2015
DOI: 10.15439/2015f247
|View full text |Cite
|
Sign up to set email alerts
|

Generating Database Access Code From Domain Models

Abstract: Abstract-Automatic processing of requirements (e.g. to generate code) remains a challenge in contemporary software development. Requirements are still treated as secondary artifacts by software developers, as they are written in natural languages which causes ambiguity. In this paper, we present an approach to generate working code from requirements through applying precisely formulated domain models. As the source, we use the Requirements Specification Language (RSL) which is a precise constrained language, b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 13 publications
(16 reference statements)
0
2
0
Order By: Relevance
“…In fact, the actual program realization has been at its heart from the beginning [31] and the foundations laid in OOram appear as very relevant for achieving a necessary flexibility in code as demonstrated by the DCI approach (Data, Context and Interaction), in which roles and role binding are used to depart use cases from more stable parts of software systems [10,30,11]. This is of the utmost interest in the broader area of preserving use cases in code [6,18,24].…”
Section: Oorammentioning
confidence: 99%
“…In fact, the actual program realization has been at its heart from the beginning [31] and the foundations laid in OOram appear as very relevant for achieving a necessary flexibility in code as demonstrated by the DCI approach (Data, Context and Interaction), in which roles and role binding are used to depart use cases from more stable parts of software systems [10,30,11]. This is of the utmost interest in the broader area of preserving use cases in code [6,18,24].…”
Section: Oorammentioning
confidence: 99%
“…Several techniques have been used for this purpose such that automatic source to source error compensation of floating-point programs [17], generating database access code from domain models [18], and generating pseudo-code from source code [19], etc.…”
Section: Introductionmentioning
confidence: 99%