27.03.2014 Views

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

software design, such as decoupling of elements or ease<br />

of maintenance. The final model will, most likely, be very<br />

different from the one created by a person. Yet, apart its<br />

limitations, this is a novel approach to framework use, in<br />

which a transformation method identifies how the framework<br />

can be used by an application. It allows the reuse of framework<br />

knowledge by different people, since once modeled, the framework<br />

can be used by any other person in different projects.<br />

Future work will focus on ways to remove, or at least<br />

reduce, the limitations described above. We also plan to<br />

investigate what impacts the use of more complex planners<br />

may have on the transformed models. Another question that<br />

will need to be addressed in the future is the use of multiple<br />

frameworks. The use of multiple frameworks is common<br />

enough in software development for it not to be ignored,<br />

but it brings its own set of problems [15], such as possible<br />

architectural incompatibilities for instance. Future versions of<br />

this method will seek ways to identify incompatibility between<br />

frameworks, and ideally, ways to circumvent them.<br />

REFERENCES<br />

[1] M. E. Fayad and D. C. Schmidt, “Object-Oriented Application Frameworks,”<br />

Communications of the ACM, vol. 40, no. 10, pp. 32–38, 1997.<br />

[2] R. E. Johnson, “Frameworks = Patterns + Components,” Communications<br />

of the ACM, vol. 40, no. 10, pp. 39–42, 1997.<br />

[3] K. Czarnecki and S. Helsen, “Classification of model transformation approaches,”<br />

in <strong>Proceedings</strong> of the 2nd OOPSLA Workshop on Generative<br />

Techniques in the Context of the Model Driven Architecture. Citeseer,<br />

2003, pp. 1–17.<br />

[4] S. Schönberger, R. K. Keller, and I. Khriss, “Algorithmic support<br />

for model transformation in object-oriented software development,”<br />

Concurrency and Computation: Practice and Experience, vol. 13, no. 5,<br />

pp. 351–383, 2001. [Online]. Available: http://dx.doi.org/10.1002/cpe.<br />

555<br />

[5] D. Varró and Z. Balogh, “Automating model transformation by<br />

example using inductive logic programming,” in <strong>Proceedings</strong> of the<br />

2007 ACM symposium on Applied computing, ser. SAC ’07. New<br />

York, NY, USA: ACM, 2007, pp. 978–984. [Online]. Available:<br />

http://doi.acm.org/10.1145/1244002.1244217<br />

[6] G. Engels, R. Hucking, S. Sauer, and A. Wagner, “UML Collaboration<br />

Diagrams and Their Transformation to JAVA,” pp. 473–488, 1999.<br />

[7] T. Behrens and S. Richards, “StateLator - Behavioral Code Generation<br />

as an Instance of a Model Transformation,” in Advanced Information<br />

<strong>Systems</strong> Engineering, ser. Lecture Notes in Computer Science,<br />

B. Wangler and L. Bergman, Eds. Springer Berlin / Heidelberg, 2000,<br />

vol. 1789, pp. 401–416. [Online]. Available: http://dx.doi.org/10.1007/<br />

3-540-45140-4\ 27<br />

[8] R. E. Fikes and N. J. Nilsson, “Strips: A new approach to<br />

the application of theorem proving to problem solving,” Artificial<br />

Intelligence, vol. 2, no. 3-4, pp. 189–208, 1971. [Online]. Available:<br />

http://linkinghub.elsevier.com/retrieve/pii/0004370271900105<br />

[9] A. Tate, “Generating project networks,” in <strong>Proceedings</strong> of the 5th<br />

international joint conference on Artificial intelligence - Volume 2. San<br />

Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 1977, pp. 888–<br />

893.<br />

[10] P. Bertoli, M. Pistore, and P. Traverso, “Automated composition of Web<br />

services via planning in asynchronous domains,” Artificial Intelligence,<br />

vol. 174, no. 3-4, pp. 316–361, Mar. 2010. [Online]. Available:<br />

http://linkinghub.elsevier.com/retrieve/pii/S0004370209001489<br />

[11] E. Martínez and Y. Lespérance, “Web service composition as a planning<br />

task: Experiments using knowledge-based planning,” in <strong>Proceedings</strong> of<br />

the ICAPS-2004 Workshop on Planning and Scheduling for Web and<br />

Grid Services, 2004, pp. 62–69.<br />

[12] D. Berardi, D. Calvanese, G. De Giacomo, M. Lenzerini, and M. Mecella,<br />

“Automatic service composition based on behavioral descriptions,”<br />

International Journal of Cooperative Information <strong>Systems</strong>, vol. 14, no. 4,<br />

pp. 333–376, 2005.<br />

[13] G. Caldiera and V. R. Basili, “Identifying and qualifying reusable<br />

software components,” Computer, vol. 24, no. 2, pp. 61–70, 1991.<br />

[14] F. Parisi-Presicce, “A rule-based approach to modular system design,”<br />

in Software Engineering, 1990. <strong>Proceedings</strong>., 12th International Conference<br />

on, Mar. 1990, pp. 202–211.<br />

[15] D. Garlan, R. Allen, and J. Ockerbloom, “Architectural Mismatch: Why<br />

Reuse Is Still So Hard,” Software, IEEE, vol. 26, no. 4, pp. 66–69, 2009.<br />

569

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!