An Automatic Reversible Transformation from Composite to Visitor in Java
|
|
|
- Sydney May
- 10 years ago
- Views:
Transcription
1 An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet, P. Merle (eds.); Conférence en Ingénierie du Logiciel (CIEL), <hal > HAL Id: hal Submitted on 18 Sep 2012 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 An Automatic Reversible Transformation from Composite to Visitor in Java Akram AJOULI INRIA - ASCOLA team (EMN - INRIA - LINA) (Nantes, France) [email protected] Abstract We build reversible transformations between Composite and Visitor design patterns in Java programs. Such transformations represent an automatic reversible switching between different program architectures with a guarantee of semantic preservation. In this paper, we detail the algorithms of the transformations implemented by composing elementary refactoring operations. The transformations were automated with the refactoring tool of a popular IDE: Intellij Idea. Keywords: Program transformation, design patterns, refactoring. 1 Introduction Design patterns are program structures used to provide reuse and maintainability [4]. Each design pattern is specifically useful for some kinds of evolution. For example, the Composite (as well as the Interpretor pattern or the simple class hierarchies) and the Visitor design patterns offer two dual axes of decomposition for programs: while the former allows modular maintenance with respect to data, the latter permits modular maintenance with respect to operations/functions. So, each one of these patterns favors one kind of modular maintenance (modular adaptive or corrective maintenance as well as modular extension). We propose in this paper an automatic reversible transformation based on elementary refactoring operations between Composite and Visitor design patterns in Java programs. That transformation is designed to guarantee semantic preservation. The goal of our approach is to permit doing modular maintenance with respect to different axes of decomposition. To illustrate our approach we consider the program shown in Fig. 1. This program is structured according to the Composite pattern. It contains an abstract class Graphic and its two subclasses Ellipse and CompositeGraphic (this class contains the recursion of the Composite pattern). The functions of the program are implemented by the two methods print and prettyprint. Fig. 2 shows a program that is functionally equivalent to the first one but which is structured according to The Visitor pattern (Fig. 3 shows a class diagram which gives a clear overview about this structure). The program functions in this structure are implemented by classes PrintVisitor and PrettyprintVisitor. Our transformations automate switching from a Composite structure to a Visitor structure and vice-versa by composing refactoring operations offered by the refactoring tool of a popular IDE: Intellij Idea 1. In particular, they transform the program of Fig. 1 into the one of Fig. 2 and vice-versa. The target of such transformations is to get two different structures of the same program in order to decrease the maintenance cost by avoiding non modular maintenance tasks. This is defended in Cohen et al. [3] and we describe in this paper the mechanics behind the proposed transformations. We first describe some related work (Sec. 2). Then, we describe the processes of the transformations (Sec. 3). Finally, we conclude and we present some further work (Sec. 4). 1 P. Collet, P. Merle (eds.); Conférence en IngénieriE du Logiciel (CIEL), Juin 2012, pp
3 abstract class Graphic { abstract void p r i n t ( ) ; abstract void p r e t t y p r i n t ( ) ; } class E l l i p s e extends Graphic{ void p r i n t ( ) { System. out. p r i n t l n ( E l l i p s e ) ; } void p r e t t y p r i n t (){ System. out. p r i n t l n ( E l l i p s e : +this+. ) ;} } class CompositeGraphic extends Graphic { ArrayList<Graphic> graphics = new ArrayList<Graphic >(); void p r i n t ( ) { System. out. p r i n t l n ( Composite : ) ; for ( Graphic g : graphics ) {g. p r i n t ( ) ;} } void p r e t t y p r i n t (){ System. out. p r i n t l n ( Composite +this ) ; for ( Graphic g : graphics ) {g. p r e t t y p r i n t ( ) ;} System. out. p r i n t l n ( ( end ) ) ;} void add ( Graphic g ) {graphics. add ( g ) ; } } Figure 1: A program structured according to Composite Design pattern. abstract class Graphic { void p r i n t ( ) { accept (new P r i n t V i s i t o r ( ) ) ;} abstract void accept ( V i s i t o r v ) ; void p r e t t y p r i n t ( ) { accept (new P r e t t y p r i n t V i s i t o r ( ) ) ;}} class E l l i p s e extends Graphic{ void accept ( V i s i t o r v ) {v. v i s i t ( this ) ;} } class CompositeGraphic extends Graphic { ArrayList<Graphic> graphics = new ArrayList<Graphic >(); void accept ( V i s i t o r v ) {v. v i s i t ( this ) ;} void add ( Graphic g ) {graphics. add ( g);}} (a) Data classes. abstract class V i s i t o r { abstract void v i s i t ( E l l i p s e e ) ; abstract void v i s i t ( CompositeGraphic c ) ;} class P r i n t V i s i t o r extends V i s i t o r { void v i s i t ( E l l i p s e e){system. out. p r i n t l n ( E l l i p s e ) ;} void v i s i t ( CompositeGraphic c ) { System. out. p r i n t l n ( Composite : ) ; for ( Graphic g : c. graphics ){g. accept ( this );}} } class P r e t t y p r i n t V i s i t o r extends V i s i t o r{ void v i s i t ( E l l i p s e e ) { System. out. p r i n t l n ( E l l i p s e : +e+. ) ;} void v i s i t ( CompositeGraphic c){ System. out. p r i n t l n ( Composite +c ) ; for ( Graphic g : c. graphics ){g. accept ( this ) ;} System. out. p r i n t l n ( ( end ) ) ; } } (b) Visitor classes. Figure 2: Visitor structure of the program shown in the Fig. 1. Client Visitor + visit(ellipse e) + visit(compositegraphic c) Graphic 0..