By Topic

Proceedings 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems. TOOLS 39

July 29 2001-Aug. 3 2001

Filter Results

Displaying Results 1 - 25 of 32
  • 39 th International Conference And Exhibition On Technology Of Object-oriented Languages And Systems [front matter]

    Publication Year: 2001, Page(s):i - xi
    Request permission for commercial reuse | PDF file iconPDF (300 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):437 - 438
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • The .NET Contract Wizard: adding Design by Contract to languages other than Eiffel

    Publication Year: 2001, Page(s):14 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    Reliability is a key concern in the current state of software industry. Producing software without defects is still very difficult. Therefore it is crucial to benefit from high-level language mechanisms such as assertions. Nevertheless contracts are mostly a specificity of the Eiffel language. This observation convinced ISE to build a new product, the Contract Wizard, which aims at providing .NET ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic data mining by asynchronous parallel evolutionary algorithms

    Publication Year: 2001, Page(s):99 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    How to discover high-level knowledge modeled by complicated functions, ordinary differential equations and difference equations in databases automatically is a very important and difficult task in KDD research. In this paper, high-level knowledge modeled by ordinary differential equations (ODEs) is discovered in dynamic data automatically by an asynchronous parallel evolutionary modeling algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Laboratory-agent-based resource sharing system

    Publication Year: 2001, Page(s):89 - 98
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB) | HTML iconHTML

    In this study, we extend the concept of distance education and our Virtual Classroom (VC) with adding a new service, that we call Virtual Laboratory (VL). While the VC represents an interface between the students and a virtual professor and provides personalized learning materials to the users, the VL offers a possibility to the attendees to share different resources out of time and space boundari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separation of data and presentation for the next generation Internet using the four-tier architecture

    Publication Year: 2001, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    As the Internet is fast becoming a network of variety types of content accessed by a multitude of devices as well as the personal computer, software and systems design is beginning to once again change dramatically. We explore the state of content and architecture on the Internet, where it is today and where it is going. Subsequently, we introduce the concept of the presentation server and its rol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GAIL: the Gen-it(R) Abstract Integration Layer for B2B application integration solutions

    Publication Year: 2001, Page(s):73 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    Different solutions exist in the market for B2B application frameworks, including Microsoft(R) BiztalkTM and SunTM Open Net Environment (Sun ONE). These supply a set of standard technologies and protocols for B2B application integration. However, all of these solutions require manual coding to integrate the different layers of B2B applications. Given the multi-tier nature of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A domain-language approach to designing dynamic enterprise component-based architectures to support business services

    Publication Year: 2001, Page(s):130 - 141
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    Presents solutions to a major subset of problems facing component-based development and integration (CBDI). These solutions include patterns, techniques, design artifacts and activities across what we have identified as the five domains of CBDI, namely: organizational, methodological, architectural, technology implementation and infrastructure. We present a taxonomy of CBDI domains that transcends... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating structured implementation schemes from UML sequence diagrams

    Publication Year: 2001, Page(s):317 - 328
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    In the Unified Modeling Language (UML), a use case describes a particular functionality a system can perform by interacting with outside actors. A realization of a use case can be given as a set of sequence diagrams. The paper discusses how to generate structured implementation schemes represented as pseudocode from a set of sequence diagrams in UML. The proposed approach can be applied to any set... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements-based testing: an overview

    Publication Year: 2001, Page(s):286 - 295
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    The article provides an overview of the requirements based testing (RBT) process and an overview of CaliberRBT, the tool that supports the RBT process. The intended audience for the paper is project managers, development managers, developers, test managers and test practitioners who are interested in understanding requirements based testing and how it can be applied to their organization View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defining and building the Eiffel binding for COM

    Publication Year: 2001, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    The EiffelCOM wizard allows Eiffel developers to easily create new COM components and also reuse the existing ones. The development of the EiffelCOM wizard has required defining the Eiffel binding for COM. The binding needs to preserve the simplicity and consistency of the Eiffel language and should be easy to use. This article describes the choices that EiffelCOM development team has made during ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extensions of standard Z refinement relation for multiple viewpoints oriented requirements method

    Publication Year: 2001, Page(s):253 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    The authors extend the standard Z refinement relation for the multiple viewpoint oriented requirements method (MVORM). The original motivation is that we found the standard Z refinement to be inadequate or incorrect when considering specifications that have temporal relationships of operations. We do our work under a generic framework of MVORM. The concept of temporal state variables is introduced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual component composition using composition patterns

    Publication Year: 2001, Page(s):120 - 129
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    We improve current visual component composition environments by introducing composition patterns as first class objects that can be defined, stored and reused independently of the components. We document both components and composition patterns using an extended sequence diagram notation. For a component, typical usage protocols are specified while a composition pattern specifies how a set of role... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements-Based UML

