of Paderborn, Germany (2008)"},{"key":"3_CR67","doi-asserted-by":"crossref","unstructured":"Naujokat, S., Neubauer, J., Margaria, T., Steffen, B.: Meta-level reuse for mastering domain specialization. In: Proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2016) (2016)","DOI":"10.1007\/978-3-319-47169-3_16"}],"container-title":["Lecture Notes in Computer Science","Transactions on Foundations for Mastering Change I"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46508-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T05:33:00Z","timestamp":1601098380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46508-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319465074","9783319465081"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46508-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}