Practical Model-To-Code Transformation in Four Object-Oriented Programming Languages
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
5. Data Types
IEEE FOR THE FUNCTIONAL VERIFICATION LANGUAGE e Std 1647-2011 5. Data types The e language has a number of predefined data types, including the integer and Boolean scalar types common to most programming languages. In addition, new scalar data types (enumerated types) that are appropriate for programming, modeling hardware, and interfacing with hardware simulators can be created. The e language also provides a powerful mechanism for defining OO hierarchical data structures (structs) and ordered collections of elements of the same type (lists). The following subclauses provide a basic explanation of e data types. 5.1 e data types Most e expressions have an explicit data type, as follows: — Scalar types — Scalar subtypes — Enumerated scalar types — Casting of enumerated types in comparisons — Struct types — Struct subtypes — Referencing fields in when constructs — List types — The set type — The string type — The real type — The external_pointer type — The “untyped” pseudo type Certain expressions, such as HDL objects, have no explicit data type. See 5.2 for information on how these expressions are handled. 5.1.1 Scalar types Scalar types in e are one of the following: numeric, Boolean, or enumerated. Table 17 shows the predefined numeric and Boolean types. Both signed and unsigned integers can be of any size and, thus, of any range. See 5.1.2 for information on how to specify the size and range of a scalar field or variable explicitly. See also Clause 4. 5.1.2 Scalar subtypes A scalar subtype can be named and created by using a scalar modifier to specify the range or bit width of a scalar type. -
Chapter 5: Substitutes for C Constructs
CHAPTER 5 Substitutes for C Constructs THE Java programming language shares many similarities with the C program- ming language, but several C constructs have been omitted. In most cases, it’s obvi- ous why a C construct was omitted and how to make do without it. This chapter suggests replacements for several omitted C constructs whose replacements are not so obvious. The common thread that connects the items in this chapter is that all of the omitted constructs are data-oriented rather than object-oriented. The Java pro- gramming language provides a powerful type system, and the suggested replace- ments take full advantage of that type system to deliver a higher quality abstraction than the C constructs they replace. Even if you choose to skip this chapter, it’s probably worth reading Item 21, which discusses the typesafe enum pattern, a replacement for C’s enum construct. This pattern is not widely known at the time of this writing, and it has several advan- tages over the methods currently in common use. Item 19: Replace structures with classes The C struct construct was omitted from the Java programming language because a class does everything a structure does and more. A structure merely groups multi- ple data fields into a single object; a class associates operations with the resulting object and allows the data fields to be hidden from users of the object. In other words, a class can encapsulate its data into an object that is accessed solely by its methods, allowing the implementor the freedom to change the representation over time (Item 12). -
Beaaqualogic Enterprise Security™®
BEAAquaLogic Enterprise Security™® Policy Managers Guide Version 2.6 Document Revised: April 2007 Contents 1. Introduction Document Scope and Audience. 1-1 Guide to this Document. 1-2 Related Documentation . 1-2 Contact Us! . 1-3 2. Security Policies Overview What is an AquaLogic Enterprise Security Policy? . 2-1 Closed-world Security Environment . 2-2 Policy Components . 2-3 Resources. 2-4 Virtual Resources . 2-6 Resource Attributes . 2-6 Privilege Groups. 2-6 Privileges . 2-6 Identities . 2-7 Identity Attributes. 2-8 Groups . 2-8 Users. 2-9 Roles. 2-10 Policies. 2-10 Role Mapping Policies . 2-10 Authorization Policies . 2-12 Delegation Policies. 2-13 Summary of Policy Differences . 2-14 Policy Managers Guide v Declarations. 2-14 Constants . 2-15 Enumerated Types . 2-15 Attributes . 2-15 Evaluation Functions . 2-15 3. Writing Policies Policy Implementation: Main Steps . 3-1 Access Decision Process . 3-4 Authentication Service. 3-4 Role Mapping Service . 3-4 Authorization Service . 3-5 Credential Mapping Service. 3-5 Authorization and Role Mapping Engine . 3-5 Using the Administration Console to Write Policies . 3-7 Administration Console Overview. 3-7 Defining Resources . 3-8 Virtual Resources . 3-11 Resource Attributes. 3-12 Privileges . 3-12 Privilege Groups . 3-13 Defining Identities . 3-14 Identity Attributes . 3-16 Groups. 3-16 Users . 3-17 Roles . 3-18 Writing Authorization and Role Mapping Policies . 3-19 Role Mapping Policies . 3-20 vi Policy Managers Guide Authorization Policies. 3-20 Role Mapping Policy Reports . 3-21 Authorization Policy Reports . 3-21 Defining Declarations. 3-22 Binding Policies . -
Data Types Enumerated Types
CS 1044 Intro Programming in C++ Fall 2002 August 22, 2002 Data Types 9. Types 1 data type: a collection of values and the definition of one or more operations that can be performed on those values C++ includes a variety of built-in or base data types: short, int, long, float, double, char, etc. The values are ordered and atomic. C++ supports several mechanisms for aggregate data types: arrays, structures, classes. These allow complex combinations of other types as single entities. C++ also supports other mechanisms that allow programmers to define their own custom data types: enum types and typedefs. Computer Science Dept Va Tech August, 2002 Intro Programming in C++ ©1995-2002 Barnette ND & McQuain WD Enumerated Types 9. Types 2 An enumerated type is defined by giving a name for the type and then giving a list of labels, which are the only values that a variable of that type is allowed to have. Enumerated types allow the creation of specialized types that support the use of meaningful labels within a program. They promote code readability with very little overhead in memory or runtime cost. enum Month {JAN, FEB, MAR, APR, MAY, JUN, JUL, AUG, SEP, OCT, NOV, DEC}; enum Season {WINTER, SPRING, SUMMER, FALL}; enum Hemisphere {NORTH, SOUTH, EAST, WEST}; Month Mon; Season Period; Hemisphere Region; ... if (Mon == JAN && Region == NORTH) Period = WINTER; An enumerated type is allowed to have up to 256 values and a variable of an enumerated type will occupy one byte of memory. It is an error for the same label to be listed as a value for two different enumerated types. -
Object-Oriented Enumerated Type Facility
Europäisches Patentamt *EP001400895A2* (19) European Patent Office Office européen des brevets (11) EP 1 400 895 A2 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: (51) Int Cl.7: G06F 9/44 24.03.2004 Bulletin 2004/13 (21) Application number: 03255511.2 (22) Date of filing: 03.09.2003 (84) Designated Contracting States: (72) Inventors: AT BE BG CH CY CZ DE DK EE ES FI FR GB GR • Bloch, Joshua J. HU IE IT LI LU MC NL PT RO SE SI SK TR San José, CA 95129 (US) Designated Extension States: • Gafter, Neal M. AL LT LV MK San José, CA 95129 (US) (30) Priority: 09.09.2002 US 237941 (74) Representative: Davies, Simon Robert D Young & Co, (71) Applicant: Sun Microsystems, Inc. 21 New Fetter Lane Santa Clara, California 95054 (US) London, EC4A 1DA (GB) (54) Object-oriented enumerated type facility (57) A system and method are provided that facili- tate use of an object-oriented enumerated type within a computer program. During operation, the system re- ceives source code for the computer program. The source code contains a declaration for an enumerated type. This declaration specifies a fixed number of enu- meration constants that comprise the enumerated type. Next, the system defines the enumerated type using a class defined within an object-oriented programming language. The class includes a constant for each enu- meration constant specified in the declaration. If the declaration additionally contains one or more method declarations, these methods are present on the defined class. EP 1 400 895 A2 Printed by Jouve, 75001 PARIS (FR) EP 1 400 895 A2 Description Field of the Invention 5 [0001] The present invention relates to computer systems and to programming languages, and more specifically, to a method and an apparatus for facilitating the use of an object-oriented enumerated type within a programming lan- guage. -
Enumerated Types
Enumerated Types CSE160, Computer Science A: Honors Stony Brook University http://www.cs.stonybrook.edu/~cse160 1 Enumerated Types An enumerated type defines a list of enumerated values Each value is an identifier enum Day{SUNDAY, MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY}; enum TrafficLight { RED, GREEN, YELLOW } A value of an enumerated type is like a constant and so, by convention, is spelled with all uppercase letters Also, by convention, an enumerated type is named like a class with first letter of each word capitalized Once a type is defined, you can declare a variable of that type: Day day; TrafficLight t; The variable day can hold one of the values defined in the enumerated type Day or null, but nothing else 2 (c) Pearson Education, Inc. & Paul Fodor (CS Stony Brook) Enumerated Types The enumerated values can be accessed using the syntax EnumeratedTypeName.valueName For example, the following statement assigns enumerated value Monday to variable day: Day day = Day.MONDAY; Using enumerated values (e.g., Day.MONDAY) rather than literal integer values (e.g., 0, 1, 2, 3, and so on) can make program easier to read and maintain An enumerated type is treated as a special class, so an enumerated type variable is therefore a reference variable An enumerated type is a subtype of the Object class (inherits all the methods in the Object class) and the Comparable interface (has the compareTo method in the Comparable interface) 3 (c) Pearson Education, Inc. & Paul Fodor (CS Stony Brook) Enumerated Types The following methods are defined for any enumerated object: public String name(); Returns a name of the value for the object (e.g. -
Chapter 2:Tools Selection
MODEL-BASED DESIGN & VERFICATION OF EMBEDDED SYTEMS (MODEVES) Tools Selection Report Chapter 2: Tools Selection MODEL-BASED DESIGN & VERFICATION OF EMBEDDED SYTEMS (MODEVES) Tools Selection Report 1. MBSE Tools Investigation Once the researches are classified into different categories, the next step is to identify the tools and frameworks used in selected researches to perform various MBSE activities. It is important to mention here that a tool is used to perform a specific MBSE activity whereas a framework is a complete environment supporting set of tools that can be used to perform various MBSE activities. On the basis of literature review, 39 preliminary MBSE tools have been identified as given in Table VI. Table I: Preliminary tools selection Sr. Name of Tool / Corresponding Relevant Researches # Framework MBSE Activities 1 Topcased [62] Modeling [3][8][9][52] 2 Modelio Editor Modeling [12] [68] 3 Magic Draw Modeling [6][16][20] [131] 4 Eclipse GEF Modeling [17] [89] 5 Rhapsody [132] Modeling [4][19][22][57] 6 PapyrusMDT Modeling [21][44][60] [98] 7 EA MDG [85] Modeling [27] 8 Visual paradigm Modeling [60] [126] 9 MediniQVT Model [2] [121] Transformation 10 ATL [63] Model [3][8][39][44][46][50][59] Transformation 11 Xpand [97] Model [8][20] Transformation 12 Acceleo [67] Model [9][21][42][44] Transformation 13 MODCO [83] Model [13] Transformation 14 MODEASY Model [17] [17] Transformation 15 Apache Model [16][18] Velocity [86] Transformation 16 Eclipse EMF Model [21][41][37] MODEL-BASED DESIGN & VERFICATION OF EMBEDDED SYTEMS (MODEVES) -
An Analysis of Metamodeling Practices for MOF and OCL Juan Cadavid, Benoit Combemale, Benoit Baudry
An Analysis of Metamodeling Practices for MOF and OCL Juan Cadavid, Benoit Combemale, Benoit Baudry To cite this version: Juan Cadavid, Benoit Combemale, Benoit Baudry. An Analysis of Metamodeling Practices for MOF and OCL. Computer Languages, Systems and Structures, Elsevier, 2015, 41, pp.46. 10.1016/j.cl.2015.02.002. hal-01186015 HAL Id: hal-01186015 https://hal.inria.fr/hal-01186015 Submitted on 23 Aug 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives| 4.0 International License An Analysis of Metamodeling Practices for MOF and OCL Juan José Cadavida, Benoît Combemaleb, Benoit Baudryb aCEA, Saclay, France [email protected] bInria Rennes, France {benoit.combemale, benoit.baudry}@inria.fr Abstract The definition of a metamodel that precisely captures domain knowledge for effective know-how capitalization is a challenging task. A major obstacle for domain experts who want to build a metamodel is that they must master two radically different languages: an object-oriented, MOF-compliant, modeling language to capture the domain structure and first order logic (the Object Constraint Language) for the definition of well-formedness rules. -
Software II: Principles of Programming Languages
Software II: Principles of Programming Languages Lecture 6 – Data Types Some Basic Definitions • A data type defines a collection of data objects and a set of predefined operations on those objects • A descriptor is the collection of the attributes of a variable • An object represents an instance of a user- defined (abstract data) type • One design issue for all data types: What operations are defined and how are they specified? Primitive Data Types • Almost all programming languages provide a set of primitive data types • Primitive data types: Those not defined in terms of other data types • Some primitive data types are merely reflections of the hardware • Others require only a little non-hardware support for their implementation The Integer Data Type • Almost always an exact reflection of the hardware so the mapping is trivial • There may be as many as eight different integer types in a language • Java’s signed integer sizes: byte , short , int , long The Floating Point Data Type • Model real numbers, but only as approximations • Languages for scientific use support at least two floating-point types (e.g., float and double ; sometimes more • Usually exactly like the hardware, but not always • IEEE Floating-Point Standard 754 Complex Data Type • Some languages support a complex type, e.g., C99, Fortran, and Python • Each value consists of two floats, the real part and the imaginary part • Literal form real component – (in Fortran: (7, 3) imaginary – (in Python): (7 + 3j) component The Decimal Data Type • For business applications (money) -
