• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jin Xianli and Ma Huadong. A Semantic Description Model of Features for Service Component Using OCL[J]. Journal of Computer Research and Development, 2007, 44(12): 2112-2121.
Citation: Jin Xianli and Ma Huadong. A Semantic Description Model of Features for Service Component Using OCL[J]. Journal of Computer Research and Development, 2007, 44(12): 2112-2121.

A Semantic Description Model of Features for Service Component Using OCL

More Information
  • Published Date: December 14, 2007
  • The semantic features of component are the foundation for component retrievals, and are the emphases of research for component repository. However, since there are a large amount of dynamic distributed service components in the network system, many components may have some kind of relationship or dependence with each other. As a result, how to efficiently describe the relationship between the features of different service components is a vital problem for the components management model, which needs to be further investigated. In this paper, a feature-based semantic description model for component is proposed. First, the presentation models of the feature, the feature space and the component feature space are defined respectively. Then, the association and dependency relations among the features of the components are classified into four groups: self constraint, paternity constraint, dominant constraint and recessive constraint. These four kinds of constraint are formally described by the object constraint language, which provides an accurate semantic support for such model. In order to describe the approach's application a component sub-tree based on features for e-business is studied as a case. The results of the model checking and experiments in the object constraint language environment prove that this model is correct and valid.
  • Related Articles

    [1]Guo Yuhan, Zhang Yu, Shen Xueli, Yu Junyu. Multi-Strategy Solution Space Graph Search Algorithm of Real-Time Ride-Sharing Problem[J]. Journal of Computer Research and Development, 2020, 57(6): 1269-1283. DOI: 10.7544/issn1000-1239.2020.20190484
    [2]Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang. Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search[J]. Journal of Computer Research and Development, 2020, 57(4): 767-777. DOI: 10.7544/issn1000-1239.2020.20190870
    [3]Shen Yijie, Zeng Dan, Xiong Jin. A Benefit Model Based Data Reuse Mechanism for Spark SQL[J]. Journal of Computer Research and Development, 2020, 57(2): 318-332. DOI: 10.7544/issn1000-1239.2020.20190563
    [4]Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng. A Code Reuse Attack Protection Technique Based on Code Anti-Leakage[J]. Journal of Computer Research and Development, 2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    [5]Xie Heng, Wang Mei, Le Jiajin, Sun Li. Calculation Results Characteristics Extract and Reuse Strategy Based on Hive[J]. Journal of Computer Research and Development, 2015, 52(9): 2014-2024. DOI: 10.7544/issn1000-1239.2015.20140548
    [6]Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang. Study of Ahead Branch Prediction Architecture and Algorithm[J]. Journal of Computer Research and Development, 2013, 50(10): 2228-2238.
    [7]Lin Junmin, Wang Wei, Qiao Lin, and Tang Zhizhong. A Cache Replacement Policy Based on Reuse Distance Prediction and Stream Detection[J]. Journal of Computer Research and Development, 2012, 49(5): 1049-1060.
    [8]Zhang Qi, Wang Mei, Le Jiajin, Liu Guohua. Scheduling Algorithm for the Reuse Buffers in Column-Store Data Warehouse Query Execution[J]. Journal of Computer Research and Development, 2011, 48(10): 1942-1950.
    [9]Luo Shutong, Pei Zhili, Zhang Changhai, Jin Ying. A of Feature Reuse Method at Requirement Level Based on Aspect Encapsulation[J]. Journal of Computer Research and Development, 2011, 48(9): 1714-1721.
    [10]Song Shijie, Hu Huaping, Zhou Jiawei, and Jin Shiyao. A Sequential Pattern Mining Algorithm Based on Large-Itemset Reuse[J]. Journal of Computer Research and Development, 2006, 43(1): 68-74.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return