Specifying redundancy tactics as crosscutting concerns using aspect-oriented modeling

被引:4
|
作者
Qiu, Xiang [1 ]
Zhang, Li [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
redundancy tactic; aspect-oriented modeling; weaving algorithm; reuse directives;
D O I
10.1007/s11704-014-3390-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various redundancy tactics can be modeled at the design stage of safety-critical systems thereby providing a set of fault-tolerance guidelines for subsequent development activities. However, existing approaches usually interweave redundancy tactics into the functional models making them complex and cluttered; the maintenance of such models is time-consuming and error-prone. To address this problem, we provide a modeling approach to separate the redundancy tactics from the base functional models using aspect-oriented modeling. More specifically, the conceptual models of the redundancy tactics and their semantic constraints are first de- fined for deriving the relevant aspects. Subsequently, a UML profile is proposed to specify the tactic aspects followed by mapping these concepts to the corresponding concepts of aspect-oriented modeling based on pre-defined principles. In accordance with our proposed profile, reuse directives are applied to handle the overlap of structural features between redundancy tactics and other kinds of tactic. Based on our tactic aspects and their configured attributes, a weaving algorithm is proposed to associate the tactic aspects with the base functional models. The proposed approach is compared with a traditional tactic modeling approach using two safety-critical systems, revealing that: 1) our approach significantly reduces the number of extra model elements needed in the tactic design stage; 2) our approach can largely avoid the impact of changing of the base functional model as the model evolves.
引用
收藏
页码:977 / 995
页数:19
相关论文
共 50 条
  • [1] Specifying redundancy tactics as crosscutting concerns using aspect-oriented modeling
    Xiang Qiu
    Li Zhang
    Frontiers of Computer Science, 2014, 8 : 977 - 995
  • [2] Providing Support for Specifying Redundancy Tactics Using Aspect-Oriented Modeling
    Qiu, Xiang
    Zhang, Li
    2013 13TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC), 2013, : 183 - 186
  • [3] An aspect-oriented approach to handling crosscutting concerns in activity modeling
    Zhang, Jing
    Liu, Yan
    Jiang, Michael
    Strassner, John
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 885 - 890
  • [4] Aspect-oriented programming and separation of crosscutting concerns
    Rashid, A
    Blair, L
    COMPUTER JOURNAL, 2003, 46 (05): : 527 - 528
  • [5] Modeling crosscutting in aspect-oriented mechanisms
    Masuhara, H
    Kiczales, G
    ECOOP 2003 - OBJECT-ORIENTED PROGRAMMING, PROCEEDINGS, 2003, 2743 : 2 - 28
  • [6] Crosscutting interfaces for aspect-oriented modeling
    Depto de Ciência da Computação, UFBA, Av. Adhemar de Barros, s/n, Salvador, Brazil
    不详
    LA1 4WA, United Kingdom
    不详
    J. Braz. Comput. Soc., 2006, 1 (43-58):
  • [7] Aspect-Oriented Use Cases and Crosscutting Interfaces for Reconfigurable Behavior Modeling
    Nemuraite, Lina
    Balandyte, Milda
    DATABASES AND INFORMATION SYSTEMS IV, 2007, 155 : 189 - 202
  • [8] Aspect-oriented modularization of assertion crosscutting objects
    Ishio, T
    Kamiya, T
    Kusumoto, S
    Inoue, K
    12TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2005, : 744 - 751
  • [9] Specifying languages using aspect-oriented approach: AspectLISA
    Rebernak, Damijan
    Mernik, Marjan
    Henriques, Pedro Rangel
    da Cruz, Daniela
    Varanda Pereira, Maria Joao
    ITI 2006: PROCEEDINGS OF THE 28TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2006, : 695 - +
  • [10] VERIFYING ASPECT-ORIENTED MODELS AGAINST CROSSCUTTING PROPERTIES
    Cui, Zhanqi
    Wang, Linzhang
    Liu, Xi
    Bu, Lei
    Zhao, Jianhua
    Li, Xuandong
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2013, 23 (05) : 655 - 676