{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:47:04Z","timestamp":1772113624801,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10270-018-0679-0","type":"journal-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T06:11:16Z","timestamp":1526537476000},"page":"2507-2530","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Using language workbenches and domain-specific languages for safety-critical software development"],"prefix":"10.1007","volume":"18","author":[{"given":"Markus","family":"Voelter","sequence":"first","affiliation":[]},{"given":"Bernd","family":"Kolb","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Birken","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Tomassetti","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Alff","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Wiart","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Wortmann","sequence":"additional","affiliation":[]},{"given":"Arne","family":"Nordmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"issue":"3","key":"679_CR1","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.5381\/jot.2015.14.3.a1","volume":"14","author":"M Amrani","year":"2015","unstructured":"Amrani, M., Combemale, B., Lucio, L., Selim, G.M.K., Dingel, J., Traon, Y.L., Vangheluwe, H., Cordy, J.R.: Formal verification techniques for model transformations: a tridimensional classification. J. Object Technol. 14(3), 1:1\u201343 (2015). https:\/\/doi.org\/10.5381\/jot.2015.14.3.a1","journal-title":"J. Object Technol."},{"issue":"1","key":"679_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2005.23","volume":"3","author":"B Arkin","year":"2005","unstructured":"Arkin, B., Stender, S., McGraw, G.: Software penetration testing. IEEE Secur. Priv. 3(1), 84\u201387 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"679_CR3","doi-asserted-by":"crossref","unstructured":"Beine, M., Otterbach, R., Jungmann, M.: Development of safety-critical software using automatic code generation. Technical Report, SAE Technical Paper (2004)","DOI":"10.4271\/2004-01-0708"},{"key":"679_CR4","volume-title":"Implementing Domain-Specific Languages with Xtext and Xtend","author":"L Bettini","year":"2016","unstructured":"Bettini, L.: Implementing Domain-Specific Languages with Xtext and Xtend. Packt Publishing Ltd, Birmingham (2016)"},{"key":"679_CR5","volume-title":"Software Engineering Economics","author":"BW Boehm","year":"1981","unstructured":"Boehm, B.W., et al.: Software Engineering Economics, vol. 197. Prentice-hall, Englewood Cliffs (1981)"},{"key":"679_CR6","doi-asserted-by":"publisher","unstructured":"Broy, M., Kirstan, S., Krcmar, H., Sch\u00e4tz, B., Zimmermann, J.: What is the benefit of a model-based design of embedded software systems in the car industry? Softw Des Dev Concepts Methodol Tools Appl Concepts Methodol Tools Appl, p.310 (2013). https:\/\/doi.org\/10.4018\/978-1-4666-4301-7.ch017","DOI":"10.4018\/978-1-4666-4301-7.ch017"},{"issue":"5","key":"679_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/52.536456","volume":"13","author":"T Bruckhaus","year":"1996","unstructured":"Bruckhaus, T., Madhavii, N., Janssen, I., Henshaw, J.: The impact of tools on software productivity. IEEE Softw. 13(5), 29\u201338 (1996)","journal-title":"IEEE Softw."},{"key":"679_CR8","doi-asserted-by":"crossref","unstructured":"Buckl, C., Regensburger, M., Knoll, A., Schrott, G.: Models for automatic generation of safety-critical real-time systems. In: ARES 2007 Conference. IEEE (2007)","DOI":"10.1109\/ARES.2007.106"},{"key":"679_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1707801.1706312","volume":"45","author":"A Chlipala","year":"2010","unstructured":"Chlipala, A.: A verified compiler for an impure functional language. ACM SIGPLAN Not. 45, 93\u2013106 (2010)","journal-title":"ACM SIGPLAN Not."},{"issue":"4","key":"679_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1988042.1988046","volume":"46","author":"K Claessen","year":"2011","unstructured":"Claessen, K., Hughes, J.: Quickcheck: a lightweight tool for random testing of haskell programs. Acm SIGPLAN Not. 46(4), 53\u201364 (2011)","journal-title":"Acm SIGPLAN Not."