• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lü Jia, Ying Jing, Wu Minghui, Jiang Tao. Crosscutting Invasion and Crosscutting Invariant[J]. Journal of Computer Research and Development, 2008, 45(8): 1408-1416.
Citation: Lü Jia, Ying Jing, Wu Minghui, Jiang Tao. Crosscutting Invasion and Crosscutting Invariant[J]. Journal of Computer Research and Development, 2008, 45(8): 1408-1416.

Crosscutting Invasion and Crosscutting Invariant

More Information
  • Published Date: August 14, 2008
  • Owing to the characteristics of quantification and obliviousness of aspect-oriented language, modular behavioral analysis and modular reasoning are more difficult than that of the traditional paradigms. To deal with crosscutting safety and crosscutting quality in aspect-oriented language, crosscutting modules and affected modules are constrained with pre-conditions and post-conditions, but assigning blame for pre-condition and post-condition failures during the process of crosscutting poses subtle and complex problems. To analyze behavioral effect of a crosscutting concern, the programmer should consider the aspect itself and the part of the system it affects. Furthermore, when several aspects are woven at a same pointcut, the analysis of possible dangerous interferences becomes more complex. Similar to the notion of behavioral subtyping in object-oriented language, a notion of crosscutting invariant is proposed. In order to check the behavioral errors of violating crosscutting invariability and four other simple behavioral errors, an algorithm based on software behavioral contracts is proposed. To formalize this algorithm, crosscutting contract calculus and a set of contract elaboration rules are presented. The contract soundness theorem which ensures the correctness of the contract elaboration process is stated and proved. An example is also represented to show how to use these contract elaboration rules to check and analyze the behavioral errors.
  • Related Articles

    [1]Sun Huaqi, Kang Fei, Shu Hui, Huang Yuyao, Bu Wenjuan. Binary Code Modularization Method Based on Graph Embedding[J]. Journal of Computer Research and Development, 2024, 61(9): 2275-2289. DOI: 10.7544/issn1000-1239.202330337
    [2]Zhao Xingwang, Zhang Yaopu, Liang Jiye. Two-Stage Ensemble-Based Community Discovery Algorithm in Multilayer Networks[J]. Journal of Computer Research and Development, 2023, 60(12): 2832-2843. DOI: 10.7544/issn1000-1239.202220214
    [3]Tan Tian, Ma Xiaoxing, Xu Chang, Ma Chunyan, Li Yue. Survey on Java Pointer Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 274-293. DOI: 10.7544/issn1000-1239.202220901
    [4]Guo Maozu, Dai Qiguo, Xu Liqiu, Liu Xiaoyan. On Protein Complexes Identifying Algorithm Based on the Novel Modularity Function[J]. Journal of Computer Research and Development, 2014, 51(10): 2178-2186. DOI: 10.7544/issn1000-1239.2014.20130538
    [5]Chen Fangyuan, Zhang Dongsong, Liu Cong, Wang Zhiying. Analysis of Inter-Thread Interference on Shared Cache Multi-Core Architectures Based on Instruction Fetch Timing Frame[J]. Journal of Computer Research and Development, 2013, 50(1): 206-217.
    [6]Deng Xiaolong, Wang Bai, Wu Bin, and Yang Shengqi. Modularity Modeling and Evaluation in Community Detecting of Complex Network Based on Information Entropy[J]. Journal of Computer Research and Development, 2012, 49(4): 725-734.
    [7]Xu Shiwei, Zhang Huanguo. Formal Security Analysis on Trusted Platform Module Based on Applied π Calculus[J]. Journal of Computer Research and Development, 2011, 48(8): 1421-1429.
    [8]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [9]Yuan Ning, Wu Xiaojun, Wang Shitong, Yang Jingyu, Josef Kittler. A Face Verification Algorithm Based on Combination of Modular 2DPCA and CSLDA[J]. Journal of Computer Research and Development, 2008, 45(6).
    [10]Zhou Xiaobo, Zhou Jian, Lu Hancheng, and Hong Peilin. Analysis of Delay Model in DTN[J]. Journal of Computer Research and Development, 2008, 45(6).

Catalog

    Article views (709) PDF downloads (447) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return