skip to main content
article
Free Access

Why significant UML change is unlikely

Authors Info & Claims
Published:01 November 2002Publication History
Skip Abstract Section

Abstract

Reform may be too little too late to spare software engineers the cognitively overwhelming effort of applying UML to modeling system structure and behavior in a truly unified manner.

References

  1. Dori, D. Object-Process Methodology: A Holistic Systems Paradigm. Springer Verlag, Berlin, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Dori, D., Reinhartz-Berger, I., and Sturm, A. OPCAT Object-Process CASE Tool, Version 2.02, 2002; see iew3.technion.ac.il/~dori/opcat/ index-continue.html.Google ScholarGoogle Scholar
  3. Heylighen, F. Principia Cybernetica Web. Vrije Universiteit Brussel, Brussels, Belgium, 2001; see pespmc1.vub.ac.be/HEYL.html.Google ScholarGoogle Scholar
  4. Object Management Group. Sight Code Initial Submission Against the UML 2.0 Infrastructure RFP, OMG Document ad/01-08-23, 2001; see www.omg.org/cgi-bin/doc?ad/2001-08-23.Google ScholarGoogle Scholar
  5. Peleg, M. and Dori, D. The model multiplicity problem: Experimenting with real-time specification methods. IEEE Transact. Soft. Engin. 26, 8 (2000), 742--759. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Siau, K. and Cau, C. Unified Modeling Language: A complexity analysis. J. Database Mgmt. 12, 1 (Jan.--Mar. 2001), 26--34.Google ScholarGoogle Scholar
  7. Simons, T. Dependencies and associations. Precise UML Group Email Forum (June 21, 2001); see www.cs.york.ac.uk/puml/puml-list-archive/0310.html.Google ScholarGoogle Scholar
  8. Soffer, P., Golany, B., Dori, D., and Wand, Y. Modeling off-the-shelf information systems requirements: An ontological approach. Requir. Engin. 6, 3 (2001), 183--199.Google ScholarGoogle ScholarCross RefCross Ref
  9. U2 Partners. UML2 Draft Version 0.671 (Jan. 30, 2002); see www.u2-partners.org/.Google ScholarGoogle Scholar

Index Terms

  1. Why significant UML change is unlikely

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 45, Issue 11
              November 2002
              97 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/581571
              Issue’s Table of Contents

              Copyright © 2002 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 November 2002

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format