Aspect-Oriented Software Development with Use Cases

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

C++

     namespacesC++/CF language

    CF (Composition Filter) model         implementation

C-SAW     (Constraint Specification Aspect Weaver) 2nd 3rd 4th 5th 6th

C3

     (crosscutting concerns) 2nd

Caching aspect

    JAC (Java Aspect Components)         instance-level pointcuts 2ndCAESAE

     implementation

CAESAR 2nd 3rd 4th 5th 6th

     ACIs (aspect collaboration interfaces) 2nd 3rd

     advices 2nd 3rd     APPCs (Adaptive Plug and Play Components) 2nd 3rd

     aspect bindings 2nd 3rd

         reusing     aspect implementations 2nd

     aspectual polymorphism 2nd     CBD (collaboration-based decomposition) 2nd

     deployment 2nd

     dynamic deployment 2nd

     instantiation 2nd

     mapping

     most specific wrappers 2nd 3rd

     multi-abstraction aspects 2nd

     open classes 2nd

     pointcuts 2nd 3rd

     virtual classes 2nd

     virtual types 2nd

     weavelets 2nd

         deployment 2nd 3rd 4th 5th 6th 7th

     wrapper recycling 2nd 3rd

calls

     explicit calls

Campo, Marcelo Campo, Marcelo R canonical component models

canonical model

     composition filters Cardone, Richard 2nd

case studies

     application awareness 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     application-level security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

         aspect access control 2nd 3rd

         FTP server 2nd 3rd

         PIM (Personal Information Management) system 2nd 3rd 4th 5th 6th 7th     concern elaboration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

         code identification 2nd 3rd 4th         concern characterizations 2nd 3rd

         impact analysis approaches 2nd         location approaches 2nd

         program task changes 2nd

         tool recommendations 2nd

    model weaving

         Bold Stroke project 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13thCASE tools     UML (Unified Modeling Language) 2nd

Catalysis

categorical relationships

     Cosmos

CBD (collaboration-based decomposition)     CAESAR 2nd

CF

     (Composition Filter) model     abstractions 2nd 3rd

     analyzability     composability 2nd

    concerns

         abstraction 2nd 3rd 4th 5th 6th

     dynamics 2nd

     encapsulation

     evolvability 2nd

     high-level semantics

     implementation-independence 2nd

     implementations 2nd 3rd

     inclining 2nd 3rd

     inter-object crosscutting 2nd 3rd 4th 5th

         superimposition 2nd 3rd 4th

         workflow management 2nd 3rd 4th

     intra-object crosscutting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

         concern instances 2nd 3rd

         document protection 2nd

         message processing 2nd 3rd 4th 5th 6th 7th     misconceptions 2nd 3rd    multiple concerns

         requirement evolution 2nd 3rd 4th 5th 6th 7th 8th

     robustness 2ndCFIST

    CF (Composition Filter) model

         implementation

CFOM (composition filter object model)

channels 2nd

     Piccola

Chiba, Shigeru Chitchyan, Ruzanna 2nd

Clarke, Siobhn 2nd 3rd 4thclass diagrams

     UML (Unified Modeling Language)         structural description

class dictionary files

class graphs

Class Hierarchy Optimization

class loader     Java 2ndclass-level pointcuts

     JAC (Java Aspect Components) 2nd 3rd 4th

class-loader dependent interception

     JMangler

classes    AC (Aspect Component) classes

         JAC (Java Aspect Components) 2nd 3rd

    adapting         composition filters

    classes         unification 2nd 3rd 4th 5th 6th

     crosscutting

     dependency management 2nd

         dependencies

         Extension Object pattern 2nd 3rd 4th

         Factory pattern 2nd 3rd 4th 5th

         indirection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

         modeling benefits 2nd 3rd 4th 5th 6th

         Observer pattern 2nd 3rd 4th 5th 6th 7th 8th

         principles 2nd 3rd

         rigidity levels 2nd

         Visitor pattern 2nd 3rd 4th

    features

         organizing 2nd

    fields

         introductions

     mixins         specialization    open classes

         CAESAR 2nd

     parametric classes    virtual classes

         CAESAR 2nd

     visitor classes

classifier elements

classorder architecture

clear-box AOP systems 2nd

Clement, Andrew Clement, Andy

Clemente, Pedro client-side proxies

clients     marshalling

CME (Concern Manipulation Environment)

Coady, Yvonne 2nd

code

     base code    generating         DSM (Domain-Specific Modeling) 2nd 3rd 4th 5th 6th

     obliviousness

     reusing

code composition

     Hyper/J 2ndcode coverage

     JMangler 2nd 3rd

         CodeCoverTransformer 2nd 3rd 4th 5th 6th 7thcode identification

     concern elaboration 2nd 3rd 4th code tangling

code transformations

     JMangler

code transformers

    JMangler

         BCEL weaver

CodeCoverTransformer

    JMangler

         implementation 2nd 3rd 4th 5th 6th 7th

Cohen, Geoff 2nd

collaboration interfaces

collaboration-based decomposition (CBD)

     CAESAR 2nd

Colyer, Adrian 2nd

communication

    controlling

         ilitiy achievment 2nd 3rdcommunications    controlling

         ilitiy achievment

     intercepting communities

     practioners

     researchers

compiler-based systems

compilers

     AspectJ 2nd 3rd 4th 5th

     high-level specification compilerscomplexity

     reflective systemscomponent algebra

     Piccola forms component engineering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

     future research

     implementation 2nd 3rd

     run-time aspects 2nd 3rd 4th 5th

     specifications 2nd 3rd 4th 5th components    Bold Stroke project

         modeling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

     component engineering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

         future research

         implementation 2nd 3rd         run-time aspects 2nd 3rd 4th 5th

         specifications 2nd 3rd 4th 5th

composability     CF (Composition Filter) model 2nd

Compose*.NET    CF (Composition Filter) model

         implementation

ComposeJ

    CF (Composition Filter) model

         implementation

composer architectures

     aspect definitions

Composite Health Systems (CHCS)

composition

     code reuse

     composition relationships

     contracts

     features

     SOC

         multi-dimensional decomposition 2nd 3rd 4th

     SOC (Separation of Concerns) 2nd

composition bindings    Theme/UML         specifying 2nd

composition filter object model (CFOM)

composition filters 2nd 3rd 4th 5th     analyzability

     application-specific advice

     canonical model

    CF

         (Composition Filter) model

    classes

         adapting     composability

    concerns         abstraction 2nd 3rd 4th 5th 6th

     dynamics     encapsulation

     evolvability

     filters

     high-level semantics

     implementation-independence     implementations 2nd 3rd 4th     inclining 2nd 3rd

     inter-object crosscutting 2nd 3rd 4th 5th

         superimposition 2nd 3rd 4th

         workflow management 2nd 3rd 4th

     intra-object crosscutting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th         concern instances 2nd 3rd

         document protection 2nd

         message processing 2nd 3rd 4th 5th 6th 7th     mechanisms

     misconceptions 2nd 3rd     objects

     reactivity

     robustness

     SOC (Separation of Concerns) 2nd

     types

     wrappers

     wrapping

composition languages

     Piccola

composition mechnaisms

composition output

     Theme/UML 2nd 3rd

         observer aspect design 2nd

composition outputTheme/UML

     synchronization aspect design 2nd

Composition Patterns 2nd 3rd

composition relationships     Hyper/J composition rules

compositional styles

    forms         specifying 2nd 3rd

compositions

     Piccola

         mixin layer composition 2nd 3rd 4th 5th 6th 7th 8th

compositors

concern

     concern elaboration 2nd concern diagrams

concern elaboration 2nd 3rd 4th 5th 6th     AMT 2nd 3rd

     AMT (Aspect Mining Tool) 2nd 3rd     AspectBrowser 2nd 3rd 4th 5th

     case studies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

     code identification 2nd 3rd 4th

     concern characterizations 2nd 3rd

     FEAT 2nd 3rd 4th     impact analysis approaches 2nd     Jex tool 2nd

     location approaches 2nd

     program task changes 2nd

     strategies 2nd

     tool recommendations 2ndconcern instances

     CF (Composition Filter) model 2nd 3rd

Concern Manipulation Environment (CME)concern mappings

     Hyper/J concern modeling 2nd 3rd 4th 5th 6th

     ABAS (attribute-based architectural styles) 2nd

     AOSD 2nd

     AOSD support 2nd

     artifacts

     aspect-orient modeling 2nd 3rd 4th 5th

         AORE (aspect-oriented requirements engineering)

