By Topic

Technology of Object-Oriented Languages and Systems, 2000. TOOLS 34. Proceedings. 34th International Conference on

Date 4-4 Aug. 2000

Filter Results

Displaying Results 1 - 25 of 35
  • Proceedings. 34th International Conference on Technology of Object-Oriented Languages and Systems - TOOLS 34

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):569 - 570
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Towards a semantic metrics suite for object-oriented design

    Publication Year: 2000, Page(s):71 - 80
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    In recent years much work has been performed in developing suites of metrics that are targeted for object oriented software, rather than functionally oriented software. This is necessary since good object oriented software has several characteristics, such as inheritance and polymorphism, that are not usually present in functionally oriented software. However, all of these object oriented metrics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic analysis of the impacts of changes to object-oriented software

    Publication Year: 2000, Page(s):61 - 70
    Cited by:  Papers (21)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The research presented addresses the problem of change impact analysis (CIA) for object oriented software. A major problem for developers in an evolutionary environment is that seemingly small changes can ripple throughout the system to have major unintended impacts elsewhere. As a result, software developers need to understand how a change to a software system will affect the rest of the system. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • But who will guard the guardians? [OOP]

    Publication Year: 2000, Page(s):227 - 237
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Design by Contract is widely accepted as a valuable software design methodology for improving software quality. Its incorporation into the Eiffel language has been largely responsible for this. However, the Eiffel language restricts the expressivity of what may be verified in the contract primarily to propositional logic. When the contract is non-trivial, if we wish to retain contract-checking the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse technology practices and assessment tool-kit

    Publication Year: 2000, Page(s):307 - 316
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The paper focuses on a CBS module of Knowledge-Based Tutoring System for Software Reuse Practices. The paper presents a public CBS using a validated Software Reuse Reference Model (SRRM). A CBS-SRRM allows the software engineer to improve reuse practice by being tutored with selected course material based on the user profile. This material is combined with actual practice based knowledge derived f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traveling through Dakota: experiences with an object-oriented program analysis system

    Publication Year: 2000, Page(s):49 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    The paper describes experiences with the design and implementation of the NPIC program analysis system. We describe how the object oriented design of the intermediate representation (Dakota) provides front end and analysis independence using the abstract factory pattern, and illustrate how using multiple inheritance allows it to be extended to support program analysis. We also describe how the int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using plans for specifying preconfigured bean sets

    Publication Year: 2000, Page(s):217 - 226
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    Component composition is either done manually in a component assembly tool or with specific applications (wizards). However, from the view of the application programmer this situation is not satisfactory. Wizards are not flexible enough and their creation requires substantial efforts. Doing everything manually is annoying, requires quite a good knowledge of the used components and increases the tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming with patterns

    Publication Year: 2000, Page(s):159 - 170
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    Language support for object-oriented programming with patterns is provided. Thereby, designs making use of design patterns can be implemented in a more direct and traceable way. The essential language constructs are nested classes and a kind of superposition for class structures. A corresponding experimental programming language PaL is discussed. The current implementation is based on a compilatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • POD: a composition environment for pattern-oriented design

    Publication Year: 2000, Page(s):263 - 272
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Object oriented design patterns have been proposed as an approach to encapsulate good quality design experiences that are proven useful in successful projects. A design pattern abstracts a solution structure that is mostly described in terms of a set of collaborating classes or objects. Composing these design structures to develop application designs is a tedious task that involves integration of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A role-based security architecture for business intelligence

    Publication Year: 2000, Page(s):295 - 305
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Security is a growing concern to enterprise systems when they become open to e-commerce using the Internet. This is particularly severe in the e-commerce applications using knowledge management systems which generally maintain critical information about the enterprise. Security usually affects all parts of a system and to be effective must therefore be integrated in the enterprise architecture. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary Computer Aided Prototyping System (CAPS)

    Publication Year: 2000, Page(s):363 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Describes a distributed development environment, called CAPS (Computer-Aided Prototyping System), to support rapid prototyping and automatic generation of source code based on designer specifications in an evolutionary software development process. The CAPS system uses a fifth-generation prototyping language to model the communication structure, timing constraints, I/O control and data buffering t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interface Mutation to assess the adequacy of tests for components and systems

    Publication Year: 2000, Page(s):37 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    Interface Mutation (IM) is proposed as an adequacy criterion to assess the adequacy of test sets developed to test components and systems. IM uses the description of a component's interface to generate interface mutants. Tests are assessed on their ability to distinguish interface mutants. Experiments conducted to evaluate the goodness of IM are reported. Analysis of experimental data suggests tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of fault-tolerant CORBA-services

