Flylib.com
The Object Constraint Language: Getting Your Models Ready for MDA (2nd Edition)
The Object Constraint Language: Getting Your Models Ready for MDA (2nd Edition)
ISBN: 0321179366
EAN: 2147483647
Year: 2003
Pages: 137
Authors:
Jos Warmer
,
Anneke Kleppe
BUY ON AMAZON
Main Page
Table of content
Copyright
Praise for The Object Constraint Language, Second Edition
The Addison-Wesley Object Technology Series
The Component Software Series
List of Figures
List of Tables
Foreword to the First Edition
Foreword to the Second Edition
Preface and Introduction
Who Should Read This Book
How This Book Should Be Used
Typeface Conventions
Information on Related Subjects
Acknowledgments
Part 1: User Manual
Chapter 1. MDA and the Use of OCL
1.1 Introducing OCL
1.2 Model Driven Architecture
1.3 Modeling Maturity Levels
1.4 Building Better Models
1.5 Characteristics of OCL
1.6 Summary
Chapter 2. OCL By Example
2.1 The Royal and Loyal System Example
2.2 Adding Extra Information
2.3 Adding Invariants
2.4 Working with Collections of Objects
2.5 Adding Preconditions and Postconditions
2.6 Taking Inheritance into Account
2.7 Comments
2.8 Let Expressions
2.9 Summary
Chapter 3. Building Models with OCL
3.1 What Is a Model?
3.2 Use UML Diagrams as a Base
3.3 Completing Class Diagrams
3.4 Completing Interaction Diagrams
3.5 Completing Statecharts
3.6 Completing Activity Diagrams
3.7 Completing Component Diagrams
3.8 Completing Use Cases
3.9 Modeling Styles
3.10 Tips and Hints
3.11 Summary
Chapter 4. Implementing OCL
4.1 Implementation Process
4.2 Implementing UML Model Elements
4.3 Implementing the OCL Standard Library
4.4 Implementing OCL Expressions
4.5 Merging Code Fragments
4.6 Considerations for Constraints
4.7 Summary
Chapter 5. Using OCL for MDA
5.1 Relation of OCL to MDA
5.2 Metamodels
5.3 The OCL and UML Metamodels
5.4 Using OCL to Define Languages
5.5 Using OCL to Define Transformations
5.6 Summary
Part 2: Reference Manual
Chapter 6. The Context of OCL Expressions
6.1 A Combined Model
6.2 Classes and Other Types
6.3 Attributes and Association Ends
6.4 Operations
6.5 Expressions in Behavior Diagrams
6.6 Use Cases
6.7 Constraints and Inheritance
Chapter 7. Basic OCL Elements
7.1 Expressions, Types, and Values
7.2 Basic Types and Operators
7.3 Precedence Rules
7.4 Use of Infix Operators
7.5 Comments
Chapter 8. User-defined Types
8.1 Features of User-Defined Types
8.2 Associations and Aggregations
8.3 Enumeration Types
Chapter 9. Collection Types
9.1 The Collection Types
9.2 Operations on Collection Types
9.3 Loop Operations or Iterators
Chapter 10. Advanced Constructs
10.1 Constructs for Postconditions
10.2 Operations of the OclMessage Type
10.3 Packaging Expressions
10.4 Local Variables
10.5 Tuples and Tuple Types
10.6 Undefined Values, the OclVoid Type
10.7 Retyping or Casting
10.8 Type Conformance Rules
10.9 Accessing Overriden Features
10.10 The OclAny Type
Appendix A. Glossary
Glossary
Appendix B. OCL Grammar Rules
B.1 EBNF Rules for Context Declaration
B.2 EBNF Rules for Expression
Appendix C. A Business Modeling Syntax for OCL
C.1 Introduction
C.2 Informal Definition
C.3 Some Remarks on the Resemblance to SQL
C.4 More Elaborate Examples
Appendix D. Example Implementation
Appendix E. Differences Between OCL Versions 1.1 and 2.0
E.1 Syntax Changes
E.2 New Types
E.3 Extra Predefined Operations
E.4 New Options in Postconditions
E.5 Other Changes
Bibliography
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
The Object Constraint Language: Getting Your Models Ready for MDA (2nd Edition)
ISBN: 0321179366
EAN: 2147483647
Year: 2003
Pages: 137
Authors:
Jos Warmer
,
Anneke Kleppe
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
Building the Final Report
Security Incident Response Team (SIRT)
Notice
Conclusions
High-Speed Signal Propagation[c] Advanced Black Magic
Discrete Time Mapping
Pcb Signal Propagation
Importance of Terminating Clock Lines
Driving Multiple Loads with Source Termination
Power and Ground Resonance
The Complete Cisco VPN Configuration Guide
ISAKMP/IKE Phase 1
Troubleshooting Problems
Router ISAKMP/IKE Phase 1 Connectivity
IPsec Preparation
IPsec Remote Access and L2L Sessions on the Same Router
An Introduction to Design Patterns in C++ with Qt 4
Style Guidelines and Naming Conventions
Overloading, Hiding, and Overriding
Review Questions
tr() and Internationalization
QActions, QMenus, and QMenuBars
Twisted Network Programming Essentials
Installing Twisted
Calling SOAP Web Services
Looking Up the SMTP Server for a Domain
NNTP Clients and Servers
SSH
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Authentication, Authorization, and Accounting (AAA)
Troubleshooting AAA
AIP-SSM Module Software Recovery
Public Key Infrastructure (PKI)
Case Study 2: Large Enterprise Firewall, VPN, and IPS Deployment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies