Issue 6364: Decision behaviors on control tokens (uml2-superstructure-ftf) Source: NIST (Dr. Conrad Bock, conrad.bock(at)nist.gov) Nature: Revision Severity: Summary: Clarify that decision behaviors work on control tokens. Suggest that control tokens invoke behaviors with no input parameters. Behavior can use ReadSelfAction to access host if necessary Resolution: see above Revised Text: Actions taken: October 20, 2003: received issue March 8, 2005: closed issue Discussion: In Constraint section of Decision Node, p 320, change the first two sentences of constraint [2] to: "A decision input behavior has zero or one input parameter and one output parameter. Any input parameter must be the same as or a supertype of the type of object tokens coming along the incoming edge." In the Semantics section of Decision Node, p 320, last paragraph, change the first sentence to: "If a decision input behavior is specified, then each data token is passed to the behavior before guards are evaluated on the outgoing edges. The behavior is invoked without input for control tokens." End of Annotations:===== me: Conrad Bock Company: NIST mailFrom: conrad.bock@nist.gov Nature: Revision Severity: Clarification Subject: Decision behaviors on control tokens Clarify that decision behaviors work on control tokens. Suggest that control tokens invoke behaviors with no input parameters. Behavior can use ReadSelfAction to access host if necessary. Issue 6364: Decision behaviors on control tokens Activities Conrad B http://www.omg.org/issues/issue6364.txt yourdirectory/uml2-superstructure-ftf.open.html#Issue6364 Resolved In Constraint section of Decision Node, p 320, change the first two sentences of constraint [2] to: "A decision input behavior has zero or one input parameter and one output parameter. Any input parameter must be the same as or a supertype the type of object tokens coming along the incoming edge." In the Semantics section of Decision Node, p 320, last paragraph, change the first sentence to: "If a decision input behavior is specified, then each data token is passed to the behavior before guards are evaluated on the outgoing edges. The behavior is invoked without input for control tokens."