Recovering behavioral design models from execution traces is not an easy task due to the sheer size of typical traces. In this paper, we describe a novel technique for achieving this. Our approach is based on filterin...
详细信息
ISBN:
(纸本)0769523048
Recovering behavioral design models from execution traces is not an easy task due to the sheer size of typical traces. In this paper, we describe a novel technique for achieving this. Our approach is based on filtering traces by distinguishing the utility components from the ones that implement high-level concepts. In the paper, we first define the concept of utilities;then we present an algorithm based on fan-in analysis that can be used for the detection of utilities. To represent the high-level behavioral models, we explore the Use Case Map (UCM) notation, which is a language used to describe and understand emergent behavior of complex and dynamic systems. Finally, we test the validity of our approach on an object-oriented system called TConfig.
the proceedings contain 14 papers. the topics discussed include: optimizing performance of object-oriented and object-relational systems by dynamic method materialization;D-ARIES: a distributed version of the ARIES re...
the proceedings contain 14 papers. the topics discussed include: optimizing performance of object-oriented and object-relational systems by dynamic method materialization;D-ARIES: a distributed version of the ARIES recovery algorithm;evolutionary learning of Boolean queries by genetic programming;three layer evolution model for XML stored in relational databases;towards the semantic web - an approach to reverse engineering of relational databases to ontologies;an architecture for natural language dialog applications in data exploration and presentation domain;autonomous applications - towards a better data integration model;transformation from requirements to design for service oriented information systems;architecture of pattern management software system;software quality and life cycles;and on a concept of scalable security: PKI-based model using additional cryptographic modules.
object composition arises as a natural operation to combine objects in an object-based setting. In our incomplete objects setting it has a strong meaning, as it may combine objects with different internal states. In t...
详细信息
ISBN:
(纸本)3540291067
object composition arises as a natural operation to combine objects in an object-based setting. In our incomplete objects setting it has a strong meaning, as it may combine objects with different internal states. In this paper we study how to make object composition safe in the presence of width subtyping, we propose two solutions, and discuss the alternative ones.
Efficient executions of object methods have a great impact on application response times. Optimising access to data returned by methods is an important issue in object-oriented programs, object-oriented and object-rel...
详细信息
Efficient executions of object methods have a great impact on application response times. Optimising access to data returned by methods is an important issue in object-oriented programs, object-oriented and object-relational systems, as well as in distributed object environments. Since methods are written in high-level programming languages, optimising their executions is difficult. In this paper we present a technique of reducing access time to data returned by methods by means of materialising method results. We have developed a prototype system where the software module, called the method analyser and optimiser is responsible for monitoring method access and gathering execution statistics. Based on the statistics, the module selects appropriate methods for materialisation. the experiments that we have conducted show that the overall system's response time decreases while using our optimisation technique.
the component-oriented approaches to context-aware computing are discussed. Context-awareness is especially integral to pervasive or ambient computing, but can be used to control the behavior of any system that adapts...
详细信息
ISBN:
(纸本)354023988X
the component-oriented approaches to context-aware computing are discussed. Context-awareness is especially integral to pervasive or ambient computing, but can be used to control the behavior of any system that adapts to the circumstances in which it is used. Like most new software projects, many existing context-aware systems have been constructured using object-or component-roiented programming techniques. Many of the techniques being used ad hoc in context-aware applications might be better captured in tools, language or methods, conversely new developments in infrastructure. A wide range of techniques from object-oriented and component-oriented software engineering are contributing strongly to the development of context-aware systems.
the ecoop Workshop on Mobile object Systems is now in its 9th year. Over the years, the workshop has dealt with topics related to the movement of code and data between application platforms, security, operating system...
ISBN:
(纸本)354022405X
the ecoop Workshop on Mobile object Systems is now in its 9th year. Over the years, the workshop has dealt with topics related to the movement of code and data between application platforms, security, operating system support, application quality of service, and programming language paradigms. In many cases, the workshop has been a forum to discussed traditional object-oriented issues, since mobility influences such a broad spectrum of topics.
Modeling four aspect-orientedprogramming mechanisms shows the way in which each supports modular crosscutting. Comparing the models produces a clear three part characterization of what is required to support crosscut...
详细信息
ISBN:
(纸本)3540405313
Modeling four aspect-orientedprogramming mechanisms shows the way in which each supports modular crosscutting. Comparing the models produces a clear three part characterization of what is required to support crosscutting structure: a common frame of reference that two (or more) programs can use to connect with each other and each provide their semantic contribution.
the ecoop workshop on Mobile object Systems was first organized in 1995 and has been held every year since. the first two episodes in the series ~ entitled “objects and Agents” (1995) and “Agents on the Move” (199...
ISBN:
(数字)9783540362081
ISBN:
(纸本)3540002332
the ecoop workshop on Mobile object Systems was first organized in 1995 and has been held every year since. the first two episodes in the series ~ entitled “objects and Agents” (1995) and “Agents on the Move” (1996) ~ were exploratory in nature, reflecting a growing awareness and interest in the possibilities of mobile code and mobile objects for Internet programming. Towards the end of the 1990s, Interest in the domain began to mature and several mobile object systems appeared in the research community. As a consequence, further editions of the Mobile object Systems workshop concentrated on specific aspects of mobile objects. For instance, the title of the 1997 workshop was “Operating System Support”, the theme of the 1998 workshop was “Security”, and the theme of the 1999 installment was “programming Language Support”.
this report summarizes the contributions and debates of the 5th International ecoop Workshop on Quantitative Approaches in object-oriented Software Engineering (QAOOSE 2001), which was held in Budapest on 18–19 June,...
详细信息
this report summarizes the contributions and debates of the 6th International ecoop Workshop on Quantitative Approaches in object-oriented Software Engineering (QAOOSE 2002), which was held in Malaga on 11 June, 2002....
详细信息
暂无评论