Security and Consistency of IT and Business Models at Credit Suisse Realized by Graph Constraints, Transformation and Integration Using Algebraic Graph Theory. [Citation Graph (, )][DBLP]
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks. [Citation Graph (, )][DBLP]
Incremental Service Composition Based on Partial Matching of Visual Contracts. [Citation Graph (, )][DBLP]
Process Construction and Analysis for Workflows Modelled by Adhesive HLR Systems with Application Conditions. [Citation Graph (, )][DBLP]
Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars. [Citation Graph (, )][DBLP]
How Far Can Enterprise Modeling for Banking Be Supported by Graph Transformation? [Citation Graph (, )][DBLP]
On-the-Fly Construction, Correctness and Completeness of Model Transformations Based on Triple Graph Grammars. [Citation Graph (, )][DBLP]