},{"key":"679_CR11","doi-asserted-by":"crossref","unstructured":"Conmy, P., Paige, R.F.: Challenges when using model driven architecture in the development of safety critical software. In: 4th Intl. Workshop on Model-Based Methodologies for Pervasive and Embedded Software. IEEE (2007)","DOI":"10.1109\/MOMPES.2007.4"},{"key":"679_CR12","doi-asserted-by":"crossref","unstructured":"Conrad, M.: Verification and validation according to iso 26262: a workflow to facilitate the development of high-integrity software. In: ERTS2 Conference 2012","DOI":"10.4271\/2011-01-1005"},{"key":"679_CR13","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Min\u00e9, A., Monniaux, D., Rival, X.: The astr\u00e9e analyzer. In: Esop, vol.\u00a05, pp. 21\u201330. Springer (2005)","DOI":"10.1007\/978-3-540-31987-0_3"},{"key":"679_CR14","doi-asserted-by":"crossref","unstructured":"Cuoq, P., Kirchner, F., Kosmatov, N., Prevosto, V., Signoles, J., Yakobowski, B.: Frama-c. In: International Conference on Software Engineering and Formal Methods. Springer (2012)","DOI":"10.1007\/978-3-642-33826-7_16"},{"key":"679_CR15","doi-asserted-by":"crossref","unstructured":"Dahlweid, M., Moskal, M., Santen, T., Tobies, S., Schulte, W.: Vcc: Contract-based modular verification of concurrent c. In: ICSE Companion (2009)","DOI":"10.1109\/ICSE-COMPANION.2009.5071046"},{"key":"679_CR16","unstructured":"Dormoy, F.-X.: Scade 6: a model based solution for safety critical software development. In: Proceedings of the 4th European Congress on Embedded Real Time Software (ERTS\u201908), pp. 1\u20139 (2008)"},{"key":"679_CR17","doi-asserted-by":"crossref","unstructured":"Erdweg, S., Van Der\u00a0Storm, T., V\u00f6lter, M., Boersma, M., Bosman, R., Cook, W.\u00a0R., Gerritsen, A., Hulshout, A., Kelly, S., Loh, A., et\u00a0al.: The state of the art in language workbenches. In: International Conference on Software Language Engineering, pp. 197\u2013217. Springer (2013)","DOI":"10.1007\/978-3-319-02654-1_11"},{"key":"679_CR18","unstructured":"Eysholdt, M.: Executable specifications for xtext. Website (2014). http:\/\/www.xpect-tests.org\/"},{"key":"679_CR19","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/2936314.2814221","volume":"51","author":"SP Florence","year":"2015","unstructured":"Florence, S.P., Fetscher, B., Flatt, M., Temps, W.H., Kiguradze, T., West, D.P., Niznik, C., Yarnold, P.R., Findler, R.B., Belknap, S.M.: Pop-pl: a patient-oriented prescription programming language. ACM SIGPLAN Not. 51, 131\u2013140 (2015)","journal-title":"ACM SIGPLAN Not."},{"key":"679_CR20","doi-asserted-by":"crossref","unstructured":"G\u00f6rke, S., Riebeling, R., Kraus, F., Reichel, R.: Flexible platform approach for fly-by-wire systems. In: 2013 IEEE\/AIAA Digital Avionics Systems Conference. IEEE (2013)","DOI":"10.1109\/DASC.2013.6712542"},{"key":"679_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/S1367-5788(03)00005-1","author":"WA Halang","year":"2003","unstructured":"Halang, W.A., Zalewski, J.: Programming languages for use in safety-related applications. Ann. Rev. Control (2003). https:\/\/doi.org\/10.1016\/S1367-5788(03)00005-1","journal-title":"Ann. Rev. Control"},{"key":"679_CR22","volume-title":"Patterns for Fault Tolerant Software","author":"R Hanmer","year":"2013","unstructured":"Hanmer, R.: Patterns for Fault Tolerant Software. Wiley, Hoboken (2013)"},{"key":"679_CR23","unstructured":"Hart, B.: Sdr security threats in an open source world. In: Software Defined Radio Conference, pp. 3\u20135 (2004)"},{"key":"679_CR24","unstructured":"Haxthausen, A.E., Peleska, J.: A domain specific language for railway control systems. In: Proc. of the 6th biennial world conference on integrated design and process technology (2002)"},{"key":"679_CR25","doi-asserted-by":"crossref","unstructured":"Hermans, F., Pinzger, M., Van\u00a0Deursen, A.: Domain-specific languages in practice: a user study on the success factors. In: International Conference on Model Driven Engineering Languages and Systems, pp. 423\u2013437. Springer (2009)","DOI":"10.1007\/978-3-642-04425-0_33"},{"key":"679_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/2692915.2628146","volume":"49","author":"PC Hickey","year":"2014","unstructured":"Hickey, P.C., Pike, L., Elliott, T., Bielman, J., Launchbury, J.: Building embedded systems with embedded dsls. ACM SIGPLAN Not. 49, 3\u20139 (2014)","journal-title":"ACM SIGPLAN Not."