“…The graph G(N,, , E,I) of the target pattern II' is obtained from the graph G(Nn, En) of the source pattern II in the following way: The target instance extent version Zv' is obtained using the propagation flags, ZuPF, and conversion functions, ZII-CF. The concepts of propagation flags and conversion functions in the GBOODM model are similar to those used in the system presented in Lautemann and Wijhrle [3]. Due to the space limitation, their use in the GBOODM model and the rest of the SUPS will be discussed in a future paper.…”