Managing Feature Interaction by Documenting and Enforcing Dependencies in Software Product Lines

被引:0
作者
Silva Filho, Roberto Silveira [1 ]
Redmiles, David F. [1 ]
机构
[1] Bren Sch Informat & Comp Sci, Dept Informat, Irvine, CA 92697 USA
来源
FEATURE INTERACTIONS IN SOFTWARE AND COMMUNICATION SYSTEMS IX | 2008年
关键词
Feature interaction; software product lines; product line documentation; contextual component frameworks; software dependencies; and publish/subscribe infrastructures;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software product line engineering provides a systematic approach for the reuse of software assets in the production of similar software systems. For such it employs different variability modeling and realization approaches ill the development of common assets that are extended and configured with different features. The result IS usually generalized and complex Implementations that may hide important dependencies and design decisions. Therefore, whenever software engineers need to extend the software product line assets, there may be dependencies in the code that, if not made explicit and adequately managed, can lead to feature interference Feature interference happens when a combined set of features that extend a shared piece of code fail to behave as expected Our experience in the development of YANCEES, a highly extensible and configurable publish/subscribe infrastructure product line, shows that the main sources of feature interference in this domain are the inadequate documentation and management of software dependencies. In this paper, we discuss those issues in detail, presenting the strategies adopted to manage them. Our approach employs a contextual plug-in framework that, through the explicit annotation and management of dependencies in the software product line assets, better Supports software engineers in their extension and configuration.
引用
收藏
页码:33 / 48
页数:16
相关论文
共 28 条
[1]   Composing crosscutting concerns using composition filters - Supporting both intraclass and interclass crosscutting through model extension. [J].
Bergmans, L ;
Aksit, M .
COMMUNICATIONS OF THE ACM, 2001, 44 (10) :51-57
[2]  
Birsan D., 2005, ACM Queue, V3, P40, DOI 10.1145/1053331.1053345
[3]  
BOSCH J, 1999, TC2 1 WORK IFIP C SO
[4]  
BOWEN TF, 1989, SOFTW ENG TEL SWITCH
[5]  
BRYANT A, 2002, 1 INT C ASP OR SOFTW
[6]   Commonality and variability in software engineering [J].
Coplien, J ;
Hoffman, D ;
Weiss, D .
IEEE SOFTWARE, 1998, 15 (06) :37-+
[7]  
CZAMECKI K, 2000, GENERATIVE PROGRAMMI
[8]   In the eye of the beholder: A visualization-based approach to information system security [J].
de Paula, R ;
Ding, XH ;
Dourish, P ;
Nies, K ;
Pillet, B ;
Redmiles, DF ;
Ren, H ;
Rode, JA ;
Silva, R .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) :5-24
[9]  
Deelstra S, 2004, LECT NOTES COMPUT SC, V3154, P165
[10]  
DINGEL J, 1998, 6 INT S FDN SOFTW EN