Flylib.com
List of Figures
Previous page
Table of content
Chapter 1: Classes
Figure 1-1: Class notation
Figure 1-2: Alternate class notations
Figure 1-3: Sample classes
Figure 1-4: Class responsibilities
Figure 1-5: UML object notation
Figure 1-6: Visibility
Figure 1-7: Attribute details
Figure 1-8: Operation details
Figure 1-9: Precondition
Figure 1-10: Postcondition
Figure 1-11: Abstract class
Figure 1-12: Active class
Figure 1-13: Provided interfaces
Figure 1-14: Required interfaces
Figure 1-15: Provided/required interface
Figure 1-16: Ports and connectors
Figure 1-17: Properties
Figure 1-18: Parts
Figure 1-19: Ports and parts
Figure 1-20: Behavior port
Figure 1-21: Collaborations
Figure 1-22: Collaboration with internal structure
Figure 1-23: Collaboration occurrence
Figure 1-24: Auxiliary and focus stereotypes
Figure 1-25: Data types
Figure 1-26: Enumeration
Figure 1-27: Stereotype as stereotype
Chapter 2: Class Relationships
Figure 2-1: Binary associations
Figure 2-2: N-ary association
Figure 2-3: One-way navigation between classes
Figure 2-4: Named association
Figure 2-5: Association roles
Figure 2-6: Association multiplicity
Figure 2-7: Aggregation notation
Figure 2-8: Aggregating multiple classes
Figure 2-9: Self-aggregation
Figure 2-10: Aggregations
Figure 2-11: Composition
Figure 2-12: Generalization notation
Figure 2-13: Generalizing multiple classes
Figure 2-14: Generalization
Figure 2-15: Powertype
Figure 2-16: Dependency
Figure 2-17: Usage dependency
Figure 2-18: Create dependency
Figure 2-19: Instantiation
Figure 2-20: Abstraction dependency
Figure 2-21: Derivation dependency
Figure 2-22: Realization dependency
Figure 2-23: Refinement dependency
Figure 2-24: Trace dependency
Figure 2-25: Permission dependency
Figure 2-26: Substitution dependency
Figure 2-27: Association class
Chapter 3: Class and Object Diagrams
Figure 3-1: Domain-level class diagram
Figure 3-2: Analysis-level class diagram
Figure 3-3: Expansion of analysis-level class diagram
Figure 3-4: High-level design class diagram
Figure 3-5: Low-level design class diagram
Figure 3-6: Object diagram
Chapter 4: Use Cases
Figure 4-1: Actors (primary notation)
Figure 4-2: Actors (secondary notation)
Figure 4-3: Use cases (primary notation)
Figure 4-4: Subject owning use case
Figure 4-5: Include
Figure 4-6: Extend
Figure 4-7: Explaining a use case extension
Figure 4-8: Use cases (secondary notation)
Figure 4-9: Use case generalization
Figure 4-10: Use case diagram
Chapter 5: Packages
Figure 5-1: Package (no members shown)
Figure 5-2: Package (members shown internally)
Figure 5-3: Package (members shown externally)
Figure 5-4: Element import and access
Figure 5-5: Element import with alias
Figure 5-6: Package import
Figure 5-7: Package merge
Figure 5-8: Package diagram
Chapter 6: Events, Actions, and Activities
Figure 6-1: Signals
Figure 6-2: Reception
Figure 6-3: Send dependency
Figure 6-4: Actions
Figure 6-5: Local precondition
Figure 6-6: Local postcondition
Figure 6-7: Pins
Figure 6-8: Call behavior action invoking activity
Figure 6-9: Send signal action
Figure 6-10: Accept signal action
Figure 6-11: Accept time event action
Figure 6-12: Exceptions
Figure 6-13: Complex activity
Figure 6-14: Initial node
Figure 6-15: Flow final node
Figure 6-16: Activity final node
Figure 6-17: Decision node
Figure 6-18: Decision input
Figure 6-19: Merge node
Figure 6-20: Fork node
Figure 6-21: Join node
Figure 6-22: Exception handler
Figure 6-23: Object nodes
Figure 6-24: Data store node
Figure 6-25: Activity edge
Figure 6-26: Activity edge with connectors
Figure 6-27: Swimlanes
Figure 6-28: Interruptible activity region
Figure 6-29: Structured activity node
Figure 6-30: Expansion region
Figure 6-31: Expansion region with one node
Figure 6-32: Activity diagram
Figure 6-33: Design package with activity diagram
Chapter 7: State Machines
Figure 7-1: States
Figure 7-2: Transitions
Figure 7-3: Guards
Figure 7-4: Entry action
Figure 7-5: Exit action
Figure 7-6: Deferred event
Figure 7-7: Entry point
Figure 7-8: Exit point
Figure 7-9: Initial state
Figure 7-10: Final state
Figure 7-11: Choice
Figure 7-12: Fork
Figure 7-13: Join
Figure 7-14: Junction
Figure 7-15: Shallow history
Figure 7-16: Terminate pseudostate
Figure 7-17: Sequential substates
Figure 7-18: Concurrent substates
Figure 7-19: Submachine state
Figure 7-20: State machine diagram
Figure 7-21: Design package with state diagram
Chapter 8: Interactions
Figure 8-1: Lifelines
Figure 8-2: Combined fragment
Figure 8-3: Interaction operands
Figure 8-4: Continuations
Figure 8-5: Stop
Figure 8-6: Interaction occurrence
Figure 8-7: Part decomposition
Figure 8-8: Sequence diagram
Figure 8-9: Communication diagram
Figure 8-10: Design package with sequence and collaboration diagrams
Figure 8-11: Interaction overview diagram
Figure 8-12: Timing diagram
Chapter 9: Components, Deployment, and Higher-Level Modeling
Figure 9-1: Component
Figure 9-2: Component (alternate notation)
Figure 9-3: Realization dependency
Figure 9-4: Component diagram for Web server
Figure 9-5: Component diagram for application server
Figure 9-6: Implementation package
Figure 9-7: Artifacts
Figure 9-8: Manifestation
Figure 9-9: Nodes
Figure 9-10: Devices
Figure 9-11: Execution environment
Figure 9-12: Deployment specification
Figure 9-13: Deployment diagram
Figure 9-14: Deployment package
Figure 9-15: Framework
Figure 9-16: Subsystems
Chapter 10: Profiles, Templates, and Information Flows
Figure 10-1: Profile applications
Figure 10-2: Extension
Figure 10-3: Binding
Figure 10-4: Bound package
Figure 10-5: Bound collaboration
Figure 10-6: Information item
Figure 10-7: Information flow
Previous page
Table of content
Fast Track UML 2.0
ISBN: 1590593200
EAN: 2147483647
Year: 2004
Pages: 97
Authors:
Kendall Scott
,
Apress
BUY ON AMAZON
Network Security Architectures
Network Security Is a System
You Cant Buy Network Security
Edge Security Design
Medium Network Campus Security Design
Appendix B. Answers to Applied Knowledge Questions
Developing Tablet PC Applications (Charles River Media Programming)
Introduction to Ink-Enabled Applications
Tablet PC Screen Rotation and Special Buttons
Getting Started with Microsoft Agent
Pong Game
Storing Ink in a Database
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity II
IDS and IPS Internals
Snort
Data Correlation
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
File System Forensic Analysis
Hard Disk Technology
Analysis Basics
Introduction
File System Metadata Files
Ext2 and Ext3 Concepts and Analysis
Sap Bw: a Step By Step Guide for Bw 2.0
Creating InfoObject Catalogs
Multi-Cubes
Summary
Tuning Load Performance
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies