The contributions of the XDB project are derived from the application of the author's experience in systems' design to create an extensible database architecture. The result is a database system test-bed that ...
详细信息
ISBN:
(纸本)1932415076
The contributions of the XDB project are derived from the application of the author's experience in systems' design to create an extensible database architecture. The result is a database system test-bed that is useful for experimentation and education. In this paper, we demonstrate how an open system design can support OLAP functions.
Virtual classes and nested classes are distinguishing features of BETA. Nested classes originated from Simula, but until recently they have not been part of main stream object-oriented languages. C++ has a restricted ...
详细信息
Virtual classes and nested classes are distinguishing features of BETA. Nested classes originated from Simula, but until recently they have not been part of main stream object-oriented languages. C++ has a restricted form of nested classes and they were included in Java 1.1. Virtual classes is the BETA mechanism for expressing generic classes and virtual classes is an alternative to parameterized classes. There has recently been an increasing interest in virtual classes and a number of proposals for adding virtual classes to other languages, extending virtual classes, and unifying virtual classes and parameterized classes have been made. Although virtual classes and nested classes have been used in BETA for more than a decade, their implementation has not been published. The purpose of this paper is to contribute to the understanding of virtual classes and nested classes by presenting the central elements of the semantic analysis used in the Mjolner BETA compiler.
Access Protector is a class behavioral design pattern which distributes the routines of the original class hierarchy to given access-protection layers. The distribution utilizes dynamic binding and automatic upcasting...
详细信息
ISBN:
(纸本)9783879408139
Access Protector is a class behavioral design pattern which distributes the routines of the original class hierarchy to given access-protection layers. The distribution utilizes dynamic binding and automatic upcasting to guarantee that the indended object access policies are transitive while the original runtime behavior between the objects does not change. In more detail, the pattern states explicitly what rights the client and the supplier object have on the objects passed through the class interface. Rather than being a property of an object, Access Protector defines access levels, i.e. restrictive views, into it by using subclassing. This property makes the access restrictions transitive so that granted permissions cannot be loosened when the object reference is forwarded. Also, the object can be referred via multiple access levels at the same time depending on what kind of object integrity protection is required toward different clients. Access Protector can also be called as Anti-Code-Wrapper or Routine Waiver. The name Anti- Code-Wrapper emphasizes the delegation aspect of the design pattern, whereas Routine Waiver refers to routine reorganization.
This research article examines the role of coupling in making of software complex. An inference has been made that more coupling increases complexity which results unreliable system. Different kinds of coupling is pro...
详细信息
Chidamber and Kemerer metrics suite is a widely accepted metrics suite for the objectoriented system. Besides their wide acceptance they still have some inadequacies or inconsistencies and removing their inconsistenc...
详细信息
ISBN:
(纸本)9781604234558
Chidamber and Kemerer metrics suite is a widely accepted metrics suite for the objectoriented system. Besides their wide acceptance they still have some inadequacies or inconsistencies and removing their inconsistencies will tend to make them first choice for the analysis of the objectoriented systems. Researchers have made efforts to validate the metrics both theoretically and empirically and even irrespective of its validation CK metrics is the widely used. Method for removing the inconsistency in Weighted Method per Class has been given by Henderson Sellers et al. Methods to remove the inconsistencies in Depth of Inheritance Tree (DIT) and Number of Children (NOC) Metrics of CK Suite have been proposed in the present work. It is shown that DIT and NOC is not measuring what it was intended to measure. The method is further validated by taking examples of some multiple inheritance systems and results have been compared with the earlier definition of DIT and NOC given by CK.
Dynamically typed object-oriented languages must perform dynamic binding for most message sends. Typically this is slow. A number of papers have reported on attempts to adapt C++-style selector table indexing to dynam...
详细信息
object-based models offer abstract constructions to describe complex systems. The object-Based Graph Grammar (OBGG) is a formalism that may be used to describe this kind of system. This formalism is very intuitive, ho...
详细信息
object-orientedprogramming (OOP) is rapidly gaining attention as a potential approach to nearly any computer software project. Two of the key features of OOP are encapsulation and inheritance. There are, however, sev...
详细信息
Design patterns provide a medium-grained abstraction and can be used as an effective tool for understanding object-oriented systems. This paper presents a simple tool for the extraction of design information from C++ ...
详细信息
ISBN:
(纸本)193241519X
Design patterns provide a medium-grained abstraction and can be used as an effective tool for understanding object-oriented systems. This paper presents a simple tool for the extraction of design information from C++ code using design patterns. The design of the tool's model is based on logic-programming approach. This approach extracts design information by using relationships detection algorithm and identifies design patterns from information generated from source code and runtime system. The extraction of design information is separated from design pattern detection in order to facilitate flexibility. This way, the logic programs for identifying design patterns is language-independent while the detection algorithm of the relationships among classes is language-specific. The approach in this paper can effectively reduce false positives and negatives thereby improving the precision of pattern detection.
Kaleidoscope is an object-oriented language being designed to integrate the traditional imperative object-oriented paradigm with the less traditional declarative constraint paradigm. Imperative state changes provide s...
详细信息
暂无评论