Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2023
A Living Monograph for Graph Transformation
AbstractA preliminary account of the notion of a living monograph for the field of graph transformation, and the reasons that led us to it, is given. The advantages of such a system are discussed along with the technical problems that will need to be ...
- ArticleJuly 2023
Implementing the Language: A Functional Language with Graphs as First-Class Data
AbstractSeveral important data structures in programming are beyond trees; for example, difference lists, doubly-linked lists, skip lists, threaded trees, and leaf-linked trees. They can be abstracted into graphs (or more precisely, port hypergraphs). In ...
- research-articleJune 2023
Multigraph Transformation for Community Detection Applied to Financial Services
ASONAM '22: Proceedings of the 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 541–548https://doi.org/10.1109/ASONAM55673.2022.10068607Networks have provided a representation for a wide range of real systems, including communication networks, money transfer networks and biological systems. Communities represent fundamental structures for understanding the organization of real-world ...
- research-articleOctober 2022
Modular language product lines: a graph transformation approach
MODELS '22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and SystemsPages 334–344https://doi.org/10.1145/3550355.3552444Modelling languages are intensively used in paradigms like model-driven engineering to automate all tasks of the development process. These languages may have variants, in which case the need arises to deal with language families rather than with ...
- ArticleJuly 2022
Visual Smart Contracts for DAML
AbstractThe Digital Asset Modelling Language (DAML) enables low-code development of smart contract applications. Starting from a high-level but textual notation, DAML thus implements the lower end of a model-driven development process, from a platform-...
-
From pairwise to family-based generic analysis of delta-oriented model-based SPLs
SPLC '21: Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume APages 13–24https://doi.org/10.1145/3461001.3471150One way to implement model-based software product lines (MBSPLs) is to use a transformational approach known as Delta Modeling (DM). Here, an MBSPL is implemented by one core model and a set of delta modules. Delta modules define model transformations ...
- research-articleSeptember 2020
Finding Candidate Keys and 3NF via Strategic Port Graph Rewriting
PPDP '20: Proceedings of the 22nd International Symposium on Principles and Practice of Declarative ProgrammingArticle No.: 10, Pages 1–14https://doi.org/10.1145/3414080.3414090We present new algorithms to compute candidate keys and third normal form design of a relational database schema, using strategic port graph rewriting. More precisely, we define port graph rewriting rules and strategies that implement a candidate key ...
- research-articleSeptember 2019
Formal Foundations for Analyzing and Refactoring Delta-Oriented Model-Based Software Product Lines
SPLC '19: Proceedings of the 23rd International Systems and Software Product Line Conference - Volume APages 207–217https://doi.org/10.1145/3336294.3336299Model-Based Software Product Line (MBSPL) Engineering combines Model-Based Software Engineering (MBSE) and Software Product Line (SPL) Engineering by specifying variability in models and generating model variants as products of an MBSPL. Delta Modeling (...
- research-articleJuly 2019
Graph Transformation Policy Network for Chemical Reaction Prediction
KDD '19: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data MiningPages 750–760https://doi.org/10.1145/3292500.3330958We address a fundamental problem in chemistry known as chemical reaction product prediction. Our main insight is that the input reactant and reagent molecules can be jointly represented as a graph, and the process of generating product molecules from ...
- research-articleMarch 2019
Parallax: Sparsity-aware Data Parallel Training of Deep Neural Networks
- Soojeong Kim,
- Gyeong-In Yu,
- Hojin Park,
- Sungwoo Cho,
- Eunji Jeong,
- Hyeonmin Ha,
- Sanha Lee,
- Joo Seong Jeong,
- Byung-Gon Chun
EuroSys '19: Proceedings of the Fourteenth EuroSys Conference 2019Article No.: 43, Pages 1–15https://doi.org/10.1145/3302424.3303957The employment of high-performance servers and GPU accelerators for training deep neural network models have greatly accelerated recent advances in deep learning (DL). DL frameworks, such as TensorFlow, MXNet, and Caffe2, have emerged to assist DL ...
