Using a Program Transformation Engine to Infer Types in a Metamodel Recovery System

نویسندگان

  • Faizan JAVED
  • Marjan MERNIK
  • Jeff GRAY
  • Jing ZHANG
  • Barrett R. BRYANT
  • Suman ROYCHOUDHURY
چکیده

Domain-Specific Modeling (DSM) allows domain experts to concentrate on the essential characteristics of a problem space without being overwhelmed by the complexities that may occur in the solution space. DSM is focused on the creation of a metamodel for a specific domain, from which instances pertaining to specific configurations of that domain can be constructed. However, as the metamodel undergoes evolutionary changes, repositories of instance models (also called domain models) can become orphaned from their defining metamodel. Within the context of model-driven engineering (MDE), we have developed the Metamodel Recovery System (MARS) which addresses the problem of “metamodel drift” and recovers the design knowledge in a repository of legacy models. MARS is a semi-automatic system that uses grammar inference techniques to recover a metamodel by mining instance models. In addition to the instance models, there are other artifacts that can be investigated in the modeling repository. In this paper we describe an extension to MARS in the form of a type inference capability that is accomplished by the use of a program transformation engine that mines the model compiler code and recovers the type information of fields (or attributes) of metamodel entities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using a Program Transformation

Domain-Specific Modeling (DSM) allows domain experts to concentrate on the essential characteristics of a problem space without being overwhelmed by the complexities that may occur in the solution space. DSM is focused on the creation of a metamodel for a specific domain, from which instances pertaining to specific configurations of that domain can be constructed. However, as the metamodel unde...

متن کامل

Increasing waste heat recovery from an internal combustion engine by a dual-loop non-organic Rankine Cycle

This research proposes the combination of a dual-loop non-organic Rankine cycle (DNORC) with an internal combustion engine to increase the output power of the recovery system by focusing on the increase in the energy input and system efficiency. In doing so, it investigates the strategy of increasing the mean effective temperature of heat addition in the high-temperature Rankine cycle (HTRC) (t...

متن کامل

A Graph Diagram engine for the Transformation-Driven Architecture

The transformation driven architecture (TDA) is a system building (in particular, tool building) approach that is based on model transformations, interface metamodels with corresponding engines, and event/command mechanism. This paper describes a metamodel and the corresponding engine for graph diagram presentations within TDA. The facilities of the metamodel and the engine include static diagr...

متن کامل

The effect of 8 weeks Repeated Sprint Training on buffering system and the results of three different types of recovery

Back ground and aim: Today, Repeated high intensity endurance training is an integral part of the preparation of most team and individual sports, which, if not accompanied by proper recovery during or after physical activity, does not create the necessary adaptations and may Is to harm the athlete's performance under the conditions of competition or training (1, 2). Due to intense repetitive tr...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008