    Publication Year: 2000, Page(s):205 - 213
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The Common Object Request Broker Architecture (CORBA) is the most successful representative of an object-based distributed computing architecture. Although CORBA simplifies the implementation of complex, distributed systems significantly, the support of techniques for reliable, fault-tolerant software, such as group communication protocols or replication is very limited in the state-of-the-art COR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weak subtyping and genericity

    Publication Year: 2000, Page(s):149 - 158
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    In the past, object-oriented design focused on encapsulation and inheritance as primary concepts. As a consequence, there has been a lot of work in the domain of inheritance and the associated problems, i.e. covariant type systems. Recently, parameterized (generic) classes have become more popular in object-oriented design. While the use of genericity in functional languages is well known and deli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented manufacturing application framework

    Publication Year: 2000, Page(s):253 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The varied nature of manufacturing systems, which is wide, dynamic and complex, are obstacles in manufacturing software systems development. The paper proposes a solution to solve these problems by developing a manufacturing application framework with a set of integrated reusable components, which can be adapted to suit specific manufacturing applications. Two subdomains of the manufacturing domai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular object-oriented design of distributed protocols

    Publication Year: 2000, Page(s):329 - 338
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The complexity of protocols supporting distributed applications leads to the use of modular techniques to design protocols. The object oriented programming paradigm provides a number of concepts to enable modularity and reuse. For example, languages such as Java and C++ have been extended with synchronization primitives to modularize code. The authors propose a framework with tools that complement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business rules=meta-data

    Publication Year: 2000, Page(s):285 - 294
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    A business rule “defines or constrains some aspect of the business. It is intended to assert business structure, or to control or influence the behavior of the business. Enterprises that take a model-based, architected approach to software component development can use business rules to refine the models and create better designs. By capturing their business rules as meta-data, enterprises c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed object-oriented framework for tool development

    Publication Year: 2000, Page(s):353 - 362
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    In recent years, there has been a substantial increase in the availability and quality of software engineering tools; such tools are invaluable in ensuring program correctness and identifying performance problems. The majority of these, however, do not interoperate and are available on a limited platform set. We analyse such deficiencies and propose an extensible architecture for a distributed sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-based testing for real-time reactive systems

    Publication Year: 2000, Page(s):25 - 36
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    We describe methods for specification based testing and testing measurement for real time reactive systems. The methods are based on an object oriented formal specification of real time reactive systems. Test cases generated by our method satisfy two test adequacy criteria, and minimally cover the global states and transitions of interest. The testing measurement provides measures of test suite ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral subtyping and behavioral enrichment of multimethods

    Publication Year: 2000, Page(s):105 - 114
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    Multimethods can provide considerable flexibility to the OO (object oriented) designer. The authors' goal is to address issues related to reasoning about the behavior of multimethods. Specifically they show that the important notion of behavioral subtyping can be naturally extended to multimethods. The authors also investigate how, when reasoning about code that invokes multimethods, one can appea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design-time assembly of runtime containment components

    Publication Year: 2000, Page(s):195 - 204
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    In this paper we lay out the design time and space of component assembly in a visual builder, and propose concrete ways of also handling context components seamlessly. We present an environment that allows Java developers to test and evaluate JavaBeans components implementing the extensible runtime containment and services protocol. We enhanced the BeanBox from the Bean Development Kit (BDK) with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-based Virtual Classroom

    Publication Year: 2000, Page(s):137 - 146
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    In this study, an agent based Virtual Classroom defined within the Virtual University is presented. A set of agents of the same type is responsible for handling different users and their requests. The classroom represents an interface between the students and a virtual professor and should provide personalized learning materials. The Virtual Classroom system is Web based and its usage is intuitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the behavioral inheritance of state-based objects

    Publication Year: 2000, Page(s):83 - 94
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    We consider the inheritance of state based behavior in object oriented analysis and design, as it arises, for example, in specifying behavior in the UML using statecharts. We concentrate on behavioral conformity and the resulting substitutability of classes, whereby the inheritance mechanism is to retain original behaviors. There are many deep and unresolved questions around this issue, which cann... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prose+test cases=specifications

    Publication Year: 2000, Page(s):239 - 250
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The rise of component based software development has created a need for API documentation. Experience has shown that it is hard to create and maintain precise and readable documentation. Prose documentation can provide a good overview but lacks precision. Formal methods offer precision but the resulting documentation is expensive to write and modify. Worse, few developers have the skill or inclina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.