C++ DATA TYPES Rialspo Int.Co M/Cplusplus/Cpp Data Types.Htm Copyrig Ht © Tutorialspoint.Com
C++ DATA TYPES http://www.tuto rialspo int.co m/cplusplus/cpp_data_types.htm Copyrig ht © tutorialspoint.com While doing prog ramming in any prog ramming lang uag e, you need to use various variables to store various information. Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory. You may like to store information of various data types like character, wide character, integ er, floating point, double floating point, boolean etc. Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory. Primitive Built-in Types: C++ offer the prog rammer a rich assortment of built-in as well as user defined data types. Following table lists down seven basic C++ data types: Type Keyword Boolean bool Character char Integ er int Floating point float Double floating point double Valueless void Wide character wchar_t Several of the basic types can be modified using one or more of these type modifiers: sig ned unsig ned short long The following table shows the variable type, how much memory it takes to store the value in memory, and what is maximum and minimum vaue which can be stored in such type of variables. Type Typical Bit Width Typical Rang e char 1byte -127 to 127 or 0 to 255 unsig ned char 1byte 0 to 255 sig ned char 1byte -127 to 127 int 4bytes -2147483648 to 2147483647 unsig ned int 4bytes 0 to 4294967295 sig ned int 4bytes -2147483648 to 2147483647 short int 2bytes -32768 to 32767 unsig ned short int Rang e 0 to 65,535 sig ned short int Rang e -32768 to 32767 long int 4bytes -2,147,483,647 to 2,147,483,647 sig ned long int 4bytes same as long int unsig ned long int 4bytes 0 to 4,294,967,295 float 4bytes +/- 3.4e +/- 38 (~7 dig its) double 8bytes +/- 1.7e +/- 308 (~15 dig its) long double 8bytes +/- 1.7e +/- 308 (~15 dig its) wchar_t 2 or 4 bytes 1 wide character The sizes of variables mig ht be different from those shown in the above table, depending on the compiler and the computer you are using . -
Automatic Translation of OCL Meta-Level Constraints Into Java Meta-Programs
Automatic Translation of OCL Meta-Level Constraints into Java Meta-programs Sahar Kallel, Chouki Tibermacine, Bastien Tramoni, Christophe Dony and Ahmed Hadj Kacem Abstract In order to make explicit and tangible their design choices, software de- velopers integrate, in their applications’ models, constraints that their models and their implemetations should satisfy. Various environments enable constraint check- ing during the modeling stage, but in most cases they do not generate code that would enable the checking of these constraints during the implementation stage. It turns out that this is possible in a number of cases. Environments that provide this functionality only offer it for functional constraints (related to the states of objects in applications) and not for architectural ones (related to the structure of applications). Considering this limitation, we describe in this paper a system that generates metaprograms starting from architecture constraints, written in OCL at the metamodel level, and associated to a specific UML model of an application. These metaprograms enable the checking of these constraints at runtime. Keywords: Software Architecture, Architecture Constraint, Object Constraint Language, Java Reflect Sahar Kallel Lirmm, Montpellier University, France, e-mail: [email protected] Chouki Tibermacine Lirmm, Montpellier University, Farance e-mail: [email protected] Bastien Tramoni Lirmm, Montpellier University, France e-mail: [email protected] Christophe Dony Lirmm, Montpellier University, France e-mail: [email protected] Ahmed Hadj Kacem ReDCAD, Sfax University, Tunisie e-mail: [email protected] 1 2 Kallel, Tibermacine, Tramoni, Dony and HadjKacem 1 Introduction Software architecture description is one of the main building blocks of an applica- tion’s design [4]. -
Modularity and Reuse of Domain-Specific Languages
Modularity and reuse of domain-specific languages Citation for published version (APA): Sutii, A. M. (2017). Modularity and reuse of domain-specific languages: an exploration with MetaMod. Technische Universiteit Eindhoven. Document status and date: Published: 07/11/2017 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim.