Source transformations, like binary transformations, rewrite portions of an application to introduce new functionality. The difference is that source transformations operate on the source code whereas binary transformations operate at the object or machine code.
Source patch files.
A scenario that illustrates a problem and how the different elements of the mechanism solve the problem. The scenario will help you understand the more abstract description of the mechanism below.
What are the situations in which the mechanism can be applied? What are examples of poor designs that the mechansim can address? How can you recognize these situations?
- An applicable situation
The elements participating in the mechanism and their responsibilities.
- Participant Name: Responsibility for what
How the participants collaborate to carry out their responsibilities.
Source transformations have the following benefits:
- They are composable.
- They act as application-level behavior mix-ins.
- They simplify analysis.
Source transformations have the following limitations:
- They require access to source code.
- They confound debugging.
What pitfalls, hints, or techniques should you be aware of when implementing the mechanism? Are there language-specific issues?
- Description of Bullet
Jack C. Wileden's PolySpin and JavaSpin are examples of the source transformation mechanism. Refine is a second example.
Back to the Adaptation home page. This page maintained by Peyman Oreizy (peymano at ics.uci.edu). Last updated on .