tailieunhanh - Reverse Engineering of Object Oriented Code phần 6
Trường hợp thử nghiệm cuối cùng (4,8 Hình, TC3) cho thấy sự đa dạng của BinaryTreeNode2 (Hình ) cũng có thể được lớn hơn 1. Việc so sánh các sơ đồ trong hình. (bên phải) với điều đó trong hình. 4,3 điểm nổi bật tính chất khác nhau và bổ sung thông tin mà họ cung cấp. | Interaction Diagram Recovery 101 -------------------------- eLib example-------------------------- Let us consider the direct and indirect method calls issued from inside the body of method returnDocument class Library line 66 shown in Table . The first called method isOut in turn invokes method isAvailable from class Document. Method getBorrower second call in returnDocument invokes getUser from class Loan. Finally the last invocation inside returnDocument triggers the execution of four methods reported at the bottom-right of Table . These do not perform any further method invocation. Line Num Called method 68 1 69 2 71 3 Line Num Called method 180 1 Line Num Called method 187 1 Line Num Called method 50 1 Loan getUser 51 2 53 3 54 4 Table . Transitive method calls issued from method returnDocument in class Library. Column Num reports their numbering. Method calls are numbered in Table column Num according to the rules given in Fig. . Let us consider a collaboration diagram focused on method . Computation of the Dewey numbers see Fig. starts with the body of method and an empty Dewey value. The three calls issued inside this method are thus numbered 1 2 3. Procedure numberFocusedCalls is then reapplied to the body of with a current Dewey value equal to 1. The call to isAvailable issued inside is correspondingly numbered . Similarly the call to inside is numbered . Another call to the same method issued from method receives a different Dewey number . The final Dewey numbers produced for the collaboration diagram focused on returnDocument are displayed in Fig. . 102 5 .
đang nạp các trang xem trước