Reference : Formal Analysis of Model Transformations Based on Triple Graph Grammars
Scientific journals : Article
Engineering, computing & technology : Computer science
Formal Analysis of Model Transformations Based on Triple Graph Grammars
Hermann, Frank mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Ehrig, Hartmut [Technische Universit├Ąt Berlin, Germany]
Golas, Ulrike [Zuse-Institut Berlin, Germany]
Orejas, Fernando [UPC Barcelona, Spain]
Mathematical Structures in Computer Science
Cambridge University Press
Special Issue 04 (Structure Transformation)
Yes (verified by ORBilu)
Great Britain
[en] model transformation ; graph transformation ; triple graph grammars
[en] Triple graph grammars (TGGs) are a well-established concept for the specification and execution of bidirectional model transformations within model driven software engineering. Their main advantage is an automatic generation of operational rules for forward and backward model transformations, which simplifies specification and enhances usability as well as consistency. In this paper we present several important results for analysing model transformations based on the formal categorical foundation of TGGs within the framework of attributed graph transformation systems.

Our first main result shows that the crucial properties of correctness and completeness are ensured for model transformations. In order to analyse functional behaviour, we generate a new kind of operational rule, called a forward translation rule. We apply existing results for the analysis of local confluence for attributed graph transformation systems. As additional main results, we provide sufficient criteria for the verification of functional behaviour as well as a necessary and sufficient condition for strong functional behaviour. In fact, these conditions imply polynomial complexity for the execution of the model transformation. We also analyse information and complete information preservation of model transformations, that is, whether a source model can be reconstructed (uniquely) from the target model computed by the model transformation. We illustrate the results for the well-known model transformation example from class diagrams to relational database models.
Interdisciplinrary Centre for Security, Reliability and Trust
Researchers ; Professionals
The original publication is available at

File(s) associated to this reference

Fulltext file(s):

Limited access
HEGO14.pdfPublisher postprint739.4 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.