Reference : Formal Analysis of Model Transformations Based on Triple Graph Grammars
Scientific journals : Article
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/18767
Formal Analysis of Model Transformations Based on Triple Graph Grammars
English
Hermann, Frank mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Ehrig, Hartmut [Technische Universität Berlin, Germany]
Golas, Ulrike [Zuse-Institut Berlin, Germany]
Orejas, Fernando [UPC Barcelona, Spain]
1-Aug-2014
Mathematical Structures in Computer Science
Cambridge University Press
24
4-08
Special Issue 04 (Structure Transformation)
1-57
Yes (verified by ORBilu)
International
0960-1295
Cambridge
Great Britain
[en] model transformation ; graph transformation ; triple graph grammars
[en] Triple graph grammars (TGGs) are a well-established concept for the specification and execution of bidirectional model transformations within model driven software engineering. Their main advantage is an automatic generation of operational rules for forward and backward model transformations, which simplifies specification and enhances usability as well as consistency. In this paper we present several important results for analysing model transformations based on the formal categorical foundation of TGGs within the framework of attributed graph transformation systems.

Our first main result shows that the crucial properties of correctness and completeness are ensured for model transformations. In order to analyse functional behaviour, we generate a new kind of operational rule, called a forward translation rule. We apply existing results for the analysis of local confluence for attributed graph transformation systems. As additional main results, we provide sufficient criteria for the verification of functional behaviour as well as a necessary and sufficient condition for strong functional behaviour. In fact, these conditions imply polynomial complexity for the execution of the model transformation. We also analyse information and complete information preservation of model transformations, that is, whether a source model can be reconstructed (uniquely) from the target model computed by the model transformation. We illustrate the results for the well-known model transformation example from class diagrams to relational database models.
Interdisciplinrary Centre for Security, Reliability and Trust
PIL2SPELL
Researchers ; Professionals
http://hdl.handle.net/10993/18767
10.1017/S0960129512000370
http://dx.doi.org/10.1017/S0960129512000370
The original publication is available at http://journals.cambridge.org

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
HEGO14.pdfPublisher postprint739.4 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.