Electronic Communications of the EASST
International Workshop on Graph Transformation and Visual Modeling Techniques
Computer Security

Krause (born Köhler), C., Lewin, H., & Taentzer, G. (2007). Ensuring Containment Constraint in Graph-based Model Transformation Approaches. In Proceedings of GT-VMT 2007 . Electronic Communications of the EASST.