Syntax Based Modularization: Invasive or Not?

نویسنده

  • Erik Ernst
چکیده

Assume that the meaning of module A is modi ed by module B. If the modi cation can be detected by inspecting module A, then we say that the modi cation is invasive. Non-invasive modi cation makes it possible to reuse code which is \almost right" for a given purpose, even if we cannot change it. How much of a problem is it, if points of variability in source code must be marked explicitly? This paper presents a syntax based modularization mechanism where points of variability are always explicitly marked, and argues that this is a reasonable trade-o between safety and exibility.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A DTD-Syntax-Tree Based XML file Modularization Browsing Technique

First, by using the current mature HTML information retrieval techniques, an XML information retrieval system framework will be given in this paper. Then, a DTD-tree based XML file modularization browsing technique will be introduced to browse the retrieval result (a list of XML URLs). Compared with the current XML retrieval systems, our new system has the following advantages: 1) It can retrie...

متن کامل

Z Formal Framework for Syntax-Based Module Level Software Metrics

This paper introduces a framework to formalize module-level structural metrics that quantify inter-module dependencies in object-oriented software systems. We used a formal framework based on the Big Bang Graph (BBG) modelling and the formal Z specification language to formalize a modularization-based software metric as an example to demonstrate how the framework works. We have developed the De...

متن کامل

Distributed Aspects: better separation of crosscutting concerns in distributed software systems

This thesis shows that abstractions provided by current mainstream Object Oriented (OO) languages are not enough to address the modularization of distributed and concurrent algorithms, protocols, or architectures. In particular, we show that code implementing concurrent and distributed algorithms is scattered and tangled in the main implementation of JBoss Cache, a real industrial middleware ap...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Approach for a Modularization Driven1

Modularization of products or product families is common and frequently applied when designing product architecture and interfaces. Modularization is driven by various targets to face both, industry and customer needs, or to handle product specific problems. Due to this, a methodical and consistent system definition is crucial to match the set targets of modularization. In this paper possible a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000