A Program Analysis for Tool-Supported Refactoring of Aspect-Oriented Programs

Total Page:16

File Type:pdf, Size:1020Kb

A Program Analysis for Tool-Supported Refactoring of Aspect-Oriented Programs A Program Analysis for Tool-supported Refactoring of Aspect-oriented Programs Jan Wloka Stefan Jahnichen¨ Fraunhofer FIRST Technical University Berlin Kekulstr. 7 Franklinstr. 28/29 Berlin, Germany Berlin, Germany jan.wloka@first.fraunhofer.de [email protected] Categories and Subject Descriptors control flow. A pointcut expresses a join point property by D.2.7 [Software Engineering]: Distribution, Maintenance, referencing the anchor structures and elements, and thereby and Enhancement; F.3.2 [Logics and Meanings of Pro- ties the advice execution closely to these implementation in- grams]: Semantics of Programming Languages—program ternals. For example, the pointcut analysis; D.3.3 [Programming Languages]: Language Con- call(public int A.bar()) structs and Features—patterns, classes and objects && withincode(public void A.foo()) selects all method calls of method bar() that are defined General Terms within method foo(). Additionally, it references the decla- Algorithms, Measurement, Languages, Reliability rations of class A and method foo(), although these ele- ments does not belong to the selected join point set. Hence, Keywords any modification of class A or method foo(), e.g., by a refactoring, does not modify selected join points, but may Software refactoring, Aspect-oriented programming, Change break the pointcut and therefore the specified advice execu- impact analysis, Static program analysis, Code generation tion. Refactorings for aspect-oriented programs have to preserve 1. PROBLEM & MOTIVATION the anchor structures and elements but also still allow to im- Aspect-oriented programming (AOP) has been proposed prove the program’s design. A refactoring tool that is able to for improving the modularity of implementations that can- identify these structures, can allow safe modifications (even not be encapsulated with traditional means, so called cross- if they affect the set of selected join points), identify and cutting concerns. It introduces new adaptation concepts adjust affected pointcuts and prevent the programmer from that allow the structural extension of implementation mod- breaking a pointcut. ules and the adaptation of existing program behavior. The adaptation concepts are often achieved by new language 2. RESEARCH PROPOSAL mechanisms and constructs, such as pointcut and advice. A A classification of the change impact of object-oriented pointcut specifies where and when an advice is executed by refactorings on pointcuts is investigated to cope with the selecting well-defined points in the program execution, so fragile pointcut problem in tool-supported refactoring. called join points. Every time a join point is executed, some runtime support looks for matching pointcuts. If a matching 3. BACKGROUND & RELATED WORK pointcut is defined, every bound advice is executed. With this complex but powerful mechanism, aspects can declare Various approaches have been proposed to cope with the an adaptation without modifying the source of the adapted issues arisen by the tight coupling between aspects and the implementation module. base program. The most related results provide extensions For selecting a set of join points, a pointcut can specify to object-oriented refactorings, new IDE support for deter- structural and behavioral properties that have all desired mining altered pointcut matches and more expressive point- join points in common. These properties are anchored in cut languages, making a pointcut less coupled to brittle im- internal program structures, such as the program’s name plementation details. This section describes the refactoring space, code containment, inheritance relationships or the and program analysis related approaches in more detail. 3.1 Aspect-oriented Refactoring In [4, 1, 2, 7, 3, 9] new refactorings for aspect-oriented Permission to make digital or hard copies of all or part of this work for programs has been identified which allow the improvement personal or classroom use is granted without fee provided that copies are of object-oriented programs by using AO-modlarization, the not made or distributed for profit or commercial advantage and that copies refactoring of aspect language constructs or the refactoring bear this notice and the full citation on the first page. To copy otherwise, to of base code while existing AO adaptations are preserved. republish, to post on servers or to redistribute to lists, requires prior specific In particular, Monteiro et al. have published in [4] a cata- permission and/or a fee. Doctoral Symposium FSE 14, 2006 Portland, Oregon USA logue of new refactorings and bad smells for AspectJ pro- Copyright 2006 ACM X-XXXXX-XX-X/XX/XX ...