By Topic

Proceedings. 34th International Conference on Technology of Object-Oriented Languages and Systems - TOOLS 34

4-4 Aug. 2000

Filter Results

Displaying Results 1 - 25 of 35
  • Proceedings. 34th International Conference on Technology of Object-Oriented Languages and Systems - TOOLS 34

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):569 - 570
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • On the behavioral inheritance of state-based objects

    Publication Year: 2000, Page(s):83 - 94
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    We consider the inheritance of state based behavior in object oriented analysis and design, as it arises, for example, in specifying behavior in the UML using statecharts. We concentrate on behavioral conformity and the resulting substitutability of classes, whereby the inheritance mechanism is to retain original behaviors. There are many deep and unresolved questions around this issue, which cann... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • POD: a composition environment for pattern-oriented design

    Publication Year: 2000, Page(s):263 - 272
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Object oriented design patterns have been proposed as an approach to encapsulate good quality design experiences that are proven useful in successful projects. A design pattern abstracts a solution structure that is mostly described in terms of a set of collaborating classes or objects. Composing these design structures to develop application designs is a tedious task that involves integration of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metacomponent model to support the extensibility and evolvability of networked applications

    Publication Year: 2000, Page(s):185 - 194
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Based upon local libraries, component technology has achieved higher degrees of flexibility, customizability and reusability. However, it has little or no support for extensibility and evolvability. Web-based technologies make possible new classes of software systems supporting efficient, timely delivery of content to interested parties, and corresponding component models ought to support a more p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traveling through Dakota: experiences with an object-oriented program analysis system

    Publication Year: 2000, Page(s):49 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    The paper describes experiences with the design and implementation of the NPIC program analysis system. We describe how the object oriented design of the intermediate representation (Dakota) provides front end and analysis independence using the abstract factory pattern, and illustrate how using multiple inheritance allows it to be extended to support program analysis. We also describe how the int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of fault-tolerant CORBA-services

    Publication Year: 2000, Page(s):205 - 213
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The Common Object Request Broker Architecture (CORBA) is the most successful representative of an object-based distributed computing architecture. Although CORBA simplifies the implementation of complex, distributed systems significantly, the support of techniques for reliable, fault-tolerant software, such as group communication protocols or replication is very limited in the state-of-the-art COR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a semantic metrics suite for object-oriented design

    Publication Year: 2000, Page(s):71 - 80
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    In recent years much work has been performed in developing suites of metrics that are targeted for object oriented software, rather than functionally oriented software. This is necessary since good object oriented software has several characteristics, such as inheritance and polymorphism, that are not usually present in functionally oriented software. However, all of these object oriented metrics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • But who will guard the guardians? [OOP]

    Publication Year: 2000, Page(s):227 - 237
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Design by Contract is widely accepted as a valuable software design methodology for improving software quality. Its incorporation into the Eiffel language has been largely responsible for this. However, the Eiffel language restricts the expressivity of what may be verified in the contract primarily to propositional logic. When the contract is non-trivial, if we wish to retain contract-checking the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented manufacturing application framework

    Publication Year: 2000, Page(s):253 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The varied nature of manufacturing systems, which is wide, dynamic and complex, are obstacles in manufacturing software systems development. The paper proposes a solution to solve these problems by developing a manufacturing application framework with a set of integrated reusable components, which can be adapted to suit specific manufacturing applications. Two subdomains of the manufacturing domai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive framework for distributed complex applications development

    Publication Year: 2000, Page(s):339 - 349
    Cited by:  Papers (3)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Complex application systems based on very high-speed networking are found in control systems, telecommunication management and transportation management. Such systems interact with a large and distributed environment that must be monitored, and have to process vast amounts of data within deadlines. The overall development of these applications must minimize costs and integrate different problem-so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool for testing liveness in distributed object systems

    Publication Year: 2000, Page(s):319 - 328
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    The paper describes cidl, a tool that helps CORBA developers test liveness properties in distributed systems. Whereas sequential systems can be tested by examining initial states and final outcomes, distributed systems frequently exhibit reactive behavior that occurs over time. Liveness properties capture such behavior. Testing liveness, however, presents a significant challenge because liveness v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A role-based security architecture for business intelligence

    Publication Year: 2000, Page(s):295 - 305
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Security is a growing concern to enterprise systems when they become open to e-commerce using the Internet. This is particularly severe in the e-commerce applications using knowledge management systems which generally maintain critical information about the enterprise. Security usually affects all parts of a system and to be effective must therefore be integrated in the enterprise architecture. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating delegation in class-based languages

    Publication Year: 2000, Page(s):171 - 182
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    Some designers of class-based object oriented languages choose not to support multiple inheritance. As a result, programmers often resort to ad hoc workarounds. The most common of these workarounds is delegation. Even delegation is tedious and error prone, however. We believe that language designers who choose against multiple inheritance should consider automating delegation in order to alleviate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interface Mutation to assess the adequacy of tests for components and systems

    Publication Year: 2000, Page(s):37 - 46
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    Interface Mutation (IM) is proposed as an adequacy criterion to assess the adequacy of test sets developed to test components and systems. IM uses the description of a component's interface to generate interface mutants. Tests are assessed on their ability to distinguish interface mutants. Experiments conducted to evaluate the goodness of IM are reported. Analysis of experimental data suggests tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-based Virtual Classroom

    Publication Year: 2000, Page(s):137 - 146
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    In this study, an agent based Virtual Classroom defined within the Virtual University is presented. A set of agents of the same type is responsible for handling different users and their requests. The classroom represents an interface between the students and a virtual professor and should provide personalized learning materials. The Virtual Classroom system is Web based and its usage is intuitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing collaboration-based designs using aspect-oriented programming

    Publication Year: 2000, Page(s):95 - 104
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The collaboration based approach is a powerful means to develop modularised systems by stepwise refinement. The authors introduce a novel approach to realise a collaboration based design. Our approach is based on the well known observation that the knowledge about inter-object collaborations cannot be localised within objects but cross-cuts many objects. Such cross-cutting concerns are effectively... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern-oriented analysis and design (POAD): a structural composition approach to glue design patterns

    Publication Year: 2000, Page(s):273 - 282
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    To improve software productivity, we have to stop developing applications from scratch and make use of exiting solutions that have been applied, tested, and proven useful in successful projects. Patterns promise new design reuse benefits early in the development lifecycle. To reap the benefits of deploying these proven design solutions, we need to define systematic development approaches to constr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design-time assembly of runtime containment components

    Publication Year: 2000, Page(s):195 - 204
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    In this paper we lay out the design time and space of component assembly in a visual builder, and propose concrete ways of also handling context components seamlessly. We present an environment that allows Java developers to test and evaluate JavaBeans components implementing the extensible runtime containment and services protocol. We enhanced the BeanBox from the Bean Development Kit (BDK) with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic analysis of the impacts of changes to object-oriented software

    Publication Year: 2000, Page(s):61 - 70
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The research presented addresses the problem of change impact analysis (CIA) for object oriented software. A major problem for developers in an evolutionary environment is that seemingly small changes can ripple throughout the system to have major unintended impacts elsewhere. As a result, software developers need to understand how a change to a software system will affect the rest of the system. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using plans for specifying preconfigured bean sets

    Publication Year: 2000, Page(s):217 - 226
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    Component composition is either done manually in a component assembly tool or with specific applications (wizards). However, from the view of the application programmer this situation is not satisfactory. Wizards are not flexible enough and their creation requires substantial efforts. Doing everything manually is annoying, requires quite a good knowledge of the used components and increases the tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prose+test cases=specifications

    Publication Year: 2000, Page(s):239 - 250
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The rise of component based software development has created a need for API documentation. Experience has shown that it is hard to create and maintain precise and readable documentation. Prose documentation can provide a good overview but lacks precision. Formal methods offer precision but the resulting documentation is expensive to write and modify. Worse, few developers have the skill or inclina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed object-oriented framework for tool development

    Publication Year: 2000, Page(s):353 - 362
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    In recent years, there has been a substantial increase in the availability and quality of software engineering tools; such tools are invaluable in ensuring program correctness and identifying performance problems. The majority of these, however, do not interoperate and are available on a limited platform set. We analyse such deficiencies and propose an extensible architecture for a distributed sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular object-oriented design of distributed protocols

    Publication Year: 2000, Page(s):329 - 338
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The complexity of protocols supporting distributed applications leads to the use of modular techniques to design protocols. The object oriented programming paradigm provides a number of concepts to enable modularity and reuse. For example, languages such as Java and C++ have been extended with synchronization primitives to modularize code. The authors propose a framework with tools that complement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse technology practices and assessment tool-kit

    Publication Year: 2000, Page(s):307 - 316
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The paper focuses on a CBS module of Knowledge-Based Tutoring System for Software Reuse Practices. The paper presents a public CBS using a validated Software Reuse Reference Model (SRRM). A CBS-SRRM allows the software engineer to improve reuse practice by being tutored with selected course material based on the user profile. This material is combined with actual practice based knowledge derived f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.