{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T15:14:41Z","timestamp":1773501281789,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3180155.3180258","type":"proceedings-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:16:01Z","timestamp":1528805761000},"page":"716-727","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Multi-granular conflict and dependency analysis in software engineering based on graph transformation"],"prefix":"10.1145","author":[{"given":"Leen","family":"Lambers","sequence":"first","affiliation":[{"name":"Hasso-Plattner-Institut Potsdam, Germany"}]},{"given":"Daniel","family":"Str\u00fcber","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Koblenz-Landau, Germany"}]},{"given":"Gabriele","family":"Taentzer","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Marburg, Germany"}]},{"given":"Kristopher","family":"Born","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Marburg, Germany"}]},{"given":"Jevgenij","family":"Huebert","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Marburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"104","article-title":"Extracting Visual Contracts from Java Programs (T)","author":"Alshanqiti A.","year":"2015","unstructured":"A. Alshanqiti and R. Heckel, \"Extracting Visual Contracts from Java Programs (T),\" in ASE, 2015, pp. 104--114.","journal-title":"ASE"},{"key":"e_1_3_2_1_2_1","first-page":"6939","article-title":"Detection of syntactic aspect interaction in UML state diagrams using critical pair analysis in graph transformation","volume":"1312","author":"Altahat Z.","year":"2013","unstructured":"Z. Altahat, T. Elrad, L. Tahat, and N. Almasri, \"Detection of syntactic aspect interaction in UML state diagrams using critical pair analysis in graph transformation,\" CoRR, vol. abs\/1312.6939, 2013.","journal-title":"CoRR"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926458.1926471"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_5_1","first-page":"160","volume-title":"Memory of Hartmut Ehrig","author":"Azzi G. G.","year":"2018","unstructured":"G. G. Azzi, J. S. Bezerra, L. Ribeiro, A. Costa, L. M. Rodrigues, and R. Machado, \"The Verigraph System for Graph Transformation,\" in Graph Transformation, Specifications, and Nets. In Memory of Hartmut Ehrig. Springer, 2018, pp. 160--178."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776656.1776673"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134297"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337273"},{"key":"e_1_3_2_1_9_1","volume-title":"Recognizable graph languages for checking invariants,\" ECEASST","author":"Blume C.","year":"2010","unstructured":"C. Blume, H. J. S. Bruggink, and B. K\u00f6nig, \"Recognizable graph languages for checking invariants,\" ECEASST, vol. 29, 2010."},{"key":"e_1_3_2_1_10_1","first-page":"125","article-title":"Granularity of conflicts and dependencies in graph transformation systems","author":"Born K.","year":"2017","unstructured":"K. Born, L. Lambers, D. Str\u00fcber, and G. Taentzer, \"Granularity of conflicts and dependencies in graph transformation systems,\" in ICGT, 2017, pp. 125--141.","journal-title":"ICGT"},{"key":"e_1_3_2_1_11_1","first-page":"118","article-title":"An algorithm for the critical pair analysis of amalgamated graph transformations","author":"Born K.","year":"2016","unstructured":"K. Born and G. Taentzer, \"An algorithm for the critical pair analysis of amalgamated graph transformations,\" in ICGT, 2016, pp. 118--134.","journal-title":"ICGT"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/832281.834589"},{"key":"e_1_3_2_1_13_1","first-page":"181","article-title":"Self-repairing systems modeling and verification using AGG","author":"Bucchiarone A.","year":"2009","unstructured":"A. Bucchiarone, P. Pelliccione, C. Vattani, and O. Runge, \"Self-repairing systems modeling and verification using AGG,\" in WICSA\/ECSA, 2009, pp. 181--190.","journal-title":"WICSA\/ECSA"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647769.734089"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0239-y"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1927806.1927815"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1121741"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/320647"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2385016.2385019"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987434.1987451"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-011-0186-x"},{"key":"e_1_3_2_1_22_1","first-page":"977","volume-title":"Nonparametric statistical inference,\" in International encyclopedia of statistical science","author":"Gibbons J. D.","year":"2011","unstructured":"J. D. Gibbons and S. Chakraborti, \"Nonparametric statistical inference,\" in International encyclopedia of statistical science. Springer, 2011, pp. 977--979."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0247-y"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872088402600504"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1552068.1552070"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581355"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/647562.730804"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996844"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866272.1866277"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1928162.1928177"},{"key":"e_1_3_2_1_31_1","first-page":"174","volume-title":"Eds.","author":"Hildebrandt S.","year":"2013","unstructured":"S. Hildebrandt, L. Lambers, and H. Giese, \"Complete specification coverage in automatically generated conformance test cases for tgg implementations,\" in ICMT, K. Duddy and G. Kappel, Eds., 2013, pp. 174--188."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505149"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2394101.2394116"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1201\/b17537"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693079"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02059-9_5"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11691372_13"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.10.006"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02674-4_12"},{"key":"e_1_3_2_1_40_1","first-page":"105","volume-title":"Memory of Hartmut Ehrig","author":"Lambers L.","year":"2018","unstructured":"L. Lambers, K. Born, F. Orejas, D. Str\u00fcber, and G. Taentzer, \"Initial conflicts and dependencies: Critical pairs revisited,\" in Graph Transformation, Specifications, and Nets. In Memory of Hartmut Ehrig. Springer, 2018, pp. 105--123."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321707"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.04.026"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180258"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89020-1_4"},{"key":"e_1_3_2_1_45_1","first-page":"243","volume-title":"Eds. Springer","author":"Mehner-Heindl K.","year":"2013","unstructured":"K. Mehner-Heindl, M. Monga, and G. Taentzer, \"Analysis of Aspect-Oriented Models Using Graph Transformation Systems,\" in Aspect-Oriented Requirements Engineering, A. Moreira, R. Chitchyan, J. Ara\u00fajo, and A. Rashid, Eds. Springer, 2013, pp. 243--270."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-006-0044-6"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11880240_15"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/645723.666702"},{"key":"e_1_3_2_1_49_1","first-page":"33","article-title":"Verifying monadic second-order properties of graph programs","author":"Poskitt C. M.","year":"2014","unstructured":"C. M. Poskitt and D. Plump, \"Verifying monadic second-order properties of graph programs,\" in ICGT, 2014, pp. 33--48.","journal-title":"ICGT"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSBSE.2009.27"},{"key":"e_1_3_2_1_51_1","first-page":"226","article-title":"Model checking graph transformations: A comparison of two approaches","author":"Rensink A.","year":"2004","unstructured":"A. Rensink, \u00c1. Schmidt, and D. Varr\u00f3, \"Model checking graph transformations: A comparison of two approaches,\" in ICGT, 2004, pp. 226--241.","journal-title":"ICGT"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/647170.718289"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/278918"},{"key":"e_1_3_2_1_54_1","volume-title":"Test case generation using visual contracts,\" ECEASST","author":"Runge O.","year":"2013","unstructured":"O. Runge, T. A. Khan, and R. Heckel, \"Test case generation using visual contracts,\" ECEASST, vol. 58, 2013."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.2307\/2333709"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103702"},{"key":"e_1_3_2_1_57_1","first-page":"196","volume-title":"Henshin: A usability-focused framework for emf model transformation development,\" in ICGT","author":"Str\u00fcber D.","year":"2017","unstructured":"D. Str\u00fcber, K. Born, K. D. Gill, R. Groner, T. Kehrer, M. Ohrndorf, and M. Tichy, \"Henshin: A usability-focused framework for emf model transformation development,\" in ICGT. Springer, 2017, pp. 196--208."},{"key":"e_1_3_2_1_58_1","first-page":"21","article-title":"Scalability of Model Transformations: Position Paper and Benchmark Set","author":"Str\u00fcber D.","year":"2016","unstructured":"D. Str\u00fcber, T. Kehrer, T. Arendt, C. Pietsch, and D. Reuling, \"Scalability of Model Transformations: Position Paper and Benchmark Set,\" in BigMDE, 2016, pp. 21--30.","journal-title":"BigMDE"},{"key":"e_1_3_2_1_59_1","first-page":"446","article-title":"AGG: A graph transformation environment for modeling and validation of software","author":"Taentzer G.","year":"2003","unstructured":"G. Taentzer, \"AGG: A graph transformation environment for modeling and validation of software,\" in AGTLVE, 2003, pp. 446--453.","journal-title":"AGTLVE"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/1928162.1928178"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.4"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03764-1_6"},{"issue":"3","key":"e_1_3_2_1_63_1","first-page":"349","article-title":"Teacher's corner: A note on interpretation of the paired-samples t test","volume":"22","author":"Zimmerman D. W.","year":"1997","unstructured":"D. W. Zimmerman, \"Teacher's corner: A note on interpretation of the paired-samples t test,\" Journal of Educational and Behavioral Statistics, vol. 22, no. 3, pp. 349--360, 1997.","journal-title":"Journal of Educational and Behavioral Statistics"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:30Z","timestamp":1750210770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":63,"alternative-id":["10.1145\/3180155.3180258","10.1145\/3180155"],"URL":"https:\/\/doi.org\/10.1145\/3180155.3180258","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}