$5.00. grams. Ceccato et al. present in[1] an AOPMigrator which supports to different program versions or by analyzing the applied the extraction of class members and statements into aspects. changes. They propose a specific refactoring workflow that generates An approach that detects differently bound advices by com- a single pointcut for every extracted program element. paring two program versions is presented by St¨orzerand Hannemann et al. present in [2] also a tool for extracting Graf in [10]. The proposed pointcut delta analysis approxi- crosscutting concerns into aspects. The tool supports a spe- mates the bound join points for every pointcut and compares cific workflow for migrating design patterns implemented in the pointcut matches between two program versions. New, Java to an AspectJ implementation. lost and modified (in terms of match quality) matches are discovered. All these refactoring approaches have to cope with base Our change impact analysis extends this approach in sev- code changes that may affect existing pointcuts. Our ap- eral ways. The computed match delta is extended to a so proach reveals altered join point selections, proposes suit- called pointcut selection delta that contains matches of ev- able pointcut updates and generates rephrased pointcuts. ery referenced program structure, rather than only complete Thus it can be seen as fundamental to AO refactoring in pointcut matches. The selection delta entries are directly general. associated with the responsible change. This direct associa- tion allows the automated calculation of pointcut updates. 3.2 Behavior Preservation in AO Refactoring Hanenberg et al. describe in [9] initial ideas on how to Similar to Ryder et al. in [6, 8] we divide program edits treat pointcuts within a refactoring workflow. They ex- (performed by a refactoring) into their constituent atomic tended the refactoring constraints to preserve the number changes amenable to program analysis. Atomic changes of selected join points, the position of a selected join point have syntactic dependencies, denoting prerequisite relation- within the program’s control flow and the information pro- ships and represent a distinct impact on the program’s source. vided at a selected join point for every pointcut. Based on Based on the atomic change model Ryder et al. have devel- these additional constraints, the previous program behavior oped different change classifications that indicate the likeli- is reestablished by updating affected pointcuts. hood of a change to be failure-inducing. Every change can Two problems are not considered in this approach: (i) a be labeled, as red (highly likely to be failure-inducing), yel- pointcut may intentionally select additional join points after low (somewhere in between) or green (highly unlikely to be a refactoring and (ii) join points are points in the program failure-inducing). execution which have to be statically approximated. In contrast to Ryder et al. we do not employ the atomic Rura and Lerner advance the AO-specific refactoring con- changes to identify affected unit tests, but affected point- straints in [7]. They present a ”pointcut pattern equiva- cuts. Our change classification indicates the likelihood of a lence” constraint, that reduces the rule ”each advice must change to break the program structures a pointcut relies on. apply at semantically equivalent join points” to a more sim- A combination of both approaches allows to separate changes ple determinable but stronger requirement ”signature pat- that just alter the set of pointcut matches from changes terns used in a pointcut must match semantically equivalent that break the pointcut. With this separation a tool can program elements”. In cases where the signature patterns be enabled to deny critical transformations while it safely do not match the same elements as before the refactoring, performs all others. the patterns are broadened/narrowed in a way that new and lost pattern matches are prevented. 4. HYPOTHESIS However, additional and lost matches are always excluded In aspect-oriented programs, a pointcut defines where and or included, which makes, on the one hand, pointcuts un- when advices are executed by selecting a set of join points. recognizable and worse readable, and, on the other hand, It can specify some structural and behavioral properties that it does not consider the programmer’s intention behind a have all join points in common. A set of selected join points pointcut. can be unintentionally altered through various (even local) source code changes. In order to decide if a certain change Our approach can be seen as an extension to this work. actually breaks a pointcut, two different kinds of changes We explicitly consider the change impact of a refactoring have to be distinguished: changes that affect a program ele- by assigning atomic changes with a distinct impact on a ment that possesses specified properties
Recommended publications
  • Composition of Software Architectures Christos Kloukinas
    Composition of Software Architectures Christos Kloukinas To cite this version: Christos Kloukinas. Composition of Software Architectures. Computer Science [cs]. Université Rennes 1, 2002. English. tel-00469412 HAL Id: tel-00469412 https://tel.archives-ouvertes.fr/tel-00469412 Submitted on 1 Apr 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Composition of Software Architectures - Ph.D. Thesis - - Presented in front of the University of Rennes I, France - - English Version - Christos Kloukinas Jury Members : Jean-Pierre Banâtre Jacky Estublier Cliff Jones Valérie Issarny Nicole Lévy Joseph Sifakis February 12, 2002 Résumé Les systèmes informatiques deviennent de plus en plus complexes et doivent offrir un nombre croissant de propriétés non fonctionnelles, comme la fiabi- lité, la disponibilité, la sécurité, etc.. De telles propriétés sont habituellement fournies au moyen d’un intergiciel qui se situe entre le matériel (et le sys- tème d’exploitation) et le niveau applicatif, masquant ainsi les spécificités du système sous-jacent et permettant à des applications d’être utilisées avec dif- férentes infrastructures. Cependant, à mesure que les exigences de propriétés non fonctionnelles augmentent, les architectes système se trouvent confron- tés au cas où aucun intergiciel disponible ne fournit toutes les propriétés non fonctionnelles visées.
