How To Use The Command Pattern In Java.Com (Programming) To Create A Program That Is Atomic And Is Not A Command Pattern (Programmer)
|
|
|
- Bathsheba Lane
- 5 years ago
- Views:
Transcription
1 CS 342: Object-Oriented Software Development Lab Command Pattern and Combinations David L. Levine Christopher D. Gill Department of Computer Science Washington University, St. Louis The Observer Pattern Intent Define a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically. Subject notifies registered observers of state changes Dependents (observers) can query subject state This pattern resolves the following forces: 1. An observer has state that should mirror that of its subject, though not continuously 2. Observers must be decoupled from subject A subject can have any number of observers An observer can monitor multipe subjects 3. Allows any number of observers Copyright c Dept. of Computer Science, Washington University 1 Structure of the Observer Pattern Example of the Observer Pattern Subject attach/register detach notify for each observer { update_sort ConcreteSubject subject_state Observer update_ Main_Observer update observer_state Sorter register_observer publish_update for each observer { update_sort 1. Selection_Sort notifies Sorter of state update Selection_Sort start_sort Sort_Request 2. Sorter iterates over Sort_Observers, and Sort_Observer update_sort 3. notifies each observer Main_Observer update_sort Sort_Request 4. each concrete observer performs its update action Copyright c Dept. of Computer Science, Washington University 2 Copyright c Dept. of Computer Science, Washington University 3
2 Observer Abstract Interface class Sort_Observer { public: // Manager functions. Sort_Observer () { virtual Sort_Observer (); Subject Abstract Interface // Implementor functions, for use by Sorter clients. int register_observer (Sort_Observer &sort_observer); // Register an observer for the sort. Returns 0 on succe // -1 on failure (reached maximum number of observers). static unsigned int maximum_observers (); // Implementor functions. virtual void update_sort (const Sort_Response &sort_obser // Callback, to receive a sort observation. ; protected: // Manager functions, for use by Sort algorithms. Sorter (); // Implementor functions, for use by Sort algorithms. void publish_sort_update (const Sort_Response &sort_obser // Used by Sort algorithms to publish updates on Sort sta // to registered observers. Copyright c Dept. of Computer Science, Washington University 4 Copyright c Dept. of Computer Science, Washington University 5 Observer Benefits The Memento Pattern Decouples observer from subject Allows an observer to monitor multiple subjects Allows any number of observers Intent Capture and externalize an object s internal state, without violating encapsulation, so that the object state can be restored later. Hides state storage implementation details from the object. Useful for persistent storage and transaction rollback operations. This pattern resolves the following forces: 1. Hide (and therefore allows transparent change of) state storage implementation details. 2. Externalize an objects internal state without breaking encapsulation. Copyright c Dept. of Computer Science, Washington University 6 Copyright c Dept. of Computer Science, Washington University 7
3 Structure of the Memento Pattern Originator creatememento () setmemento (Memento &m) state state = m.getstate (); return new Memento (state) Memento setstate () getstate () state Caretaker Use of the Memento Pattern // IterationState is the Memento for our Iterator. template <class T, class IterationState> class Iterator public: virtual IterationState * first () = 0; // Resets the iterator to the beginning. virtual int next (IterationState *) = 0; // Advance the iterator to the next item. virtual int is_done (const IterationState *) const = 0; // Returns 1 if we ve seen all the items, else 0. virtual int current_item (const IterationState *, T &item) const = 0; // Accesses the current item. Copyright c Dept. of Computer Science, Washington University 8 Copyright c Dept. of Computer Science, Washington University 9 Advantages of Memento-based Iterator Derived (concrete) Iterators need not store any state. The iteration state is stored in the IterationState class. An Iterator does not need to be a friend of its collection. Collection-specific private details are confined the Memento (IterationState class). Readily enables support for multiple iterators on one collection. Case Study with the Command Pattern Example Use of Command Pattern: Database Operations and Transactions Command Pattern Example Use of Command Pattern: Java MenuItem Template Method Pattern, to encapsulate atomicity Composite Pattern, to combine Commands into macros Copyright c Dept. of Computer Science, Washington University 10 Copyright c Dept. of Computer Science, Washington University 11
4 Database Operations and Transactions Database Operations are Commands Database operations query or update the state of the database. Database systems support transactions, atomic groups of operations. Transactions can be arbitrarily complex, but are constructed using simpler building blocks, i.e., database operations such as account debit and credits. Operations are verbs, but it would be nice to treat them as nouns (objects). To support logging for audits, crash recovery, rollbacks, etc.. To support queuing for batch or remote processing To support undo of completed operations To support security via encryption Database operations are query or update requests on the database. The Command Pattern encapsulates operations as objects. Each database operation and transaction manages its own undo operation. Allows composition of operations to create (atomic) transactions. Copyright c Dept. of Computer Science, Washington University 12 Copyright c Dept. of Computer Science, Washington University 13 Database Transactions are Commands Database transactions can be complex, and composed of operations or other transactions. Database transactions must be atomic, e.g., Consider moving funds from a savings account to a checking account, implemented by a debit from the savings account and a credit to the checking account. If either the debit or credit fail, then the entire transaction must fail. If the transaction fails but part of it had succeeded, then the successful part must be undone (rolled back). The Command Pattern Intent Encapsulate an operation as an object. parameterize clients with different operations buffer or log operations support reversal (undo) of operations also known as Action and Transaction Resolves the following forces: Decouple the object invoking an operation from the object that performs it. Bind an operation to the Receiver (of any class!) that performs it. Treat commands as first-class objects, so that they can be extended, encapsulated, combined, etc.. Make it easy to change or add new operations. Copyright c Dept. of Computer Science, Washington University 14 Copyright c Dept. of Computer Science, Washington University 15
5 Other Example Uses of Command Pattern Toolkit objects provide a mechanism for invoking an operation, but the toolkit has no knowledge of the operation. Window buttons and menus: the toolkit provides the mechanism for activating an operation, but the application must supply the actual operation. Encryption/decryption, where part of the decryption algorithm is passed along with the encrypted text. Contrast with Strategy pattern, where the algorithm must be known in advance. Downloadable code, e.g., with Java. The code is the operation(s), but it is encapsulated as an object. Structure of the Command Pattern Application Receiver Invoker 1. Application creates the Command and associates it with a Receiver action () receiver_->action () 3. Receiver performs operation 2. Invoker requests operation Command execute () 1a. implements Concrete Command execute () state receiver_ Copyright c Dept. of Computer Science, Washington University 16 Copyright c Dept. of Computer Science, Washington University 17 Java MenuItem Command Pattern Example Sort_Viewer 1. Application creates the Command and associates it with a Receiver Java System exit () 3. Receiver performs operation quit MenuItem actionperformed () 2. Invoker requests operation System.exit (0) Action Listener 1a. implements anon Action Listener actionperformed () added ActionListener Java MenuItem Participants Our Sort_Viewer has a Quit MenuItem: Menu menu = new Menu ("Sort_Viewer"); // "Quit" is the Command. MenuItem quit = new MenuItem ("Quit"); The Application associates each MenuItem with an ActionListener: public interface ActionListener extends EventListener { /** * Invoked when an action occurs. */ public void actionperformed(actionevent e); Copyright c Dept. of Computer Science, Washington University 18 Copyright c Dept. of Computer Science, Washington University 19
6 Java MenuItem Participants, (cont d) For the Quit Command, we create an ActionListener whose actionperformed terminates the program. The Receiver is Java s System class. The Receiver s action is its static exit method. new ActionListener () { public void actionperformed (ActionEvent e) { System.exit (0); Our concrete ActionListener is of an anonymous (unnamed) type. Java MenuItem Participants, (cont d) The anonymous ActionListener is the Concrete Command. Its addactionlistener binds it to its Receiver. Its actionperformed method calls its Receiver s operation, i.e., exit (). quit.addactionlistener ( new ActionListener () { public void actionperformed (ActionEvent e) { System.exit (0); ); The Quit MenuItem Invoker calls the the abstract ActionListener s actionperformed method. Copyright c Dept. of Computer Science, Washington University 20 Copyright c Dept. of Computer Science, Washington University 21 Limitations of Command Pattern Must create one Concrete Command class per type of command. Usually acceptable for MenuItems, because screen real estate limits those to a manageable number. But for, e.g., database operations, there could be many more types of commands. Consider adding atomicity to database operations. Database systems already provide atomicity through transactions. Could provide an atomic version of each database operation by subclassing a transaction version of it, e.g., Atomic_Debit_Operation () { begin_transaction (); perform_debit_operation (); end_transaction (); Limitations of Command Pattern However, that doubles the number of Concrete Command classes. And, each Atomic_Operation looks similar: begin/operation/end. If that similar code needed update, e.g., to add exception handling support, the update would be required for each of the derived Atomic classes. Enter the Template Method pattern. Copyright c Dept. of Computer Science, Washington University 22 Copyright c Dept. of Computer Science, Washington University 23
7 The Template Method Pattern Intent Define an algorithm skeleton in an operation, but defer some steps to subclasses. Subclasses redefine those steps. The algorithm structure (ordering of steps) are usually fixed. Resolves the following forces: Algorithm structure and commonality should be factored out. Only certain steps of the algorithm need to be customized. Very useful for avoiding code duplication, of the invariant steps of the algorithm. Contrast with Strategy pattern, which uses delegation instead of inheritance. With Template Method, the algorithm steps must be defined at compile time. Structure of the Template Method Pattern AbstractClass TemplateMethod () operation1 () operation2 () ConcreteClass operation1 () operation2 () implements operation1 () operation2 () Copyright c Dept. of Computer Science, Washington University 24 Copyright c Dept. of Computer Science, Washington University 25 Combining Command and Template Method Patterns Instead of creating a separate version of each database operation that s atomic, use a Template Method, e.g., Atomic_Operation () { begin_transaction (); perform_operation (); end_transaction (); Subclasses of abstract Atomic_Operation fill in their own perform_operation () implementation. Combining Command and Template Method Patterns, (cont d) Can implement the command steps as helper functions in the abstract Template Method base class, and allow subclasses to selectively use or not use them. Maintains fixed algorithm structure. If a step isn t used, it can be viewed as a no-op. Copyright c Dept. of Computer Science, Washington University 26 Copyright c Dept. of Computer Science, Washington University 27
8 Reducing the Number of Classes Back to Transactions The Template Method factors out common steps of an operation, but doesn t reduce the number of classes. We doubled the number of classes when we added atomicity to each Command, by using inheritance. Composition can often be a useful alternative to inheritance. And, it s useful to be able to add functionality without modifying existing classes. Transactions are composable May want to perform multiple operations, hierarchically composed Atomically, at various levels Consider disk backup operations at large companies, performed by a central organization: Need a boolean indication of whether the entire backup succeeded or failed If it failed, need to know where And, want to preserve any successful backup transactions Enter the Composite pattern Copyright c Dept. of Computer Science, Washington University 28 Copyright c Dept. of Computer Science, Washington University 29 The Composite Pattern Intent Compose (aggregate) objects, hierarchically, into tree structures. Represent any part of, or an entire, hierarchy Treat individual objects and recursive compositions uniformly Call an object or composition a component Structure of the Composite Pattern client Component operation () add (Component) remove (component) get_child (i) Resolves the following forces: Provide a uniform component interface, regardless of its internal complexity. Provide an extensible component interface Leaf operation () Composite operation () add (Component) remove (component) get_child (i) children iterate over children: i.operation () Copyright c Dept. of Computer Science, Washington University 30 Copyright c Dept. of Computer Science, Washington University 31
9 Composite Pattern Participants Composite Pattern Collaborations Component Provides the abstract interface for composed objects Leaf Concrete (primitive) Components Composite Non-leaf, concrete Components Client User of Composites, via the Component interface Clients call methods on objects, using the Component (abstract base class) methods If the object is a Leaf participant, it must have provided implementations for the abstract methods. Therefore, its methods are used. If the object is a Composite participant, then it can forward the method call to its subclass objects Using Iteration, for all subclass objects Copyright c Dept. of Computer Science, Washington University 32 Copyright c Dept. of Computer Science, Washington University 33 Example Uses of Composite Composite Pattern Summary GUIs, again. Compound graphical objects (shapes) are perfect examples. So are nested menus. Modelling manufacturing processes Assemblies are composed of subassemblies Compiler parse trees Structural Ties objects together, hierarchically Commonly used, like Iterator OO approaches factor out interface commonality into (abstract) base classes, to allow polymorphic treatment of instances Composite supports aggregation of objects with such common interfaces, allowing uniform treatment by users Nested transactions Together with Command pattern, to compose operations while supporting atomicity at various levels Copyright c Dept. of Computer Science, Washington University 34 Copyright c Dept. of Computer Science, Washington University 35
Computing Concepts with Java Essentials
2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Computing Concepts with Java Essentials 3rd Edition Cay Horstmann
Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science. Unit of Study / Textbook Correlation
Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science updated 03/08/2012 Unit 1: JKarel 8 weeks http://www.fcps.edu/is/pos/documents/hs/compsci.htm
Java 6 'th. Concepts INTERNATIONAL STUDENT VERSION. edition
Java 6 'th edition Concepts INTERNATIONAL STUDENT VERSION CONTENTS PREFACE vii SPECIAL FEATURES xxviii chapter i INTRODUCTION 1 1.1 What Is Programming? 2 J.2 The Anatomy of a Computer 3 1.3 Translating
Java the UML Way: Integrating Object-Oriented Design and Programming
Java the UML Way: Integrating Object-Oriented Design and Programming by Else Lervik and Vegard B. Havdal ISBN 0-470-84386-1 John Wiley & Sons, Ltd. Table of Contents Preface xi 1 Introduction 1 1.1 Preliminaries
Java (12 Weeks) Introduction to Java Programming Language
Java (12 Weeks) Topic Lecture No. Introduction to Java Programming Language 1 An Introduction to Java o Java as a Programming Platform, The Java "White Paper" Buzzwords, Java and the Internet, A Short
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Patterns in. Lecture 2 GoF Design Patterns Creational. Sharif University of Technology. Department of Computer Engineering
Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 2 GoF Design Patterns Creational 1 GoF Design Patterns Principles Emphasis on flexibility and reuse through decoupling of classes. The underlying
How To Design Software
The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time The design process and design methods Design strategies
Designing and Writing a Program DESIGNING, CODING, AND DOCUMENTING. The Design-Code-Debug Cycle. Divide and Conquer! Documentation is Code
Designing and Writing a Program DESIGNING, CODING, AND DOCUMENTING Lecture 16 CS2110 Spring 2013 2 Don't sit down at the terminal immediately and start hacking Design stage THINK first about the data you
Fundamentals of Java Programming
Fundamentals of Java Programming This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
CMSC 132: Object-Oriented Programming II. Design Patterns I. Department of Computer Science University of Maryland, College Park
CMSC 132: Object-Oriented Programming II Design Patterns I Department of Computer Science University of Maryland, College Park Design Patterns Descriptions of reusable solutions to common software design
Assignment # 2: Design Patterns and GUIs
CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science CSc 133 Object-Oriented Computer Graphics Programming Spring 2014 John Clevenger Assignment # 2: Design Patterns and GUIs
Moving from CS 61A Scheme to CS 61B Java
Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you
PL/SQL Programming Workbook
ORACLG Oracle Press Oracle Database 11 g PL/SQL Programming Workbook TIB/UB Hannover 89 ACKNOWLEDGMENTS INTRODUCTION xvii xix PARTI PL/SQL Fundamentals 1 Oracle Development Overview 3 History and Background
KITES TECHNOLOGY COURSE MODULE (C, C++, DS)
KITES TECHNOLOGY 360 Degree Solution www.kitestechnology.com/academy.php [email protected] [email protected] Contact: - 8961334776 9433759247 9830639522.NET JAVA WEB DESIGN PHP SQL, PL/SQL
Principles of Software Construction: Objects, Design and Concurrency. GUIs with Swing. toad 15-214. Spring 2013
Principles of Software Construction: Objects, Design and Concurrency GUIs with Swing 15-214 toad Spring 2013 Christian Kästner Charlie Garrod School of Computer Science 2012-13 C Garrod, C Kästner, J Aldrich,
1. What are Data Structures? Introduction to Data Structures. 2. What will we Study? CITS2200 Data Structures and Algorithms
1 What are ata Structures? ata Structures and lgorithms ata structures are software artifacts that allow data to be stored, organized and accessed Topic 1 They are more high-level than computer memory
GUIs with Swing. Principles of Software Construction: Objects, Design, and Concurrency. Jonathan Aldrich and Charlie Garrod Fall 2012
