This research presents a re-engineering workbench and architecture that allows for legacy system written in procedural languages to be migrated to new objectoriented platforms. This methodology allows for specific de...
详细信息
Good documentation is crucial for the success of frameworks. In this research, a new documenting approach is proposed combining existing document styles in a kind of "minimalist" framework manual with a spec...
详细信息
Follow along the implementation of an actual web-based application developed using Extreme programming (XP). The application implements the user area for a commercial web site, using Java Servlets and JDBC. This repor...
详细信息
The project, which started in 1996, aims to encourage the capture and dissemination of successful experience of learning and teaching OT from industry and academia. Today, a significant body of material exists. We wel...
详细信息
This paper describes an object-oriented language called MixJuice, which uses the differences of class hierarchies as a unit of information hiding and reuse. In this language, classes - templates of objects - and modul...
详细信息
This paper presents a query processing algorithm called DE CAF for use in middleware object query systems that are based on the use of an object cache. The DECAF algorithm is designed to work correctly even in the pre...
详细信息
This paper presents a query processing algorithm called DE CAF for use in middleware object query systems that are based on the use of an object cache. The DECAF algorithm is designed to work correctly even in the presence of updates to the underlying databases that don't go through the object cache (i.e., even for autonomous data sources that can be updated through legacy applications that do not perform their updates through the middleware object layer). DE CAF's query results are consistent with updates performed by such transactions;its results are also consistent with any deferred updates that are present in the object cache but not yet committed at the database server. The DECAF algorithm attempts to push down query predicates to the underlying DBMSs to take advantage of the query processing capabilities of these systems and to reduce the amount of data, transferred from these systems to the object cache.
作者:
Bethea, Wayne L.Lehigh University
Department of Electrical Engineering and Computer Science 19 Memorial Drive West Bethlehem PA 18015 United States
The research displayed in this poster showcases issues surrounding adding parametric polymorphism to CORBA. The merits of parametric polymorphism are widely published, yet there is no support for the parametric polymo...
详细信息
Application development with an end-to-end declarative Application Framework has shown the following significant benefits: 80% error reduction, 40-80% code reduction, and predictable development cycles by first time o...
详细信息
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-orientedsystems because objects can easily be...
详细信息
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-orientedsystems because objects can easily become aliased. Aliases that cross program boundaries can allow programs to exchange information without using a system provided interface that could control information exchange. In Java, mistrusting programs are placed in distinct loader spaces but uncontrolled sharing of system classes can still lead to aliases between programs. This paper presents the object spaces protection model for an object-oriented system. The model decomposes an application into a set of spaces, and each object is assigned to one space. All method calls between objects in different spaces are mediated by a security policy. An implementation of the model in Java is presented.
暂无评论