    [Show full text]
  • Lecture Notes in Computer Science 1543 Edited by G
    Lecture Notes in Computer Science 1543 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Serge Demeyer Jan Bosch (Eds.) Object-Oriented Technology ECOOP ’98 Workshop Reader ECOOP ’98 Workshops, Demos, and Posters Brussels, Belgium, July 20-24, 1998 Proceedings 13 Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editors Serge Demeyer University of Berne Neubruckstr. 10, CH-3012 Berne, Switzerland E-mail: [email protected] Jan Bosch University of Karlskrona/Ronneby, Softcenter S-372 25 Ronneby, Sweden E-mail: [email protected] Cataloging-in-Publication data applied for Die Deutsche Bibliothek - CIP-Einheitsaufnahme Object-oriented technology : workshop reader, workshops, demos, and posters / ECOOP ’98, Brussels, Belgium, July 20 - 24, 1998 / Serge Demeyer ; Jan Bosch (ed.). - Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London ; Milan ; Paris ; Singapore ; Tokyo : Springer, 1998 (Lecture notes in computer science ; Vol. 1543) ISBN 3-540-65460-7 CR Subject Classification (1998): D.1-3, H.2, E.3, C.2, K.4.3, K.6 ISSN 0302-9743 ISBN 3-540-65460-7 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag.
    [Show full text]
  • Workshop on Multi-Dimensional Separation of Concerns in Software Engineering
    ACM SIGSOFT Software Engineering Notes vol 26 no 1 January 2001 Page 78 Workshop on Multi-Dimensional Separation of Concerns in Software Engineering Peri Tarr, William Harrison, Harold Ossher (IBM T. I. Watson Research Center, USA) Anthony Finkelstein (University College London, UK) Bashar Nuseibeh (Imperial College, UK) Dewayne Perry (University of Texas at Austin, USA) Workshop Web site: http://www.research.ibm.com/hyperspace/workshops/icse2000 ABSTRACT cem may promote some goals and activities, while impeding oth- Separation of concerns has been central to software engineering ers; thus, any criterion for decomposition will be appropriate fm for decades, yet its many advantages are still not fully realized. A some contexts, but not for all. Further, multiple kinds of concerns key reason is that traditional modularization mechanisms do not may be relevant simultaneously, and they may overlap and inter- allow simultaneous decomposition according to multiple kinds of act, as features and classes do. Thus, different concerns and (overlapping and interacting) concerns. This workshop was in- modularizations are needed for different purposes: sometimes by tended to bring together researchers working on more advanced class, sometimes by feature, sometimes by viewpoint, or aspect, moclularization mechanisms, and practitioners who have experi- role, variant, or other criterion. enced the need for them, as a step towards a common understand- These considerations imply that developers must be able to iden- ing of the issues, problems and research challenges. tify, encapsulate, modularize, and wanipulate multiple dimensions Keywords of concern simultaneously, and to introduce new concerns and Separation of concerns, decomposition, composition dimensions at any point during the software lifecycle, without suf- fering the effects of invasive modification and rearchitecture.