},{"key":"679_CR27","volume-title":"Spin Model Checker, the: Primer and Reference Manual","author":"G Holzmann","year":"2003","unstructured":"Holzmann, G.: Spin Model Checker, the: Primer and Reference Manual. Addison-Wesley Professional, Boston (2003)"},{"key":"679_CR28","doi-asserted-by":"crossref","unstructured":"Huang, W.-l., Peleska, J.: Exhaustive model-based equivalence class testing. In: IFIP International Conference on Testing Software and Systems, pp. 49\u201364. Springer (2013)","DOI":"10.1007\/978-3-642-41707-8_4"},{"key":"679_CR29","doi-asserted-by":"crossref","unstructured":"K\u00e4rn\u00e4, J., Tolvanen, J.-P., Kelly, S.: Evaluating the use of domain-specific modeling in practice. In: Proceedings of the 9th OOPSLA Workshop on Domain-Specific Modeling (2009)","DOI":"10.1145\/1639950.1639975"},{"key":"679_CR30","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/2076021.2048080","volume":"46","author":"LC Kats","year":"2011","unstructured":"Kats, L.C., Vermaas, R., Visser, E.: Integrated language definition testing: enabling test-driven language development. ACM SIGPLAN Not. 46, 139\u2013154 (2011)","journal-title":"ACM SIGPLAN Not."},{"key":"679_CR31","doi-asserted-by":"crossref","unstructured":"Kieburtz, R.\u00a0B., McKinney, L., Bell, J.\u00a0M., Hook, J., Kotov, A., Lewis, J., Oliva, D.\u00a0P., Sheard, T., Smith, I., Walton, L.: A software engineering experiment in software component generation. In: Proceedings of the 18th International Conference on Software Engineering, pp. 542\u2013552. IEEE Computer Society (1996)","DOI":"10.1109\/ICSE.1996.493448"},{"key":"679_CR32","unstructured":"Koopman, P.: Embedded Software Costs 15\u201340 per line of code (Update: 25\u201350). http:\/\/bit.ly\/29QHOlo (URL too long)"},{"key":"679_CR33","doi-asserted-by":"crossref","unstructured":"Koopman, P.: Risk areas in embedded software industry projects. In: 2010 Workshop on Embedded Systems Education. ACM (2010)","DOI":"10.1145\/1930277.1930282"},{"issue":"3","key":"679_CR34","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/s10664-011-9172-x","volume":"17","author":"T Kosar","year":"2012","unstructured":"Kosar, T., Mernik, M., Carver, J.C.: Program comprehension of domain-specific and general-purpose languages: comparison using a family of experiments. Empir. Softw. Eng. 17(3), 276\u2013304 (2012)","journal-title":"Empir. Softw. Eng."},{"key":"679_CR35","doi-asserted-by":"crossref","unstructured":"Kroening, D., Tautschnig, M.: Cbmc\u2013c bounded model checker. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 389\u2013391. Springer (2014)","DOI":"10.1007\/978-3-642-54862-8_26"},{"key":"679_CR36","doi-asserted-by":"crossref","unstructured":"Kuhn, A., Murphy, G.C., Thompson, C.A.: An exploratory study of forces and frictions affecting large-scale model-driven development. In: International Conference on Model Driven Engineering Languages and Systems, pp. 352\u2013367. Springer (2012)","DOI":"10.1007\/978-3-642-33666-9_23"},{"key":"679_CR37","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/2578855.2535841","volume":"49","author":"R Kumar","year":"2014","unstructured":"Kumar, R., Myreen, M.O., Norrish, M., Owens, S.: Cakeml: a verified implementation of ml. ACM SIGPLAN Not. 49, 179\u2013191 (2014)","journal-title":"ACM SIGPLAN Not."},{"key":"679_CR38","doi-asserted-by":"crossref","unstructured":"L\u00e4mmel, R.: Grammar testing. In: Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering (2001)","DOI":"10.1007\/3-540-45314-8_15"},{"key":"679_CR39","unstructured":"Ledinot, E., Astruc, J.-M., Blanquart, J.-P., Baufreton, P., Boulanger, J.