     Cosmos 2nd 3rd 4th

         elements

         GPS cache example 2nd 3rd 4th 5th

     DSSAs (domain-specific software architectures)

     i*

     KAOS

     life cycles

     processes 2nd

     requirements 2nd 3rd

     traditional (non-aspect oriented) modeling 2nd 3rd 4th 5th     Tropos concern specifications

     filter modules

     implementation    superimposition specifications

         (concerns)

concern-shy aspect-oriented programming

     AP (Adaptive Programming)

concern-shy programming

ConcernJ

    CF (Composition Filter) model         implementation

concerns 2nd 3rd 4th 5th 6th 7th 8th    abstraction

         CF (Composition Filter) model 2nd 3rd 4th 5th 6th     C3 (crosscutting concerns) 2nd

    CF (Composition Filter) model

         requirement evolution 2nd 3rd 4th 5th 6th 7th 8th

     concern elaboration 2nd 3rd 4th

         AMT 2nd 3rd         AMT (Aspect Mining Tool) 2nd 3rd         AspectBrowser 2nd 3rd 4th 5th

         case studies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

         code identification 2nd 3rd 4th

         concern characterizations 2nd 3rd

         FEAT 2nd 3rd 4th         impact analysis approaches 2nd

         Jex tool 2nd

         location approaches 2nd         program task changes 2nd

         strategies 2nd         tool recommendations 2nd

     concern modeling 2nd

         AOSD 2nd

     Cosmos

     crosscutting concerns

         DSM (Domain-Specific Modeling) 2nd 3rd 4th

         modeling 2nd 3rd 4th 5th

         modularization methods 2nd

         object-oriented database systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     formilization of 2nd

    instances

         mapping to

    messages

         logging 2nd 3rd 4th

     modularity

     multi-dimensional separation of concerns

     non-functional concerns    orthogonal concerns         modeling 2nd 3rd 4th

     SOC 2nd 3rd 4th 5th 6th 7th 8th 9th

         (separation of concerns) 2nd 3rd         adaptive programming 2nd

         composition 2nd

         composition filters 2nd

         decomposition 2nd

         instatntiation 2nd 3rd 4th 5th 6th 7th

         meta-level programming 2nd

         multi-dimensional SOC 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th         orthogonal SOC

         reuse         SEE (software engineering environment) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

concrete implementations     AspOEv 2nd 3rd 4th

     SADES 2nd

concretization phase (weaving)

concurrency aspects

concurrent bounded buffers     UML (Unified Modeling Language) 2nd 3rd concurrent programming research group (IIT)

condition methods

     implementation objects

conditions

     Java     states

conflict resolution

     aspect interactions 2nd ConnectedRegions

Constraint Specification Aspect Weaver (C-SAW) [See C-SAW (Constraint Specification Aspect Weaver)]constraints

     abstractness constraints 2nd

    Eager/Lazy Evaluation constraints

         Bold Stroke project 2nd 3rd 4th 5th 6th 7th 8th 9th

    introduction of

         UML

     model weaving

     standardization constraints 2nd

constructor propagation

     mixins

contracts

     composition

control extensions

     application awareness

cooperation

    meta-links

         meta-objects 2ndcoordination abstractions     Piccola forms

coordination aspects

CORBA 2nd Cosmos

Cosmos concern-space modeling schema 2nd 3rd 4th

     elements

     GPS cache example 2nd 3rd 4th 5th

     predicates

     relationships

Costanza, Pascal 2nd Cremers, A. B

crosscut specificationscrosscuts

     aspects 2nd crosscutting 2nd

     C3 (crosscutting concerns) 2nd

     classes

    inter-object crosscutting

         CF (Composition Filter) model 2nd 3rd 4th 5th    intra-object crosscutting         CF (Composition Filter) model 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

     multi-abstraction aspect modules

         aspect composition

         aspectual polymorphism 2nd

         reuse of aspect implementation and bindings 2ndcrosscutting behaviors

    Theme/UML

         specifying 2ndcrosscutting behaviours

    Theme/UML         specifying

crosscutting concerns

    database systems

         modularization methods 2nd

     DSM (Domain-Specific Modeling) 2nd 3rd 4th

    modeling

         UML (Unified Modeling Language) 2nd 3rd 4th 5th

     object-oriented database systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

crosscutting concerns (C3) [See C3 (crosscutting concerns)]

crosscutting instructions

custom class loaders

     Java

CycleChecking

Категории