As applications become increasingly distributed and networks provide more and more connection facilities, applications require more and more interconnections, thus communication takes a central part of modern systems....
详细信息
The proceedings contain 21 papers. The special focus in this conference is on Sharing and Encapsulation. The topics include: Language, objects, and intentionality;a generalisation of uniqueness and read-only;sealing, ...
ISBN:
(纸本)3540422064
The proceedings contain 21 papers. The special focus in this conference is on Sharing and Encapsulation. The topics include: Language, objects, and intentionality;a generalisation of uniqueness and read-only;sealing, encapsulation, and mutablility;simple ownership types for object containment;distinctness and sharing domains for static analysis of java programs;precise constraint-based type inference for java;user-defined object structure in C;dynamic object re-classification;scripting .NET using mondrian;on the usefulness of liveness for garbage collection and leak detection;concurrent cycle collection in reference counted systems;reflections on MOPs, components, and java security;the optimistic readers transformation;people and the limits of methodology;family polymorphism;an overview of aspectJ;true modules for java-like languages;selecting an efficient OO integration testing strategy and quality and understandability of use case models.
The proceedings contain 20 papers. The topics discussed include: capabilities for sharing: a generalization of uniqueness and read-only;sealing, encapsulation, and mutablility;simple ownership types for object contain...
ISBN:
(纸本)3540422064
The proceedings contain 20 papers. The topics discussed include: capabilities for sharing: a generalization of uniqueness and read-only;sealing, encapsulation, and mutablility;simple ownership types for object containment;distinctness and sharing domains for static analysis of java programs;precise constraint-based type inference for java;a quasi optimal bit-vector encoding of tree hierarchies. application efficient type inclusion tests;on the usefulness of liveness for garbage collection and leak detection;concurrent cycle collection in reference counted systems;a bytecode translator for distributed execution of "legacy" java software;reflections on mops, components, and java security;the optimistic readers transformation;people and the limits of methodology;family polymorphism;true modules for java-like languages;and quality and understandability of use case models.
While many object-oriented languages impose space overhead of only one word per object to support features like virtual method dispatch, Java’s richer functionality has led to implementations that require two or thre...
详细信息
The paper presents concepts and ideas underlying an approach for consistency management in object-oriented (OO) databases. In this approach constraints are considered as first class citizens and stored in a meta-datab...
详细信息
The paper presents concepts and ideas underlying an approach for consistency management in object-oriented (OO) databases. In this approach constraints are considered as first class citizens and stored in a meta-database called constraints catalog. When an object is created constraints of this object are retrieved from the constraints catalog and relationships between these constraints and the object are established. The structure of constraints has several features that enhance consistency management in OO database management systems which do not exist in conventional approaches in a satisfactory way. This includes: monitoring object consistency at different levels of update granularity, integrity independence, and efficiency of constraints maintenance;controlling inconsistent objects;enabling and disabling constraints, globally to all objects or locally to individual objects;and declaring constraints on individual objects. All these features are provided by means of basic notations of OO data models. Copyright (C) 2001 John Wiley & Sons, Ltd.
Compensation plays an important role in advanced transaction models, cooperative work and workflow systems. A schema designer is typically required to supply for each transaction T another transaction T-1 to semantica...
详细信息
Compensation plays an important role in advanced transaction models, cooperative work and workflow systems. A schema designer is typically required to supply for each transaction T another transaction T-1 to semantically undo the effects of T. Little attention has been paid to the verification of the desirable properties of such operations, however. This paper demonstrates the use of a higher-order logic theorem prover for verifying that compensating transactions return a database to its original state. It is shown how an OODB schema is translated to the language of the theorem prover so that proofs can be performed on the compensating transactions. Copyright (C) 2001 John Wiley & Sons, Ltd.
The multiplicity of natural languages and the multiplicity of computer languages invite a false parallel. In fact computer languages have settled into an evolutionary rut that was carved by the needs of the earliest c...
详细信息
Data mining is the discovery of knowledge and useful information from the large amounts of data stored in databases. The emerging data mining tools and systems lead to the demand of a powerful data mining query langua...
详细信息
Traditional object-orientedprogramming languages do not support user-level object structure definition, so it is impossible to treat external or low-level data structures (like an integer, an array and a pointer) as ...
详细信息
暂无评论