- research-articleJanuary 2019
A graph transformation based approach for multi-agent systems reorganization
Multiagent and Grid Systems (MAGS), Volume 15, Issue 4Pages 375–394https://doi.org/10.3233/MGS-190318During the execution of a multi-agent system, a variety of events originating from the external environment and/or the internal elements of that system can lead to a state of failure. To overcome this kind of undesirable situations, the multi-...
- articleDecember 2018
A Linear Algorithm for Restructuring a Graph
Automation and Remote Control (ARCO), Volume 79, Issue 12Pages 2203–2216https://doi.org/10.1134/S0005117918120093We propose an algorithm, linear in both running time and memory, that constructs a sequence of operations that transform any given directed graph with degree of any vertex at most two to any other given graph of the same type with minimal total cost. ...
- posterApril 2018
Higher-order Network Representation Learning
WWW '18: Companion Proceedings of the The Web Conference 2018Pages 3–4https://doi.org/10.1145/3184558.3186900This paper describes a general framework for learning Higher-Order Network Embeddings (HONE) from graph data based on network motifs. The HONE framework is highly expressive and flexible with many interchangeable components. The experimental results ...
- research-articleMarch 2018
Tigr: Transforming Irregular Graphs for GPU-Friendly Graph Processing
ASPLOS '18: Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating SystemsPages 622–636https://doi.org/10.1145/3173162.3173180Graph analytics delivers deep knowledge by processing large volumes of highly connected data. In real-world graphs, the degree distribution tends to follow the power law -- a small portion of nodes own a large number of neighbors. The high irregularity ...
Also Published in:
ACM SIGPLAN Notices: Volume 53 Issue 2 - short-paperJune 2017
Generation of information systems from process models to support intentional forgetting of work habits
EICS '17: Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing SystemsPages 27–32https://doi.org/10.1145/3102113.3102121Habitual behavior at work can be beneficial because it allows people to perform their tasks more automatically and with less cognitive load. On the downside, habitual work behavior can foster inefficient work strategies as it is executed with lower ...
- short-paperAugust 2016
Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis
ASE '16: Proceedings of the 31st IEEE/ACM International Conference on Automated Software EngineeringPages 816–821https://doi.org/10.1145/2970276.2970287Visual contracts model the operations of classes, components or services by pre- and post-conditions formalised as graph transformation rules. They provide a precise but intuitive notation to test, document and analyse software systems. However, due to ...
- ArticleJuly 2015
Restoring Security of Long-Living Systems by Co-evolution
COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 02Pages 153–158https://doi.org/10.1109/COMPSAC.2015.72Security is an important quality aspect for modern information systems. Security properties may however be violated if the information system operates in an evolving environment. Environmental changes then trigger reactions which lead to co-evolution of ...
- ArticleJanuary 2015
Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction
VMCAI 2015: Proceedings of the 16th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 8931Pages 135–152https://doi.org/10.1007/978-3-662-46081-8_8Analysis of distributed systems with message passing and dynamic process creation is challenging because of the unboundedness of the emerging communication topologies and hence the infinite state space. We model such systems as graph transformation ...
- articleJanuary 2014
Coupling graphs, efficient algorithms and B-cell epitope prediction
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 11, Issue 1Pages 7–16https://doi.org/10.1109/TCBB.2013.136Coupling graphs are newly introduced in this paper to meet many application needs particularly in the field of bioinformatics. A coupling graph is a two-layer graph complex, in which each node from one layer of the graph complex has at least one ...
- ArticleDecember 2013
Modeling Security Threat Patterns to Derive Negative Scenarios
APSEC '13: Proceedings of the 2013 20th Asia-Pacific Software Engineering Conference (APSEC) - Volume 01Pages 58–66https://doi.org/10.1109/APSEC.2013.19The elicitation of security requirements is a crucial issue to develop secure business processes and information systems of higher quality. Although we have several methods to elicit security requirements, most of them do not provide sufficient supports ...