-L., Delseny, H., Gassino, J., Ladier, G., Leeman, M., Machrouh, J., et\u00a0al.: A cross-domain comparison of software development assurance standards. In: Proc. of ERTS 2012"},{"issue":"7","key":"679_CR40","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1538788.1538814","volume":"52","author":"X Leroy","year":"2009","unstructured":"Leroy, X.: Formal verification of a realistic compiler. Commun. ACM 52(7), 107\u2013115 (2009)","journal-title":"Commun. ACM"},{"key":"679_CR41","doi-asserted-by":"crossref","unstructured":"Lewis, J.: Cryptol: specification, implementation and verification of high-grade cryptographic applications. In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, pp. 41\u201341. ACM (2007)","DOI":"10.1145\/1314436.1314442"},{"key":"679_CR42","doi-asserted-by":"crossref","unstructured":"Liebel, G., Marko, N., Tichy, M., Leitner, A., Hansson, J.: Assessing the state-of-practice of model-based engineering in the embedded systems domain. In: International Conference on Model Driven Engineering Languages and Systems, pp. 166\u2013182. Springer (2014)","DOI":"10.1007\/978-3-319-11653-2_11"},{"issue":"3","key":"679_CR43","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MS.2009.80","volume":"26","author":"P Liggesmeyer","year":"2009","unstructured":"Liggesmeyer, P., Trapp, M.: Trends in embedded software engineering. IEEE Softw. 26(3), 19\u201325 (2009)","journal-title":"IEEE Softw."},{"key":"679_CR44","doi-asserted-by":"crossref","unstructured":"L\u00facio, L., Barroca, B., Amaral, V.: A technique for automatic validation of model transformations. In: MODELS 2010. Springer (2010)","DOI":"10.1007\/978-3-642-16145-2_10"},{"key":"679_CR45","unstructured":"M\u00e9ry, D., Sch\u00e4tz, B., Wassyng, A.: The pacemaker challenge: developing certifiable medical devices (dagstuhl seminar 14062). In: Dagstuhl Reports, vol.\u00a04. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2014)"},{"key":"679_CR46","doi-asserted-by":"crossref","unstructured":"Michailidis, A., Spieth, U., Ringler, T., Hedenetz, B., Kowalewski, S.: Test front loading in early stages of automotive software development based on autosar. In: DATE 2010. IEEE","DOI":"10.1109\/DATE.2010.5457166"},{"key":"679_CR47","unstructured":"Motor Industry Software Reliability Association and Motor Industry Software Reliability Association staff: MISRA C: 2012: Guidelines for the Use of the C Language in Critical Systems. Motor Industry Research Association (2013)"},{"key":"679_CR48","doi-asserted-by":"crossref","unstructured":"Molotnikov, Z., V\u00f6lter, M., Ratiu, D.: Automated domain-specific c verification with mbeddr. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, pp. 539\u2013550. ACM (2014)","DOI":"10.1145\/2642937.2642938"},{"key":"679_CR49","unstructured":"Munier, P.: Polyspace\u00ae. Industrial Use of Formal Methods: Formal Verification, pp. 123\u2013153 (2012). https:\/\/www.mathworks.com\/products\/polyspace.html . Accessed 10 Apr 2018"},{"key":"679_CR50","volume-title":"Software Reliability","author":"G\u00a0J Myers","year":"1976","unstructured":"Myers, G\u00a0.J.: Software Reliability. Wiley, Hoboken (1976)"},{"issue":"9","key":"679_CR51","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1145\/359588.359602","volume":"21","author":"GJ Myers","year":"1978","unstructured":"Myers, G.J.: A controlled experiment in program testing and code walkthroughs\/inspections. Commun. ACM 21(9), 760\u2013768 (1978)","journal-title":"Commun. ACM"},{"key":"679_CR52","doi-asserted-by":"crossref","unstructured":"Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.: Automatically hardening web applications using precise tainting. In: IFIP International Information Security Conference. Springer, (2005)","DOI":"10.21236\/ADA436667"},{"issue":"4s","key":"679_CR53","first-page":"127","volume":"13","author":"M Pajic","year":"2014","unstructured":"Pajic, M., Jiang, Z., Lee, I., Sokolsky, O., Mangharam, R.: Safety-critical medical device development using the upp2sf model translation tool. ACM Trans. Embed. Comput. Syst. (TECS) 13(4s), 127 (2014)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"679_CR54","doi-asserted-by":"crossref","unstructured":"Ratiu, D., Voelter, M.: Automated testing of DSL implementations. In: 11th IEEE\/ACM International Workshop on Automation of Software Test (AST 2016) (2016)","DOI":"10.1145\/2896921.2896922"},{"key":"679_CR55","doi-asserted-by":"crossref","unstructured":"Ratiu, D., Schaetz, B., Voelter, M., Kolb, B.: Language engineering as an enabler for incrementally defined formal analyses. In: Proceedings of the First International Workshop on Formal Methods in Software Engineering: Rigorous and Agile Approaches, pp. 9\u201315. IEEE Press (2012)","DOI":"10.1109\/FormSERA.2012.6229790"},{"key":"679_CR56","doi-asserted-by":"crossref","unstructured":"Ratiu, D., Zeller, M., Killian, L.: Safety.lab: model-based domain specific tooling for safety argumentation. In: International Conference on Computer Safety, Reliability, and Security, pp. 72\u201382. Springer (2014)","DOI":"10.1007\/978-3-319-24249-1_7"},{"key":"679_CR57","doi-asserted-by":"crossref","unstructured":"R\u00e9veill\u00e8re, L., M\u00e9rillon, F., Consel, C., Marlet, R., Muller, G.: A dsl approach to improve productivity and safety in device drivers development. In: ASE 2000. IEEE","DOI":"10.1109\/ASE.2000.873655"},{"key":"679_CR58","doi-asserted-by":"crossref","unstructured":"Santhanam, V.: The anatomy of an faa-qualifiable ada subset compiler. In: ACM SIGAda Ada Letters, vol.\u00a023, pp. 40\u201343. ACM (2002)","DOI":"10.1145\/1066404.589460"},{"key":"679_CR59","doi-asserted-by":"crossref","unstructured":"Svendsen, A., Olsen, G.\u00a0K., Endresen, J., Moen, T., Carlson, E., Alme, K.-J., Haugen, \u00d8.: The future of train signaling. In: International Conference on Model Driven Engineering Languages and Systems, pp. 128\u2013142. Springer (2008)","DOI":"10.1007\/978-3-540-87875-9_9"},{"key":"679_CR60","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.procs.2015.08.382","volume":"63","author":"J-P Tolvanen","year":"2015","unstructured":"Tolvanen, J.-P., Djuki\u0107, V., Popovic, A.: Metamodeling for medical devices: code generation, model-debugging and run-time synchronization. Procedia Comput. Sci. 63, 539\u2013544 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"6","key":"679_CR61","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/352029.352035","volume":"35","author":"A Deursen Van","year":"2000","unstructured":"Van Deursen, A., Klint, P., Visser, J.: Domain-specific languages: an annotated bibliography. ACM SIGPLAN Not. 35(6), 26\u201336 (2000)","journal-title":"ACM SIGPLAN Not."},{"key":"679_CR62","unstructured":"Vergu, V., Neron, P., Visser, E.: Dynsem: A dsl for dynamic semantics specification. Technical Report, Delft University of Technology, Software Engineering Research Group (2015)"},{"key":"679_CR63","doi-asserted-by":"crossref","unstructured":"Visser, E., Wachsmuth, G., Tolmach, A., Neron, P., Vergu, V., Passalaqua, A., Konat, G.: A language designer\u2019s workbench: a one-stop-shop for implementation and verification of language designs. In: Proc. of the 2014 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software. ACM (2014)","DOI":"10.1145\/2661136.2661149"},{"key":"679_CR64","doi-asserted-by":"crossref","unstructured":"Voelter, M.: Language and ide modularization and composition with mps. In: Generative and Transformational Techniques in Software Engineering IV, pp. 383\u2013430. Springer (2013)","DOI":"10.1007\/978-3-642-35992-7_11"},{"key":"679_CR65","volume-title":"Generic Tools, Specific Languages","author":"M Voelter","year":"2014","unstructured":"Voelter, M.: Generic Tools, Specific Languages. TU Delft Delft University of Technology, Delft (2014)"},{"key":"679_CR66","unstructured":"Voelter, M., Lisson, S.: Supporting diverse notations in MPS\u2019 Projectional Editor. GEMOC Workshop"},{"key":"679_CR67","doi-asserted-by":"crossref","unstructured":"Voelter, M., Molotnikov, Z., Kolb, B.: Towards improving software security using language engineering and mbeddr c. In: Proceeding of the Workshop on Domain-Specific Modeling 2015, pp. 55\u201362. Pittsburgh, PA, USA, 27\u201327 October 2015","DOI":"10.1145\/2846696.2846698"},{"issue":"3","key":"679_CR68","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s10515-013-0120-4","volume":"20","author":"M Voelter","year":"2013","unstructured":"Voelter, M., Ratiu, D., Kolb, B., Schaetz, B.: mbeddr: Instantiating a language workbench in the embedded software domain. Autom. Softw. Eng. 20(3), 339\u2013390 (2013)","journal-title":"Autom. Softw. Eng."