    [Show full text]
  • Separation of Concerns for Dependable Software Design
    Separation of Concerns for Dependable Software Design Daniel Jackson and Eunsuk Kang MIT Computer Science and Artificial Intelligence Laboratory 32 Vassar Street, Cambridge, MA 02139 [email protected] ABSTRACT tiously includes collection of detailed statistics and explicit mechanisms for adjusting the process accordingly. For ‘mixed-criticality’ systems that have both critical and non-critical functions, the greatest leverage on dependabil- Testing is used for two very different purposes. On the one ity may be at the design level. By designing so that each hand, it is used to find bugs. Structural tests exploit knowl- critical requirement has a small trusted base, the cost of the edge of the structure of the software to identify bugs in analysis required for a dependability case might be dra- known categories. A mutation test, for example, might fo- matically reduced. An implication of this approach is that cus on the possibility that the wrong operator was selected conventional object-oriented design may be a liability, be- for an expression; a regression test is designed to detect the cause it leads to ‘entanglement’, and an approach based on reoccurrence of a particular flaw. For this kind of testing, a separating services may be preferable. successful test is one that fails, and thus identifies a bug. Categories and Subject Descriptors On the other hand, testing can be used to provide evidence D.2.2 [Software Engineering]: Design Tools and Tech- of dependability. In this case, tests focused on particular niques; D.2.4 Software/Program Verification; D.2.10 De- known bug categories are less useful (since a failure might sign.
    [Show full text]
  • Experiences from Representing Software Architecture in a Large Industrial Project Using Model Driven Development
    Experiences from representing software architecture in a large industrial project using model driven development Anders Mattsson1 Björn Lundell2 Brian Lings2 Brian Fitzgerald3 1 Combitech AB, P.O. Box 1017, SE-551 11 JÖNKÖPING, Sweden [email protected] 2 University of Skövde, P.O. Box 408, SE-541 28 SKÖVDE, Sweden {bjorn.lundell, brian.lings}@his.se 3 Lero – the Irish Software Engineering Research Centre University of Limerick, Ireland [email protected] Abstract There exist several approaches to MDD such as OMG’s MDA [5], Domain-Oriented Programming [6], A basic idea of Model Driven Development (MDD) and Software Factories [7] from Microsoft. A basic is to capture all important design information in a set idea of MDD is to capture all important design of formal or semi formal models that are automatically information in a set of formal or semi formal models kept consistent by tools. This paper reports on that are automatically kept consistent by tools to raise industrial experience from use of MDD and shows that the level of abstraction at which the developers work the approach needs improvements regarding the and to eliminate time consuming and error prone architecture since there are no suggested ways to manual work in keeping different design artifacts formalize design rules which are an important part of consistent, or to cite Brent Hailpern and Peri Tarr: the architecture. Instead, one has to rely on time “The primary goal is to raise the level of abstraction consuming and error prone manual interpretations, at which developers operate and, in doing so, reviews and reworkings to keep the system consistent reduce both the amount of developer effort and the with the architecture.
    [Show full text]
  • First Call for Papers
    Call for Papers Research th 29 International Conference on Software Engineering Minneapolis, Minnesota, USA, 20-26 May 2007 ICSE General Chair John Knight, U Virginia, USA ICSE is the premier forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, results, experiences and concerns in the field of software engineering. Research Program Co-Chairs Wolfgang Emmerich, UCL, UK The theme of ICSE 2007 is Developing Dependable Software, with which we acknowledge the increasingly Gregg Rothermel, U Nebraska-Lincoln, USA crucial role the engineering of software plays in business, healthcare, government and society at-large. The theme also highlights the growing responsibility our profession and its members are expected to assume. As Program Committee such, an important goal of this meeting will be to reach out to other engineering and scientific disciplines that Jo Atlee, U Waterloo, Canada have an impact upon or benefit from software engineering know-how. Judith Bishop, U Pretoria, South Africa We invite high quality submissions of technical papers describing original and unpublished results of Victor Braberman, U Buenos Aires, Argentina theoretical, empirical, conceptual, and experimental software engineering research. Incremental improvements Margaret Burnett, Oregon State U, USA over previously published work should have been evaluated through systematic empirical or experimental SC Cheung, HongKong U S T, HongKong evaluation. Submissions of papers describing groundbreaking approaches to
    [Show full text]
  • Managing Technical Debt in Software Development: Report on the 2
    ACM SIGSOFT Software Engineering Notes Page 33 September 2011 Volume 36 Number 5 Managing Technical Debt in Software tion, while the term was originally coined in reference to coding practices, today the metaphor is applied more broadly across the Development: project life cycle and may include practices of refactoring [5], test- Report on the 2nd International Work- driven development [6], iteration management [4][7][12], software architecture [2][8], and software craftsmanship [10]. shop on Managing Technical Debt, The concept of technical debt can provide a basis on which the held at ICSE 2011 various stakeholders can reason about the best course of action for Ipek Ozkaya,1 Philippe Kruchten,2 Robert L. Nord1, the evolution of a software product. As reflected by the composi- 1 tion of our program committee that includes practitioners, consul- and Nanette Brown 1 tants, and researchers, this area has significant relevance to Software Engineering Institute, Carnegie Mellon practicing software engineers and software engineering. University, USA A first workshop on technical debt was held at the Software En- ozkaya, rn, [email protected] gineering Institute in Pittsburgh on June 2 to 4, 2010. Its outcomes 2 University of British Columbia, Canada were published as a research position paper [1] summarizing the [email protected] open research questions in the area. DOI: 10.1145/2020976.2020979 The goal of the second workshop was to come up with a more http://doi.acm.org/10.1145/2020976.2020979 in-depth understanding of technical debt, its definition(s), charac- teristics, and various forms. One objective related to this goal was Abstract to understand the processes that lead to technical debt and its indi- The technical debt metaphor is gaining significant traction in the cators, such as degrading system quality and inability to maintain software development community as a way to understand and code.
