Translation of behavioral models to source code

被引:0
|
作者
Sunith, E., V [1 ]
Samuel, Philip [2 ]
机构
[1] Cochin Univ Sci & Technol, Dept Comp Sci, Cochin 682022, Kerala, India
[2] Cochin Univ Sci & Technol, SOE, Informat Technol, Delhi 682022, India
来源
2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA) | 2012年
关键词
code generation; statemachine; activity diagram; sequence diagram;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is a wonderful idea to directly execute the system designs. In this paper we are introducing a method to convert the behavioral models to the implem entation code. UML is used for modeling and Java is used a s the target language. This paper describes how a system design depicted using activity, sequence and statemachine diagrams can be converted to its implementation code. Activity diagram helps to make the outline of the source program, and the sequence and state machine diagrams contribute to the expansion of the source code. We are using an MDA approach where the system design is do ne in Platform Independent Model (PIM), then converted to Platform Specific Model (PSM) and finally to implementation code. One tool is imple mented based on ou r method and it is evalu ated against some other existing tools.
引用
收藏
页码:598 / 603
页数:6
相关论文
共 50 条
  • [21] Constructing optimal convolutional code models for prokaryotic translation initiation
    May, EE
    Vouk, MA
    Bitzer, DL
    Rosnick, DI
    SECOND JOINT EMBS-BMES CONFERENCE 2002, VOLS 1-3, CONFERENCE PROCEEDINGS: BIOENGINEERING - INTEGRATIVE METHODOLOGIES, NEW TECHNOLOGIES, 2002, : 2188 - 2189
  • [22] Enriching Source Code with Contextual Data for Code Completion Models: An Empirical Study
    van Dam, Tim
    Izadi, Maliheh
    van Deursen, Arie
    2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2023, : 170 - 182
  • [23] Big Code != Big Vocabulary: Open-Vocabulary Models for Source Code
    Karampatsis, Rafael-Michael
    Babii, Hlib
    Robbes, Romain
    Sutton, Charles
    Janes, Andrea
    2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 1073 - 1085
  • [24] Using Cryptology Models for Protecting PHP Source Code
    Jevremovic, Aleksandar
    Ristic, Nenad
    Veinovic, Mladen
    11TH INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2013, PTS 1 AND 2 (ICNAAM 2013), 2013, 1558 : 332 - 336
  • [25] Ensemble Models for Neural Source Code Summarization of Subroutines
    LeClair, Alexander
    Bansal, Aakash
    McMillan, Collin
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2021), 2021, : 286 - 297
  • [26] Extracting Zing models from C source code
    Matousek, Tomas
    Zavoral, Filip
    SOFSEM 2007: THEORY AND PRACTICE OF COMPUTER SCIENCE, PROCEEDINGS, 2007, 4362 : 900 - +
  • [27] RADIOACTIVE SOURCE TERM MODELS IN A COMPARTMENT FIRE CODE
    BALLINGER, MY
    OWCZARSKI, PC
    NUCLEAR TECHNOLOGY, 1985, 69 (01) : 36 - 43
  • [28] Ensemble models for neural source code summarization of subroutines
    LeClair, Alexander
    Bansal, Aakash
    McMillan, Collin
    arXiv, 2021,
  • [29] Extracting models from source code in software modernization
    Javier Luis Cánovas Izquierdo
    Jesús García Molina
    Software & Systems Modeling, 2014, 13 : 713 - 734
  • [30] An Analytical Review of the Source Code Models for Exploit Analysis
    Fedorchenko, Elena
    Novikova, Evgenia
    Fedorchenko, Andrey
    Verevkin, Sergei
    INFORMATION, 2023, 14 (09)