GUIs with Swing Principles of Software Construction: Objects, Design, and Concurrency Jonathan Aldrich and Charlie Garrod Fall 2012 Slides copyright 2012 by Jeffrey Eppinger, Jonathan Aldrich, William
Chapter 1 Fundamentals of Java Programming
Chapter 1 Fundamentals of Java Programming Computers and Computer Programming Writing and Executing a Java Program Elements of a Java Program Features of Java Accessing the Classes and Class Members The
History OOP languages Year Language 1967 Simula-67 1983 Smalltalk
History OOP languages Intro 1 Year Language reported dates vary for some languages... design Vs delievered 1957 Fortran High level programming language 1958 Lisp 1959 Cobol 1960 Algol Structured Programming
Glossary of Object Oriented Terms
Appendix E Glossary of Object Oriented Terms abstract class: A class primarily intended to define an instance, but can not be instantiated without additional methods. abstract data type: An abstraction
GUI Event-Driven Programming
GUI Event-Driven Programming CSE 331 Software Design & Implementation Slides contain content by Hal Perkins and Michael Hotan 1 Outline User events and callbacks Event objects Event listeners Registering
Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53
Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
How Scala Improved Our Java
How Scala Improved Our Java Sam Reid PhET Interactive Simulations University of Colorado http://spot.colorado.edu/~reids/ PhET Interactive Simulations Provides free, open source educational science simulations
Project 4 DB A Simple database program
Project 4 DB A Simple database program Due Date April (Friday) Before Starting the Project Read this entire project description before starting Learning Objectives After completing this project you should
JiST Graphical User Interface Event Viewer. Mark Fong [email protected]
JiST Graphical User Interface Event Viewer Mark Fong [email protected] Table of Contents JiST Graphical User Interface Event Viewer...1 Table of Contents...2 Introduction...3 What it does...3 Design...3
Oracle Database Security and Audit
Copyright 2014, Oracle Database Security and Beyond Checklists Learning objectives Understand data flow through an Oracle database instance Copyright 2014, Why is data flow important? Data is not static
The ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999
The ConTract Model Helmut Wächter, Andreas Reuter November 9, 1999 Overview In Ahmed K. Elmagarmid: Database Transaction Models for Advanced Applications First in Andreas Reuter: ConTracts: A Means for
The Command Pattern. The Command Pattern: Motivation
The Command Pattern The Command Pattern encapsulates a request as an object, thereby letting you parameterize other objects with different requests, queue or log requests, and support undoable operations.
Developing GUI Applications: Architectural Patterns Revisited
Developing GUI Applications: Architectural Patterns Revisited A Survey on MVC, HMVC, and PAC Patterns Alexandros Karagkasidis [email protected] Abstract. Developing large and complex GUI applications
Android Application Development Course Program
Android Application Development Course Program Part I Introduction to Programming 1. Introduction to programming. Compilers, interpreters, virtual machines. Primitive data types, variables, basic operators,
How To Understand The Dependency Inversion Principle (Dip)
Embedded Real-Time Systems (TI-IRTS) General Design Principles 1 DIP The Dependency Inversion Principle Version: 22-2-2010 Dependency Inversion principle (DIP) DIP: A. High level modules should not depend
Design with Reuse. Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1
Design with Reuse Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1 Objectives To explain the benefits of software reuse and some reuse
Design Patterns. V22.0474-001 Software Engineering Lecture 8. Adapted from Prof. Necula CS 169, Berkeley 1
Design Patterns V22.0474-001 Software Engineering Lecture 8 1 How Do We Design Software? We all understand Algorithms Data structures Classes When describing a design, algorithms/data structures/classes
Java 7 Recipes. Freddy Guime. vk» (,\['«** g!p#« Carl Dea. Josh Juneau. John O'Conner
1 vk» Java 7 Recipes (,\['«** - < g!p#«josh Juneau Carl Dea Freddy Guime John O'Conner Contents J Contents at a Glance About the Authors About the Technical Reviewers Acknowledgments Introduction iv xvi
Tutorial on Writing Modular Programs in Scala
Tutorial on Writing Modular Programs in Scala Martin Odersky and Gilles Dubochet 13 September 2006 Tutorial on Writing Modular Programs in Scala Martin Odersky and Gilles Dubochet 1 of 45 Welcome to the
MiniDraw Introducing a framework... and a few patterns
MiniDraw Introducing a framework... and a few patterns What is it? [Demo] 2 1 What do I get? MiniDraw helps you building apps that have 2D image based graphics GIF files Optimized repainting Direct manipulation
æ A collection of interrelated and persistent data èusually referred to as the database èdbèè.
CMPT-354-Han-95.3 Lecture Notes September 10, 1995 Chapter 1 Introduction 1.0 Database Management Systems 1. A database management system èdbmsè, or simply a database system èdbsè, consists of æ A collection
Habanero Extreme Scale Software Research Project
Habanero Extreme Scale Software Research Project Comp215: Java Method Dispatch Zoran Budimlić (Rice University) Always remember that you are absolutely unique. Just like everyone else. - Margaret Mead
5.17 GUI. Xiaoyi Jiang Informatik I Grundlagen der Programmierung
AWT vs. Swing AWT (Abstract Window Toolkit; Package java.awt) Benutzt Steuerelemente des darunterliegenden Betriebssystems Native Code (direkt für die Maschine geschrieben, keine VM); schnell Aussehen
Transactions and Recovery. Database Systems Lecture 15 Natasha Alechina
Database Systems Lecture 15 Natasha Alechina In This Lecture Transactions Recovery System and Media Failures Concurrency Concurrency problems For more information Connolly and Begg chapter 20 Ullmanand
CompuScholar, Inc. Alignment to Utah's Computer Programming II Standards
CompuScholar, Inc. Alignment to Utah's Computer Programming II Standards Course Title: TeenCoder: Java Programming Course ISBN: 978 0 9887070 2 3 Course Year: 2015 Note: Citation(s) listed may represent
Chapter 6: Programming Languages
Chapter 6: Programming Languages Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 6: Programming Languages 6.1 Historical Perspective
Recovery System C H A P T E R16. Practice Exercises
C H A P T E R16 Recovery System Practice Exercises 16.1 Explain why log records for transactions on the undo-list must be processed in reverse order, whereas redo is performed in a forward direction. Answer:
Structural Design Patterns Used in Data Structures Implementation
Structural Design Patterns Used in Data Structures Implementation Niculescu Virginia Department of Computer Science Babeş-Bolyai University, Cluj-Napoca email address: [email protected] November,
Design Patterns for Games
Design Patterns for Games Dung ( Zung ) Nguyen and Stephen B. Wong Dept. of Computer Science Rice University Houston, TX 77005 [email protected], [email protected] Abstract Designing a two-person game involves
Syllabus for CS 134 Java Programming
- Java Programming Syllabus Page 1 Syllabus for CS 134 Java Programming Computer Science Course Catalog 2000-2001: This course is an introduction to objectoriented programming using the Java language.
Implementação. Interfaces Pessoa Máquina 2010/11. 2009-11 Salvador Abreu baseado em material Alan Dix. Thursday, June 2, 2011
Implementação Interfaces Pessoa Máquina 2010/11 2009-11 baseado em material Alan Dix 1 Windowing systems Architecture Layers Higher level Tool UI Toolkit (Widgets) Window System OS Application Hardware
DEVELOPMENT OF AN ANALYSIS AND REPORTING TOOL FOR ORACLE FORMS SOURCE CODES
DEVELOPMENT OF AN ANALYSIS AND REPORTING TOOL FOR ORACLE FORMS SOURCE CODES by Çağatay YILDIRIM June, 2008 İZMİR CONTENTS Page PROJECT EXAMINATION RESULT FORM...ii ACKNOWLEDGEMENTS...iii ABSTRACT... iv
Basic SQL Server operations
Basic SQL Server operations KB number History 22/05/2008 V1.0 By Thomas De Smet CONTENTS CONTENTS... 1 DESCRIPTION... 1 SOLUTION... 1 REQUIREMENTS...13 REFERENCES...13 APPLIES TO...13 KEYWORDS...13 DESCRIPTION
Computer Science III Advanced Placement G/T [AP Computer Science A] Syllabus
Computer Science III Advanced Placement G/T [AP Computer Science A] Syllabus Course Overview This course is a fast-paced advanced level course that focuses on the study of the fundamental principles associated
Iterator Pattern. CSIE Department, NTUT Chien-Hung Liu. Provide a way to access the elements of an aggregate object sequentially
Iterator Pattern CSIE Department, NTUT Chien-Hung Liu Iterator: Intent Provide a way to access the elements of an aggregate object sequentially without exposing its underlying representation Also known
Tutorial Reference Manual. Java WireFusion 4.1
Tutorial Reference Manual Java WireFusion 4.1 Contents INTRODUCTION...1 About this Manual...2 REQUIREMENTS...3 User Requirements...3 System Requirements...3 SHORTCUTS...4 DEVELOPMENT ENVIRONMENT...5 Menu
Introduction to Database Management Systems
Database Administration Transaction Processing Why Concurrency Control? Locking Database Recovery Query Optimization DB Administration 1 Transactions Transaction -- A sequence of operations that is regarded
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
The Basic Java Applet and JApplet
I2PUJ4 - Chapter 6 - Applets, HTML, and GUI s The Basic Java Applet and JApplet Rob Dempster [email protected] School of Computer Science University of KwaZulu-Natal Pietermaritzburg Campus I2PUJ4 - Chapter
Génie Logiciel et Gestion de Projets. Patterns
Génie Logiciel et Gestion de Projets Patterns 1 Alexander s patterns Christoffer Alexander The Timeless Way of Building, Christoffer Alexander, Oxford University Press, 1979, ISBN 0195024028 Each pattern
El Dorado Union High School District Educational Services
El Dorado Union High School District Course of Study Information Page Course Title: ACE Computer Programming II (#495) Rationale: A continuum of courses, including advanced classes in technology is needed.
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2009 Vol. 8, No. 5, July-August 2009 The Application of Design Patterns to Develop
Getting Started with the Internet Communications Engine
Getting Started with the Internet Communications Engine David Vriezen April 7, 2014 Contents 1 Introduction 2 2 About Ice 2 2.1 Proxies................................. 2 3 Setting Up ICE 2 4 Slices 2
CSCI 253. Object Oriented Programming (OOP) Overview. George Blankenship 1. Object Oriented Design: Java Review OOP George Blankenship.
CSCI 253 Object Oriented Design: Java Review OOP George Blankenship George Blankenship 1 Object Oriented Programming (OOP) OO Principles Abstraction Encapsulation Abstract Data Type (ADT) Implementation
Programming and Software Development CTAG Alignments
Programming and Software Development CTAG Alignments This document contains information about four Career-Technical Articulation Numbers (CTANs) for Programming and Software Development Career-Technical
Object oriented design process
Unit IV Design Object oriented design process 1.Apply design axioms to design classes 1.1 Refine and complete the static UML class diagram 1.2 Iterate and refine again 2. Design the access layer 2.1 create
Tivoli Storage Manager Explained
IBM Software Group Dave Cannon IBM Tivoli Storage Management Development Oxford University TSM Symposium 2003 Presentation Objectives Explain TSM behavior for selected operations Describe design goals
ATM Case Study OBJECTIVES. 2005 Pearson Education, Inc. All rights reserved. 2005 Pearson Education, Inc. All rights reserved.
1 ATM Case Study 2 OBJECTIVES.. 3 2 Requirements 2.9 (Optional) Software Engineering Case Study: Examining the Requirements Document 4 Object-oriented design (OOD) process using UML Chapters 3 to 8, 10
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
C# Cookbook. Stephen Teilhet andjay Hilyard. O'REILLY 8 Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo '"J""'
C# Cookbook '"J""' Stephen Teilhet andjay Hilyard O'REILLY 8 Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo Tableof Contents Preface xv 1. Numbers 1 1.1 Determining Approximate Equality Between
Table of Contents. Adding Build Targets to the SDK 8 The Android Developer Tools (ADT) Plug-in for Eclipse 9
SECOND EDITION Programming Android kjj *J} Zigurd Mednieks, Laird Dornin, G. Blake Meike, and Masumi Nakamura O'REILLY Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Preface xiii Parti.