    Publication Year: 2001, Page(s):307 - 316
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    The paper describes the “Requirements-Based UML” (RBU) development technique. RBU is a straightforward, pragmatic methodology for integrating structured requirements analysis into an UML-based analysis and design effort. This approach involves a high degree of customer participation and the creation of measurable requirement definitions before each stage of modeling and/or coding. RBU ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault injection testing for distributed object systems

    Publication Year: 2001, Page(s):276 - 285
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    Interface based fault injection testing (IFIT) is proposed as a technique to assess the fault tolerance of distributed object systems. IFIT uses the description of an object's interface to generate application dependent faults. A set of application independent faults is also proposed. IFIT reveals inadequacies of the fault recovery mechanisms present in the application. The application of IFIT to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metric framework for object-oriented development

    Publication Year: 2001, Page(s):164 - 172
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Metrics (quantitative estimates of product and project properties) can, if defined from sound engineering principles, be a precious tool for both project management and software development. We have recently developed an extensive set of metrics facilities for the Eiffel/Studio development environment. We describe the principles on which it is the based, the facilities it provides and how to use t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of maintainability in object-oriented software

    Publication Year: 2001, Page(s):194 - 205
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    In software industrial practice, the high cost of the maintenance process for large-scale software has placed emphasis on the need to manage the maintainability in earlier phases of the software life-cycle. This paper discusses the applicability of architectural complexity measures to managing the complexity in the software maintenance phase and the reliability of the maintenance process. It also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic wrappers: handling the composition issue with JAC

    Publication Year: 2001, Page(s):56 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Modern applications, and especially distributed ones, need flexibility and dynamic evolution. These goals can be partially reached with separation of concerns. However, a static approach is not sufficient when trying to get dynamic adaptation during the application execution-time. We present the JAC (Java Aspect Components) framework that meets dynamic adaptation by using the notions of dynamic wr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BTOZ: a formal specification language for formalizing business transactions

    Publication Year: 2001, Page(s):240 - 252
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    Business rules are statements constraining business actions, they are context dependent, and may remain unchanged over a long period of time. The dynamic application of business rules to business actions requires a clear separation of the actions from the rules so that changes to business rules can be done without affecting the actions on which they are applied. In addition, rules can also be appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple support for design by contract in C++

    Publication Year: 2001, Page(s):24 - 34
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    Design by contract can be seen as an advanced software engineering technique for building quality software in a professional environment or as a fundamental programming concept, useful even for elementary programming. If design by contract is an afterthought, sophisticated tool support, with macros, preprocessors or patterns is acceptable. If it is to be used from the very first programs, it must ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A three-view model for developing object-oriented frameworks

    Publication Year: 2001, Page(s):108 - 119
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    This paper describes a three-view model for developing object-oriented frameworks. We propose a new methodology based on this model, and demonstrate its effectiveness using an example of practical industrial applications. This model can lead software engineers to a framework that has high reliability, portability, and maintainability. These quality factors of applications are especially important ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing dynamic language features in Java using dynamic code generation

    Publication Year: 2001, Page(s):143 - 152
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Compared to dynamic object-oriented languages like CommonLisp or Smalltalk, Java has a fairly simple and restrictive object and type system. Some of the key differences between Java and these other languages are that they offer structural conformance, automatic delegation and dynamic mix-ins. When such constructs are needed in a language like Java, they are usually expressed in terms of standard o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using design patterns and constraints to automate the detection and correction of inter-class design defects

    Publication Year: 2001, Page(s):296 - 305
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    Developing code free of defects is a major concern for the object oriented software community. The authors classify design defects as those within classes (intra-class), those among classes (inter-classes), and those of semantic nature (behavioral). Then, we introduce guidelines to automate the detection and correction of inter-class design defects. We assume that design patterns embody good archi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Natural-language processing support for developing policy-governed software systems

    Publication Year: 2001, Page(s):263 - 274
    Cited by:  Papers (8)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB) | HTML iconHTML

    Organizations are policy-driven entities. Policy bases can be very large and the relationships between policies can be complex. In addition, policy can change on a frequent basis. Checking for gaps in policy or analyzing the ramifications of changing policy is necessary to both identify and rectify gaps or unintended policy prior to the policy base being refined into requirements for a system. A p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting design flaws via metrics in object-oriented systems

    Publication Year: 2001, Page(s):173 - 182
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    The industry is nowadays confronted with large-scale monolithic and inflexible object-oriented software. Because of their high business value, these legacy systems must be re-engineered. One of the important issues in re-engineering is the detection and location of design flaws, which prevent the efficient maintenance and further development of the system. In this paper, we present a metrics-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.