Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2489793.2489797acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecoopConference Proceedingsconference-collections
research-article

L: context-oriented programming with only layers

Published: 02 July 2013 Publication History

Abstract

Most if not all extensions to object-oriented languages that allow for context-oriented programming (COP) are asymmetric in the sense that they assume a base implementation of a system to be composed into classes and a set of layers to provide behavioral variations applied to those classes at run-time. We propose L as an experimental language to further explore the design space for COP languages. In this position paper we talk about first steps towards the unification of classes and layers and with that the removal of the asymmetry in composition mechanisms of contemporary COP implementations.

References

[1]
C. Alexander. The Nature of Order: An Essay on the Art of Building and the Nature of the Universe. Routledge, 2004.
[2]
G. Bracha, P. von der Ahé, V. Bykov, Y. Kashai, W. Maddox, and E. Miranda. Modules as Objects in Newspeak. In Proceedings of ECOOP'10, volume 6183 of Lecture Notes in Computer Science, pages 405--428. Springer, 2010.
[3]
A. Goldberg and D. Robson. Smalltalk-80: The Language and its Implementation. Addison-Wesley, 1983.
[4]
R. Hirschfeld, P. Costanza, and M. Haupt. An Introduction to Context-oriented Programming with ContextS. In Generative and Transformational Techniques in Software Engineering II, volume 5235 of Lecture Notes in Computer Science, pages 396--407. Springer, 2008.
[5]
R. Hirschfeld, P. Costanza, and O. Nierstrasz. Context-oriented Programming. Journal of Object Technology, 7(3):125--151, 2008.
[6]
R. Hirschfeld, A. Igarashi, and H. Masuhara. ContextFJ: A Minimal Core Calculus for Context-oriented Programming. In Proceedings of FOAL'11. ACM, 2011.
[7]
A. Igarashi, R. Hirschfeld, and H. Masuhara. A type system for dynamic layer composition. In Proceedings of FOOL'12. ACM, 2012.
[8]
A. Igarashi, B. C. Pierce, and P. Wadler. Featherweight Java: A Minimal Core Calculus for Java and GJ. ACM Trans. Program. Lang. Syst., 23(3):396--450, May 2001.
[9]
D. H. Ingalls, T. Kaehler, J. Maloney, S. Wallace, and A. Kay. Back to the Future: the Story of Squeak, a Practical Smalltalk Written in Itself. In Proceedings of OOPSLA'97, pages 318--326. ACM, 1997.
[10]
D. H. Ingalls, K. Palacz, S. Uhler, A. Taivalsaari, and T. Mikkonen. The Lively Kernel A Self-supporting System on a Web Page. In Self-Sustaining Systems, volume 5146 of Lecture Notes in Computer Science, pages 31--50. Springer, 2008.
[11]
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. In Proceedings of ECOOP'01, volume 2072 of Lecture Notes in Computer Science, pages 327--353. Springer, 2001.
[12]
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. V. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-oriented programming. In Proceedings of ECOOP'97, volume 1241 of Lecture Notes in Computer Science, pages 220--242. Springer, 1997.
[13]
J. Lincke. Webwerkstatt. http://lively-kernel.org/repository/webwerkstatt/webwerkstatt.xhtml. Accessed: 2013-04-04.
[14]
J. Lincke, M. Appeltauer, B. Steinert, and R. Hirschfeld. An Open Implementation for Context-oriented Layer Composition in ContextJS. Elsevier Journal on Science of Computer Programming, Special Issue on Software Evolution, 2011.
[15]
H. Ossher and P. L. Tarr. CACM, 44(10):43--50, Oct. 2001.
[16]
P. L. Tarr, H. Ossher, W. H. Harrison, and S. M. S. Jr. N Degrees of Separation: Multi-Dimensional Separation of Concerns. In Proceedings of ICSE'99, pages 107--119. IEEE Computer, 1999.
[17]
D. Ungar and R. B. Smith. Self: The Power of Simplicity. In Proceedings of OOPSLA'87, pages 227--242. ACM, 1987.

Cited By

View all
  • (2016)Context-aware securityJournal of Computer Security10.3233/JCS-16055124:4(427-477)Online publication date: 1-Jan-2016
  • (2015)Safe Adaptation Through Implicit Effect CoercionProgramming Languages with Applications to Biology and Security10.1007/978-3-319-25527-9_10(122-141)Online publication date: 20-Nov-2015
  • (2014)A Two-Phase Static Analysis for Reliable AdaptationSoftware Engineering and Formal Methods10.1007/978-3-319-10431-7_28(347-362)Online publication date: 2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
COP '13: Proceedings of the 5th ACM International Workshop on Context-Oriented Programming
July 2013
25 pages
ISBN:9781450320405
DOI:10.1145/2489793
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

  • CNRS: Centre National De La Rechercue Scientifique
  • UM2: University Montpellier 2
  • AITO: Assoc Internationale por les Technologies Objects

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 July 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. context-oriented programming
  2. layers
  3. modularity
  4. sideways composition
  5. software composition

Qualifiers

  • Research-article

Conference

ECOOP '13
Sponsor:
  • CNRS
  • UM2
  • AITO

Acceptance Rates

Overall Acceptance Rate 17 of 25 submissions, 68%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Context-aware securityJournal of Computer Security10.3233/JCS-16055124:4(427-477)Online publication date: 1-Jan-2016
  • (2015)Safe Adaptation Through Implicit Effect CoercionProgramming Languages with Applications to Biology and Security10.1007/978-3-319-25527-9_10(122-141)Online publication date: 20-Nov-2015
  • (2014)A Two-Phase Static Analysis for Reliable AdaptationSoftware Engineering and Formal Methods10.1007/978-3-319-10431-7_28(347-362)Online publication date: 2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media