    [Show full text]
  • Projectional Editing of Software Product Lines—The Peopl Approach
    PhD-FSTC-2017-39 The Faculty of Sciences, Technology and Communication DISSERTATION Defense held on 21/07/2017 in Luxembourg to obtain the degree of DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE by Benjamin BEHRINGER Born on 9 July 1984 in Essen (Germany) PROJECTIONAL EDITING OF SOFTWARE PRODUCT LINES– THE PEOPL APPROACH Dissertation defense committee Dr Steffen Rothkugel, Dissertation Supervisor Associate Professor, Université du Luxembourg Dr Thorsten Berger Assistant Professor, University of Gothenburg and Chalmers University of Technology Dr Denis Zampunieris, Chairman Professor, Université du Luxembourg Dr Ina Schäfer Professor, Technische Universität Braunschweig Dr Martina Lehser, Vice Chairman Professor, Hochschule für Technik und Wirtschaft des Saarlandes (host institution) Benjamin BEHRINGER: Projectional Editing of Software Product Lines— The PEoPL Approach, © July 2017 ABSTRACT The features of a software product line—a portfolio of system variants—can be realized using various variability implementation techniques. Each technique represents a feature’s software artifacts (a.k.a. feature artifacts) differently, typically classified into anno- tative and modular variability representations, each with distinct advantages and disadvantages. Annotative representations, such as C preprocessor annotations, are easy to apply, but clutter source code and hinder program comprehension. Modular representations, such as feature modules, support comprehension, but are difficult to realize. Most importantly, to engineer feature artifacts, developers need to choose one representation and adhere to it for evolving and maintaining the same artifacts. We present the approach PEoPL (Projectional Editing of Product Lines), which combines the advantages of different variability rep- resentations. When engineering a feature artifact, developers can choose the most-suited representation for the given task, switch representations on demand, and even use different representations in parallel.
    [Show full text]
  • Self-Organizing Software Architectures
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Helsingin yliopiston digitaalinen arkisto Department of Computer Science Series of Publications A Report A-2013-13 Self-Organizing Software Architectures Pietu Pohjalainen To be presented, with the permission of the Faculty of Science of the University of Helsinki, for public criticism in Auditorium XV, University Main Building, on 13th December 2013, at noon. University of Helsinki Finland Supervisors Jukka Paakki, University of Helsinki, Finland Juha Taina, University of Helsinki, Finland Pre-examiners G¨orelHedin, Lund University, Sweden Jyrki Nummenmaa, University of Tampere, Finland Opponent Kai Koskimies, Tampere University of Technology, Finland Custos Jukka Paakki, University of Helsinki, Finland Contact information Department of Computer Science P.O. Box 68 (Gustaf H¨allstr¨ominkatu 2b) FI-00014 University of Helsinki Finland Email address: [email protected].fi URL: http://www.cs.helsinki.fi/ Telephone: +358 9 1911, telefax: +358 9 191 51120 Copyright © 2013 Pietu Pohjalainen ISSN 1238-8645 ISBN 978-952-10-9424-8 (paperback) ISBN 978-952-10-9425-5 (PDF) Computing Reviews (1998) Classification: D.2.11, D.1.2, D1.5, D.2.2, D.2.3, D.2.7, D.2.13 Helsinki 2013 Unigrafia Self-Organizing Software Architectures Pietu Pohjalainen Department of Computer Science P.O. Box 68, FI-00014 University of Helsinki, Finland pietu.pohjalainen@iki.fi PhD Thesis, Series of Publications A, Report A-2013-13 Helsinki, December 2013, 114 + 71 pages ISSN 1238-8645 ISBN 978-952-10-9424-8 (paperback) ISBN 978-952-10-9425-5 (PDF) Abstract Looking at engineering productivity is a source for improving the state of software engineering.
