Syntax Based Modularization: Invasive or Not?
نویسنده
چکیده
Assume that the meaning of module A is modi ed by module B. If the modi cation can be detected by inspecting module A, then we say that the modi cation is invasive. Non-invasive modi cation makes it possible to reuse code which is \almost right" for a given purpose, even if we cannot change it. How much of a problem is it, if points of variability in source code must be marked explicitly? This paper presents a syntax based modularization mechanism where points of variability are always explicitly marked, and argues that this is a reasonable trade-o between safety and exibility.
منابع مشابه
A DTD-Syntax-Tree Based XML file Modularization Browsing Technique
First, by using the current mature HTML information retrieval techniques, an XML information retrieval system framework will be given in this paper. Then, a DTD-tree based XML file modularization browsing technique will be introduced to browse the retrieval result (a list of XML URLs). Compared with the current XML retrieval systems, our new system has the following advantages: 1) It can retrie...
متن کاملZ Formal Framework for Syntax-Based Module Level Software Metrics
This paper introduces a framework to formalize module-level structural metrics that quantify inter-module dependencies in object-oriented software systems. We used a formal framework based on the Big Bang Graph (BBG) modelling and the formal Z specification language to formalize a modularization-based software metric as an example to demonstrate how the framework works. We have developed the De...
متن کاملDistributed Aspects: better separation of crosscutting concerns in distributed software systems
This thesis shows that abstractions provided by current mainstream Object Oriented (OO) languages are not enough to address the modularization of distributed and concurrent algorithms, protocols, or architectures. In particular, we show that code implementing concurrent and distributed algorithms is scattered and tangled in the main implementation of JBoss Cache, a real industrial middleware ap...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملApproach for a Modularization Driven1
Modularization of products or product families is common and frequently applied when designing product architecture and interfaces. Modularization is driven by various targets to face both, industry and customer needs, or to handle product specific problems. Due to this, a methodical and consistent system definition is crucial to match the set targets of modularization. In this paper possible a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000