Flylib.com
Aspect-Oriented Analysis and Design: The Theme Approach
Aspect-Oriented Analysis and Design: The Theme Approach
ISBN: 0321246748
EAN: 2147483647
Year: 2006
Pages: 109
Authors:
Siobhu00e1n Clarke
,
Elisa Baniassad
BUY ON AMAZON
Aspect-Oriented Analysis and Design: The Theme Approach
Table of Contents
Copyright
Praise for Aspect-Oriented Analysis and Design
The Addison-Wesley Object Technology Series
The Component Software Series
Preface
Audience
History of Aspect-Oriented Analysis and Design and The Theme Approach
How to Read This Book
Acknowledgments
About the Authors
Siobhn Clarke
Elisa Baniassad
Chapter 1. Introduction
Software Development and the Object-Oriented Paradigm
The Case for Aspects
What Is an Aspect?
Why Consider Aspects in Analysis and Design?
Aspects and Other Concerns
The Theme Approach
Applying the Theme Approach
Theme: Symmetric or Asymmetric?
Fitting Theme into Your Existing Development Process
What About Implementation?
Summary
Chapter 2. The Object-Oriented Way
Differing Units of Interest
Expressions Example
Accommodating Evolution
Summary
Chapter 3. The Theme Approach
Structure and Relationships of Themes
Theme Process Overview
Finding the Themes
Designing the Themes
Composing the Themes
Revisiting Evolution
What Is the Right Size for a Theme?
Fitting Theme into Your Existing Development Process
Summary
Chapter 4. Analysis
ThemeDoc Views and Tool Support
Overview of the ThemeDoc Process
Deciding on the Themes
Deciding on Theme Responsibilities
Knowing When You re Done
Planning for Design
Summary
Chapter 5. Theme Design
Overview of Designing with ThemeUML
Designing Base Themes
Designing Crosscutting Themes
Summary
Chapter 6. Theme Composition
Overview of Composing Themes
Composing Game Themes
Matching Design Elements
Integration Options
Resolving Conflicts
Binding to Crosscutting Themes
Some Comments on Process
Summary
Chapter 7. Map to Implementation
AspectJ
AspectWerkz
Concern Manipulation Environment
Summary
Chapter 8. Case Study: Phone Features
Analyzing Requirements and Identifying Initial Themes
Refining the Themes
Identifying Crosscutting Themes
Designing the Concept Sharing Themes
Designing the Crosscutting Themes
Summary
Chapter 9. Case Study 2: Usage Licensing
Requirements
Refining the Set of Themes
Dividing Behavioral Responsibilities
Designing the Themes
Looking at Code
Summary
Appendix.The Crystal Game
Requirements for the Crystal Game
Bibliography
Inside Front Cover
Inside Back Cover
Index
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
U
V
Aspect-Oriented Analysis and Design: The Theme Approach
ISBN: 0321246748
EAN: 2147483647
Year: 2006
Pages: 109
Authors:
Siobhu00e1n Clarke
,
Elisa Baniassad
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
CMS and S/MIME
Appendix A Solutions to Exercises
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.2 Passphrase Considerations
Step 4.4 How to Generate a Key Using PuTTY
Step 4.5 How to use OpenSSH Passphrase Agents
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Team change
Organizational change
Mergers and acquisitions
Cultural change
Competency-Based Human Resource Management
A Need for Implementing Competency-Based HR Management
Competency-Based Employee Recruitment and Selection
Competency-Based Performance Management
Competency-Based Employee Development
Appendix D Employee Development and Succession Management
An Introduction to Design Patterns in C++ with Qt 4
Destructors
Validation and Regular Expressions
Virtual Pointers and Virtual Tables
Appendix B. Standard Headers
Section C.4. Qt Assistant and Designer
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 4. Connect Linux with a Bluetooth Phone
Hack 26. Find and Join Wireless Networks with AP Radar
Hack 54. Boot from a Compact Flash Hard Drive
Hack 57. The NoCat Night Light
Section A.4. 802.11g: Like 802.11b, only Faster
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies