Recently, model transformation approaches are becoming increasingly popular;therefore their efficiency and usability are key factors and require further investigation. These approaches are regularly used in software e...
详细信息
ISBN:
(纸本)9780889869431
Recently, model transformation approaches are becoming increasingly popular;therefore their efficiency and usability are key factors and require further investigation. These approaches are regularly used in software engineering, most often as part of the model-driven development methodology. In the case of the graph rewritingbased model transformation approaches, the applied graph matching algorithm greatly determines the efficiency of the transformation approach. The matching algorithm is used to identify sub-graph isomorphism between the transformation rules and the host graph. A widely applied graph matching algorithm is the VF2 algorithm. In this paper we briefly introduce the original VF2 algorithm - specifically, its method - which manages the next possible node pairs. We present a new approach, which increases the efficiency of choosing these node pairs. We also introduce an ordering function, which increases the performance even further. Finally, the effects of these new approaches are presented based on our experimental results.
In software engineering, modeling with UML and OCL became industry standards and are supported by many computer-aided software engineering tools. The increasing number of the modeled functionalities results in complex...
详细信息
While recent improvements in hardware and application platforms made it widely feasible to provide well designed and easy to use user interface (UI) solutions, most development lifecycles still lack the proper evaluat...
详细信息
The paper is concerned with the study of ultrahigh speed induction machine (USIM) applied in the utilization of renewables and recovering waste energy. The rated speed of the machine is 90 000 rpm. The main target of ...
详细信息
The aim of obfuscation in general is to prevent malicious users from disclosing properties of the original source program. This goal can be achieved by an intermediate level obfuscation that deals with a target platfo...
详细信息
One of the most important problems in data mining is frequent itemset mining. It requires very large computation and I/O traffic capacity. For that reason several parallel and distributed mining algorithms were develo...
详细信息
The offline analysis of graph rewriting-based model transformations, when only the definition of the transformation and the specification of the modeling languages are taken into account, have gained focus recently. I...
详细信息
This paper presents the RobonAUT contest organized by the Budapest University of Technology and Economics, department of automation and applied informatics. The contest aims to support the education of control theory,...
详细信息
The development of hardware and software of low end mobile phones and even simple media players will increasingly allow different type of content to be consumed on them creating pressure for efficient ways to also acc...
详细信息
In this paper, an integrated path planning and tracking algorithm are presented. The proposed cascade structure consists of two parts. The outer loop is a predictive, optimization-based yaw rate reference planner that...
详细信息
暂无评论