},{"key":"679_CR69","unstructured":"Voelter, M., Ratiu, D., Tomassetti, F.: Requirements as first-class citizens: integrating requirements closely with implementation artifacts. In: ACESMB@ MoDELS (2013)"},{"key":"679_CR70","doi-asserted-by":"crossref","unstructured":"Voelter, M., Deursen, A.\u00a0v., Kolb, B., Eberle, S.: Using C language extensions for developing embedded software: a case study In: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 655\u2013674, Pittsburgh, PA, USA, 25\u201330 October 2015","DOI":"10.1145\/2858965.2814276"},{"key":"679_CR71","doi-asserted-by":"crossref","unstructured":"Voelter, M., van Deursen, A., Kolb, B., Eberle, S.: Using c language extensions for developing embedded software: a case study. In: OOPSLA 2015 (2015)","DOI":"10.1145\/2814270.2814276"},{"key":"679_CR72","doi-asserted-by":"publisher","unstructured":"Voelter, M., Kolb, B., Szab\u00f3, T., Ratiu, D., van Deursen, A.: Lessons learned from developing mbeddr: a case study in language engineering with mps. Softw. Syst. Model., pp. 1\u201346 (2017). https:\/\/doi.org\/10.1007\/s10270-016-0575-4","DOI":"10.1007\/s10270-016-0575-4"},{"key":"679_CR73","unstructured":"Voelter, M., Szab\u00d3, T., Engelmann, B.: An Overview of Program Analysis using Formal Methods. Self-published (2017). http:\/\/voelter.de\/data\/books\/introToFormalMethodsAndDSLs-1.0.pdf"},{"issue":"3","key":"679_CR74","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.entcs.2005.02.051","volume":"141","author":"M Wallace","year":"2005","unstructured":"Wallace, M.: Modular architectural representation and analysis of fault propagation and transformation. Electron. Notes Theor. Comput. Sci. 141(3), 53\u201371 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"2","key":"679_CR75","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MS.1985.230356","volume":"2","author":"M Weiser","year":"1985","unstructured":"Weiser, M., Gannon, J.D., McMullin, P.R.: Comparison of structural test coverage metrics. IEEE Softw. 2(2), 80 (1985)","journal-title":"IEEE Softw."},{"key":"679_CR76","unstructured":"Whalen, M.W., Heimdahl, M.P.E.: An approach to automatic code generation for safety-critical systems. In: 14th IEEE International Conference on Automated Software Engineering, 1999, pp 315\u2013318. IEEE (1999)"},{"issue":"3","key":"679_CR77","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1118178.1118215","volume":"49","author":"JM Wing","year":"2006","unstructured":"Wing, J.M.: Computational thinking. Commun. ACM 49(3), 33\u201335 (2006)","journal-title":"Commun. ACM"},{"key":"679_CR78","unstructured":"Wortmann, A., Beet, M.: Domain specific languages for efficient satellite control software development. In: DASIA 2016, vol 736 (2016)"},{"key":"679_CR79","unstructured":"Wu, H., Gray, J.G., Mernik, M.: Unit testing for domain-specific languages. In: Domain-Specific Languages, IFIP TC 2 Working Conference, DSL 2009, Oxford, UK, July 15-17, 2009, Proceedings, pp. 125\u2013147 (2009)"}],"container-title":["Software &amp; Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-018-0679-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-018-0679-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-018-0679-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T15:52:09Z","timestamp":1751644329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-018-0679-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"references-count":79,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["679"],"URL":"https:\/\/doi.org\/10.1007\/s10270-018-0679-0","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,17]]},"assertion":[{"value":"6 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}