    [Show full text]
  • Eindhoven University of Technology MASTER an Agile Approach
    Eindhoven University of Technology MASTER An agile approach supported by a tool environment for the development of software components Zwartjes, G.; van Geffen, J. Award date: 2005 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student theses are made available in the TU/e repository upon obtaining the required degree. The grade received is not published on the document as presented in the repository. The required complexity or quality of research of student theses may vary by program, and the required minimum study period may vary in duration. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computing Science MASTER’S THESIS An Agile Approach Supported by a Tool Environment for the Development of Software Components Gertjan Zwartjes and Joost van Geffen fg.zwartjes, [email protected] Supervisor: Prof. Prof. Dr. B.W. Watson ∗+ [email protected] External advisers: Prof. Dr. D. G. Kourie +, Dr. A. Boake + [email protected], [email protected] ∗ Technische Universiteit Eindhoven, Eindhoven, The Netherlands.
    [Show full text]
  • Design Aspects and GRS-Based AOD the GREAT Transformation Framework
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Electronic Notes in Theoretical Computer Science 82 No. 5 (2003) URL: http://www.elsevier.nl/locate/entcs/volume82.html Design Aspects and GRS-based AOD The GREAT transformation framework Alexander Christoph1 SWT Forschungszentrum Informatik2 (FZI) Karlsruhe, Germany 1. Email: [email protected] 2. URL: http://www.fzi.de Abstract In analogy to Aspect Oriented Programming (AOP), Aspect Oriented Design (AOD) is a means of modelling different concerns in software designs independently from each other and from the design itself. Different approaches to AOD formalize design aspects as new design entities. Un- fortunately, these approaches are difficult to use or become unhandy with existing or large de- signs. This paper presents the rule-based design transformation framework GREAT that can be used to describe aspects in a formal way and generate weaving code from aspect descriptions. 1 Introduction The separation of concerns on the level of source code has been studied in a number of papers [10], [12]. The key issue of aspect oriented programming (AOP, [9]) is to realize different con- cepts separately from the implementation of the program. These concepts are later woven into the program, either prior to or during its execution. AOP aspects are defined as patterns over the program call graph, i.e. the execution view of the software. This facilitates the developer to declare additional behaviour before, during or after a method has been called. In [5] the authors explain that modelling different concerns separately during the design proc- ess can be useful, too.
    [Show full text]
  • Cleanroom Software Development Using Aspect - Oriented Programming
    Cleanroom Software Development using Aspect - Oriented Programming Natacha Govan Universidade Nova de Lisboa – Faculdade de Ciências e Tecnologia [email protected] Abstract CSD software engineering is clamed to yield software The issue of this article is pertaining with, Cleanroom that is correct by mathematically sound design, and Software Development using Aspect–Oriented software that is certified by statistically-valid testing. Programming. Reduced cycle time results from an incremental Cleanroom Software Development (CSD) is an development strategy and the avoidance of rework engineering process to develop software that is high in [Foreman 05]. quality and with a certified level of reliability. It is well-documented that significant differences in cost Aspect-Oriented Programming (AOP), also known as are associated with errors found at different stages of the Aspect-Oriented Software Development (AOSD), is an software life cycle. By detecting errors as early as approach to software development, which tends to possible, CSD reduces the cost of errors during separate concerns, or breaking a program into distinct development and the incidence of failures during features. operation; thus the overall life cycle cost of software The understanding of the meaning and the usage as well developed under CSD can be expected to be far lower as the functionality of the CSD can be very helpful, as it than industry average [Foreman 05]. can enable one to produce a software and in a developing process. Typical characteristics of CSD include: The present paper analyses the relationship that may • Software development based on formal methods exist between the Cleanroom Software Development and • Incremental implementation under statistical the Aspect - Oriented Programming.
    [Show full text]