This paper reports our experience about aliasing in the implementation of SmallEiffel, the GNU Eiffel Compiler. The SmallEiffel compiler source code makes intensive use of aliasing in order to achieve very good perfor...
详细信息
This paper reports our experience about aliasing in the implementation of SmallEiffel, the GNU Eiffel Compiler. The SmallEiffel compiler source code makes intensive use of aliasing in order to achieve very good performance, We explain how aliasing can be handled in a safer way, and how helpful the design by contract capabilities of the Eiffel language have been. The singleton pattern appears to be crucial in implementing alias provider objects. We propose an efficient implementation of this pattern made easy by some Eiffel idioms. This technique, which requires no language modification, is very appropriate for compilation, but can also be applied to a much wider range of applications. We show the performance impact of string aliasing both in terms of memory footprint and execution time. Copyright (C) 2001 John Wiley & Sons, Ltd.
In this paper we present the design and implementation of a system that exploits well-known design patterns to facilitate construction of an extensible system for comparison and visualization of ordering methodologies...
详细信息
In this paper we present the design and implementation of a system that exploits well-known design patterns to facilitate construction of an extensible system for comparison and visualization of ordering methodologies for class-based testing of C++ applications. Using our implementation, we present a comparative study and evaluation of two advanced ordering methodologies: the edge based approach by Briand et al., and the Class Ordering System (COS) introduced in this paper. We compare two variations of the approach by Briand and three variations of the COS system and draw conclusions about the number of edges removed, and therefore the number of stubs that must be constructed, using each approach. We also compare the run-time efficiency of each approach and raise some interesting questions about edge type considerations for removal in the presence of cycles in the ORD. Using the design patterns together with the dot tool from the Graphviz package, we incorporate visualization of the ORD and the edge removals into our system. We present details and graphical visualization of the edge removal process. (C) 2005 Elsevier Inc. All rights reserved.
Data persistent is an important part of development in JavaEE, and it is an intractable problem in process of designing E-government system. However, we usually use a single framework to build enterprise-class applica...
详细信息
ISBN:
(纸本)9780769541105
Data persistent is an important part of development in JavaEE, and it is an intractable problem in process of designing E-government system. However, we usually use a single framework to build enterprise-class applications, such as mixed logic of reuse program and poor expansibility. The realizing scheme of how to use abstract factory pattern, DAO pattern, VO pattern, singleton pattern and Hibernate framework to design a data persistence framework, with the development of a certain communication enterprise's fixed assets management system, and part of the implementation codes was given. This framework can make the system agile and alterable. What's more, this framework effectively improves the code reusability and extensibility.
In the entire procedure of identity authorization,what ranks first is discovery operation,which is to determine the operations in need of authority *** next one is authority distribution to endow relevant permissions ...
详细信息
In the entire procedure of identity authorization,what ranks first is discovery operation,which is to determine the operations in need of authority *** next one is authority distribution to endow relevant permissions to those *** match comes last that is to match the permissions holded by accounts with those permitted by *** it succeeds,the operation can be *** article is meant to optimize discovery operation and permissions *** former aims to use the property reflection and the singleton pattern based on static variables to guide the system to scan the operations to be controlled automatically and to improve its reusability and *** latter aims to implement on-demand match to enhance its performance on one *** the other hand,it makes the most of the security mechanism of *** to encapsulate the process of complicated permissions match entirely for improving its ease of use.
Data persistent is an important part of development in JavaEE,and it is an intractable problem in process of designing E-government ***,we usually use a single framework to build enterprise-class applications,such as ...
详细信息
Data persistent is an important part of development in JavaEE,and it is an intractable problem in process of designing E-government ***,we usually use a single framework to build enterprise-class applications,such as mixed logic of reuse program and poor *** realizing scheme of how to use abstract factory pattern,DAO pattern,VO pattern,singleton pattern and Hibernate framework to design a data persistence framework,with the development of a certain communication enterprise’s fixed assets management system,and part of the implementation codes was *** framework can make the system agile and ***’s more,this framework effectively improves the code reusability and extensibility.
暂无评论