نتایج جستجو برای: oriented development principles

تعداد نتایج: 1631890  

2004
Sergei G. Maslov

This paper describes the basic elements (data, actions, tunings, voids, mixtures,. . . ) and principles of programming (stratification, implicit knowledge, limited freedom,. . . ), directed to amalgamating of different programming paradigms (imperative, object-oriented, functional, constraint,. . . ) in a unified process of generating computer system models. Compositions of elements and their p...

2006
Ruzanna Chitchyan Johan Fabry Lodewijk Bergmans

The topics on aspects, dependencies and interactions are among the key remaining challenges to be tackled by the Aspect-Oriented Software Development (AOSD) community to enable a wide adoption of AOSD technology. This second workshop, organized and supported by the AOSD-Europe project, aimed to continue the wide discussion on aspects, dependencies and interactions started at ADI 2006.

Journal: :Journal of Object Technology 2002
Emilio García Roselló José Ayude Vazquez José B. García-Schofield Manuel Pérez Cota

Designing a concurrent object oriented language isn’t an easy task. After many years of research, the merging of concurrency and object oriented paradigms hasn’t been achieved in a totally satisfactory way. Although recent models have partly solved important problems such as the inheritance anomaly, they do still present limitations due to the lack of reusability and adaptability. Approaches ba...

2003
Jianjun Zhao Martin Rinard

! " # # $ % " # & ' ( " # # # ( ' ) ' * ' # ' # ( ' ' + # ( # # # # ' #

2001
Dirk Heuzeroth Welf Löwe Andreas Ludwig Uwe Aßmann

Communication Connector private Channel c; public Producer(Channel c) { this.c = c; c.out(d); } public doSomething() { some calculations... further calculations... } } class Consumer { private Channel c; public Consumer(Channel c) { this.c = c;

2010
Muhammad Asadullah Khan

............................................................................................................................. iii Acknowledgements..............................................................................................................v Table of

2006
Geri Georg Siv Hilde Houmb Indrakshi Ray

Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to be bypassed resulting in a security breach. Methodologies are needed for incorporating security mechanisms in an application and assessing whether the resulting system is indeed secure. We propose one such methodology for desi...

2007
Brice Morin Olivier Barais Jean-Marc Jézéquel Rodrigo Ramos

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید