: Will Aalst, John Mylopoulos, Norman M. Sadeh, Michael J. Shaw, Clemens Szyperski, Richard F. Paige
: Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30-July 4, 2008, Proceedings
: Springer-Verlag
: 9783540698241
: 1
: CHF 50.60
:
: Naturwissenschaft
: English
: 422
: DRM
: PC/MAC/eReader/Tablet
: PDF

This book constitutes the thoroughly refereed proceedings of the 46th International Conference on Objects, Components, Models and Patterns, TOOLS EUROPE 2008, held in Zurich, Switzerland, in June/July 2008. The 21 papers presented in this book were carefully reviewed and selected from 58 submissions. TOOLS played a major role in the spread of object-oriented and component technologies. It has now broadened its scope beyond the original topics of object technology and component-based development to encompass all modern, practical approaches to software development. At the same time, TOOLS kept its traditional spirit of technical excellence, its acclaimed focus on practicality, its well-proven combination of theory and applications, and its reliance on the best experts from academia and industry.

Preface5
Organization7
Table of Contents9
The End of the Computing Era: Hephaestus Meets the Olympians11
Modeling of Component Environment in Presence of Callbacks and Autonomous Activities12
Introduction12
Goals and Structure of the Paper16
Behavior Protocols16
Modeling Environment via Behavior Protocols17
Calling Protocol vs. Callbacks and Autonomous Activities20
Calling20
2220
Construction of Calling and Trigger Protocol23
Tools and Experiments24
Evaluation and Related Work25
Conclusion27
References27
Efficient Model Checking of Networked Applications32
Introduction32
Intuition of the Caching Algorithm33
SoftwareModel Checking33
Handling Redundant Actions After Backtracking34
Extension to More Complex Protocols37
Formalization of the Caching Algorithm37
Stream Abstraction38
Execution Semantics38
Example Execution Scenario39
Limitations of Our Approach41
Implementation42
Experiments43
Example Applications44
Results44
Summary46
Related Work47
Conclusions48
Future Work49
References49
Controlling Accessibility in Agile Projects with the Access Modifier Modifier51
Introduction51
Motivation52
Sufficient and Excessive Accessibility54
Accessibility Status and APIs55
Accessibility Status and Subtyping57
Interface Implementation57
Anonymous Subclasses58
Accessibility and Program Semantics58
Dynamic Binding: Overriding with Open Recursion58
Static Binding: Overloading and the Most Specific Method60
The Access Modifier Modifier Tool60
Full Build61
Incremental Build62
Reducing Accessibility or Adding an @API Annotation62
Increasing Accessibility62
Evaluation63
Usefulness63
Cost65
Discussion65
Related Work66
Future Work67
Conclusion68
References68
Towards Raising the Failure of Unit Tests to the Level of Compiler-Reported Errors70
Introduction70
Problem72
Fault Locators73
Fault Locators Based on Prior Knowledge74
Fault Locators Based on Posterior Knowledge74
Evaluation76
Evaluation Based on Flawed Historical Releases76
Evaluation Based on Error Seeding79
Evaluation in Practice81
Architecture of EZUNIT83
Call Graph Computation83
Adding New Fault Locators84
Other Possible Fault Locators85
Related Work86
Conclusion87
References88
Virtual Machine Support for Stateful Aspects90
Introduction90
Stateful Aspects Examples