3] E-mail Alert Configuration for User Login Failure and Incorrect Guest Details [HIA]
Version X.3.6.5.0 Product: 24online Release Number: X.3.6.5.0 Customer Support: For more information or support, please visit us at www.24onlinebilling.com or email [email protected]. This document
The Rules 1. One level of indentation per method 2. Don t use the ELSE keyword 3. Wrap all primitives and Strings
Object Calisthenics 9 steps to better software design today, by Jeff Bay http://www.xpteam.com/jeff/writings/objectcalisthenics.rtf http://www.pragprog.com/titles/twa/thoughtworks-anthology We ve all seen
Chapter 10. Backup and Recovery
Chapter 10. Backup and Recovery Table of Contents Objectives... 1 Relationship to Other Units... 2 Introduction... 2 Context... 2 A Typical Recovery Problem... 3 Transaction Loggoing... 4 System Log...
CS 111 Classes I 1. Software Organization View to this point:
CS 111 Classes I 1 Software Organization View to this point: Data Objects and primitive types Primitive types operators (+, /,,*, %). int, float, double, char, boolean Memory location holds the data Objects
Software Design Principles and Guidelines
Design Principles and Guidelines Overview CS 342: Object-Oriented Software Development Lab Software Design Principles and Guidelines David L. Levine Christopher D. Gill Department of Computer Science Washington
INTRODUCTION TO OBJECTIVE-C CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 12 09/29/2011
INTRODUCTION TO OBJECTIVE-C CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 12 09/29/2011 1 Goals of the Lecture Present an introduction to Objective-C 2.0 Coverage of the language will be INCOMPLETE
The Command Dispatcher Pattern
The Command Dispatcher Pattern Can also be called: Command Evaluator Pattern. Benoit Dupire and Eduardo B Fernandez {[email protected], [email protected]} Department of Computer Science and Engineering.
PROBLEM SOLVING SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON
PROBLEM SOLVING WITH SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON Addison Wesley Boston San Francisco New York London
COMPUTER SCIENCE. 1. Computer Fundamentals and Applications
COMPUTER SCIENCE 1. Computer Fundamentals and Applications (i)generation of Computers, PC Family of Computers, Different I/O devices;introduction to Operating System, Overview of different Operating Systems,
Centralized Disaster Recovery using RDS
Centralized Disaster Recovery using RDS RDS is a cross-platform, scheduled replication application. Using RDS s replication and scheduling capabilities, a Centralized Disaster Recovery model may be used
Java EE Web Development Course Program
Java EE Web Development Course Program Part I Introduction to Programming 1. Introduction to programming. Compilers, interpreters, virtual machines. Primitive types, variables, basic operators, expressions,
System types. Distributed systems
System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors
Web Application Development for the SOA Age Thinking in XML
Web Application Development for the SOA Age Thinking in XML Enterprise Web 2.0 >>> FAST White Paper August 2007 Abstract Whether you are building a complete SOA architecture or seeking to use SOA services
Exercise 8: SRS - Student Registration System
You are required to develop an automated Student Registration System (SRS). This system will enable students to register online for courses each semester. As part of the exercise you will have to perform
Object Oriented Design
Object Oriented Design Kenneth M. Anderson Lecture 20 CSCI 5828: Foundations of Software Engineering OO Design 1 Object-Oriented Design Traditional procedural systems separate data and procedures, and
C++ INTERVIEW QUESTIONS
C++ INTERVIEW QUESTIONS http://www.tutorialspoint.com/cplusplus/cpp_interview_questions.htm Copyright tutorialspoint.com Dear readers, these C++ Interview Questions have been designed specially to get
Programming by Contract. Programming by Contract: Motivation. Programming by Contract: Preconditions and Postconditions
COMP209 Object Oriented Programming Designing Classes 2 Mark Hall Programming by Contract (adapted from slides by Mark Utting) Preconditions Postconditions Class invariants Programming by Contract An agreement
mframe Software Development Platform KEY FEATURES
mframe Software Development Platform mframe is a comprehensive software development platform for building modern modular WEB and B2B applications. It consists of basic core modules as well as other delevoped
Administering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
Automated Data Collection for Usability Evaluation in Early Stages of Application Development
Automated Data Collection for Usability Evaluation in Early Stages of Application Development YONGLEI TAO School of Computing and Information Systems Grand Valley State University Allendale, MI 49401 USA
Unit 12 Database Recovery
Unit 12 Database Recovery 12-1 Contents 12.1 Introduction 12.2 Transactions 12.3 Transaction Failures and Recovery 12.4 System Failures and Recovery 12.5 Media Failures and Recovery Wei-Pang Yang, Information
