Software (theme 1)
Electronic Communications of the EASST
International Workshop on Graph Transformation and Visual Modeling Techniques
Computer Security

C. (born Köhler, , C.) Krause, ,, Lewin, H, & Taentzer, G. (2007). Ensuring Containment Constraint in Graph-based Model Transformation Approaches. In Proceedings of GT-VMT 2007 . Electronic Communications of the EASST.