Exploiting Roles and Responsibilities to Generate Code in a Distributed Design-Pattern-Based Programming System

نویسندگان

  • Jun Chen
  • Steve MacDonald
چکیده

The implementation of a design pattern can be viewed as a process of selecting classes to play the roles needed by the pattern. To ensure that a class can play a role, each role has a set of responsibilities associated with it. When all responsibilities are satisfied, the pattern implementation is complete. Normally a programmer must write code for the responsibilities. However, the implementation of responsibilities can often be derived from information in the application or from user input, and then automatically generated. This paper describes a new approach that uses roles and responsibilities to generate code for an almost-complete application architecture in a pattern-based framework, leaving only application-specific code for the developer. We demonstrate this approach using RMA, an Eclipse plugin for writing Java 2 Enterprise Edition (J2EE) applications based on an existing J2EE framework.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using the Adaptive Frequency Nonlinear Oscillator for Earning an Energy Efficient Motion Pattern in a Leg- Like Stretchable Pendulum by Exploiting the Resonant Mode

In this paper we investigate a biological framework to generate and adapt a motion pattern so that can be energy efficient. In fact, the motion pattern in legged animals and human emerges among interaction between a central pattern generator neural network called CPG and the musculoskeletal system. Here, we model this neuro - musculoskeletal system by means of a leg - like mechanical system cal...

متن کامل

RoadMapAssembler: a new pattern-based J2EE development tool

The quality of a J2EE web application depends on both the correctness of the code as well as the efficiency and flexibility of its architecture. Unfortunately, the design and development process is complex and includes tedious coding details, making it error-prone. Part of the problem lies in the incomplete abstractions provided by the J2EE specification. The artifacts of the distributed system...

متن کامل

Robust Distributed Source Coding with Arbitrary Number of Encoders and Practical Code Design Technique

The robustness property can be added to DSC system at the expense of reducing performance, i.e., increasing the sum-rate. The aim of designing robust DSC schemes is to trade off between system robustness and compression efficiency. In this paper, after deriving an inner bound on the rate–distortion region for the quadratic Gaussian MDC based RDSC system with two encoders, the structure of...

متن کامل

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006