Computer Science ›› 2020, Vol. 47 ›› Issue (3): 19-24.doi: 10.11896/jsjkx.190100046
Special Issue: Intelligent Software Engineering
• Intelligent Software Engineering • Previous Articles Next Articles
JI Cheng-yu,ZHU Xue-feng
CLC Number:
[1] GAMMA E,HELM R,JOHNSON R,et al.Design Patterns:Ele- ments of Reusable Object Oriented Software [M].Addison-Wesley,1995. [2] HOU D,HOOVER H J.Using SCL to specify and check design intent in source code [J].IEEE Transactions on Software Engineering,2006,32(6):404-423. [3] SHI N,OLSSON R A.Reverse Engineering of Design Patterns from Java Source Code[C]∥IEEE/ACM International Conference on Automated Software Engineering.IEEE,2007:123-134. [4] KIM D K,LU L.Inference of Design Pattern Instances in UML models via Logic Programming[C]∥IEEE International Conference on Engineering of Complex Computer Systems.IEEE,2006:47-56. [5] DONG J,ALENCAR P S C,COWAN D D.A behavioral analysis and verification approach to pattern-based design composition [J].Software and Systems Modeling,2004,3(4):262-272. [6] DONG J,PENG T,ZHAO Y.Automated verification of security pattern compositions [J].Information and Software Technology,2010,52(3):274-295. [7] DONG J,PENG T,ZHAO Y.On Instantiation and Integration Commutability of Design Pattern [J].The Computer Journal,2011,54(1):164-184. [8] TAIBI T,NGO D C L.Formal Specification of Design Patterns- A Balanced Approach[C]∥Acs/ieee International Conference on Computer Systems & Applications.IEEE,2003:14-18. [9] TAIBI T.Formalising design patterns composition [J].IEE Proceedings-Software,2006,153(3):127-136. [10]TAIBI T,NGO D C L.Formal specification of design pattern combination using BPSL [J].Information and Software Technology,2003,45(3):157-170. [11] BAYLEY I,ZHU H.Specifying behavioural features of design patterns[C]∥IEEE International Computer Software & Applications Conference.Oxford Brookes University,2008:203-210. [12] BAYLEY I,ZHU H.A formal language of pattern composition[C]∥Proceedings of The 2nd International Conferences on Pervasive Patterns and Applications.Portugal,2010:1-6. [13] ZHU H.An institution theory of formal meta-modelling in graphically extended BNF [J].Frontiers of Computer Science,2012,6(1):40-56. [14] ZHU H,BAYLEY I.An algebra of design patterns [J].ACM Transactions on Software Engineering and Methodology,2013,22(3):1-35. [15] ZHU H,BAYLEY I.Laws of pattern composition[C]∥International Conference on Formal Engineering Methods & Software Engineering.Springer-Verlag,2010:630-645. [16] ZHU H,BAYLEY I.On the Composability of Design Patterns [J].IEEE Transactions on Software Engineering,2015,41(11):1138-1152. [17] BENNETT M,BACLAWSKI K,BENNETT M.Ontology de- sign patterns and semantic abstractions in ontology integration [J].Applied Ontology,2017,12(3/4):341-349. [18] LUCIA A D,DEUFEMIA V,GRAVINO C,et al.Detecting the Behavior of Design Patterns through Model Checking and Dynamic Analysis [J].Acm Transactions on Software Engineering &Methodology,2018,26(4):1-41. [19] CACHO N,CLAUDIO S,FIGUEIREDO E,et al.Blending design patterns with aspects:A quantitative study [J].Journal of Systems and Software,2014,98(23):117-139. [20] HUSSAIN S,KEUNG J,KHAN A A.Software design patterns classification and selection using text categorization approach [J].Applied Soft Computing,2017,58(6):225-244. [21]DWIVEDI A K,TIRKEY A,RATH S K.Software design pattern mining using classification-based techniques [J].Frontiers of Computer Science,2018,12(1):1-15. |
[1] | GUO Yan-yan, ZHANG Nan and TONG Xiang-rong. Survey on Formal Semantics of UML Sequence Diagram [J]. Computer Science, 2017, 44(2): 17-30. |
[2] | ZHANG Chi, HUANG Zhiqiu and DING Zewen. Research on Static Analysis Formalism Supporting Abstract Interpretation [J]. Computer Science, 2017, 44(12): 126-130. |
[3] | MA Yuan-yuan, CHEN Zhe, WANG Chen, FEI Jia-xuan and HUANG Xiu-li. Security Analysis Model of Power Intelligent Unit Transmission Protocols [J]. Computer Science, 2016, 43(Z11): 329-337. |
[4] | CHEN Guang-ying, HUANG Zhi-qiu, CHEN Zhe and KAN Shuang-long. Safety Analysis of Slat and Flap Control Unit for DO-333 [J]. Computer Science, 2016, 43(5): 150-156. |
[5] | LV Xing-li, SHI Zhi-ping, LI Xiao-juan, GUAN Yong, YE Shi-wei and ZHANG Jie. Higher-order Logic Formalization of Basic Theory of Continuous Fourier Transform [J]. Computer Science, 2015, 42(4): 31-36. |
[6] | GU Hui, ZHANG Wei-xing, JIN Peng and GU Jie-jie. Method of Software Design Patterns Identification Based on Correlation and Feature Constraints [J]. Computer Science, 2015, 42(2): 173-176. |
[7] | ZHANG Shuo and HE Fei. Research Advances in Runtime Verification [J]. Computer Science, 2014, 41(Z11): 359-363. |
[8] | CHEN Yi-hai and MIAO Huai-kou. Comparison of Tabular Notations [J]. Computer Science, 2014, 41(3): 23-26. |
[9] | XU Han-bin,ZHANG Xue-lin,ZHENG Xiao-mei,ZHANG Tian and LI Xuan-dong. UML Design Pattern Recognition Method Based on Structured Query [J]. Computer Science, 2014, 41(11): 50-55. |
[10] | GU Hui and ZHANG Wei-xing. Method of Design Patterns Definition Based on XML Schema Technology [J]. Computer Science, 2014, 41(1): 254-257. |
[11] | GUO Yan-yan and LIU Jing-lei. Formalization for Model Element of UML Statechart in RSL [J]. Computer Science, 2013, 40(5): 177-183. |
[12] | . Research on Improved FCC Algorithm in Network and Information Security [J]. Computer Science, 2013, 40(1): 136-138. |
[13] | . UMI. Based Software Requirement Modeling for Automatic Train Protection [J]. Computer Science, 2012, 39(Z6): 478-481. |
[14] | . Method for Generating Formal System Model Based on Scenarios Analysis [J]. Computer Science, 2012, 39(8): 136-140. |
[15] | . Specification and Compatibility Verification of Timing Behavior in Components [J]. Computer Science, 2012, 39(10): 143-147. |
|