* + accept(visitor v) Ellipse CompositeGraphic + accept(visitor v) + accept(visitor v) PrintVisitor + visit(ellipse e) + visit(compositegraphic c) +graphics PrettyprintVisitor + visit(ellipse e) + visit(compositegraphic c) Figure 3: Class diagram of the Visitor structure. 2 Actes de CIEL 2012
4 2 Refactoring on design patterns The idea of transforming design patterns is first discussed in the work of Takouda and Batory [2]. They propose an approach that aims to introduce patterns in object oriented programs. O Cinnéide [9] proposes also transformations to introduce patterns in programs. Even these works support many patterns, they do not study the case of Visitor pattern. The former doesnotstudyityetasapatternthatcouldbesupportedbytheirtool, thelattermentionsthat the automation of introducing this pattern is difficult ( Overall Assessment: Impractical [9], page ). Introducing Visitor pattern in a program was studied in few works. Mens and Tourwé [8] propose an algorithm that allows to transform a simple class hierarchy (without recursion) to a structure that respects the Visitor design pattern. Kerievsky [6] proposes also three schemes that allow to introduce an instance of Visitor pattern to a program. But both of these two works are not automated and do not take in consideration the recursion existing in the Composite pattern. Hills et al. [5] developed a tool that transforms a Visitor instance to a Composite instance. Their tool is used to transform a real program (their own transformation tool: Rascal [7]). These works are the nearest to ours. But they do not provide a reverse transformation. In the following we detail the algorithms of the transformations. The Composite to Visitor transformation can be considered as an extension of the one proposed in The work of Mens and Tourwé [8] but it supports the recursion existing in the Composite pattern. 3 Transformation algorithms We define two algorithms providing a reversible transformation from Composite to Visitor (see Figs. 4(a) and 4(b)). These algorithms are composed by elementary refactoring operations offered by the refactoring tool of Intellij Idea and a few other operations that have been implemented to make the transformations fully automated 2. These algorithms could be performed from the GUI (semi-automatic) or directly from the API (fully automatic). The same thing could be done with Eclipse. In the algorithms, we use the following notations: M: the set of business 3 methods. These methods could be detected automatically (in the example: M ={print, prettyprint}). C: the set of the classes in the composite hierarchy except its root (in the example: C ={Ellipse, CompositeGraphic}). S: the root of the composite structure (in the example: S = Graphic). V: a function that gives a visitor class name from a business method name (in the example: V(print) = PrintVisitor). V: the set of visitor classes, V = {V(m)} m M (in the example: V = {PrintVisitor, PrettyprintVisitor}). aux: a function used to generate names of temporary methods from business methods (in the example: aux(print) =printaux). These names are used only in intermediate states of the transformed program (the snapshot of some intermediate states of the program and the specification of the refactoring operations mentioned in the algorithm are given in and Cohen [1]). 2 The additional refactoring operations are available separately at 3 We use this term to precise the interesting methods in the program. 3
5 1. ForAll m inmdo CreateEmptyClass(V(m)) 2. ForAll m inmdo CreateIndirectionInSuperClass(S,m,aux(m)) 3. ForAll m inm, c incdo InlineMethodInvocations(c, m,aux(m)) 4. ForAll m inmdo AddParameterWithReuse(S,aux(m),V(m)) 5. ForAll m inm, c incdo MoveMethodWithDelegate(c,aux(m),V(m), visit ) 6. ExtractSuperClass(V, Visitor ) 7. ForAll m inmdo UseSuperType(S,aux(m),V(m), Visitor ) 8. MergeDuplicateMethods(S,{ aux(m) } m M, accept ) (a) Composite to Visitor transformation. 1. ForAll v invdo addspecializedmethodinhierarchy(s, accept, Visitor,v) deletemethodinhierarchy(s,accept, Visitor ) 2. ForAll c incdo pushdownall( Visitor, visit,c) 3. ForAll v inv, c incdo InlineMethod(v, visit,c) 4. ForAll m inmdo renamemethod(s,accept,v(m),aux(m)) 5. ForAll m inmdo removeparameter(s,aux(m),v(m)) 6. ForAll m inmdo replacemethodduplication(s,m) 7. ForAll m inmdo pushdownimplementation(s,m) 8. ForAll m inmdo pushdownall(s,aux(m)) 9. ForAll m inm, c incdo inlinemethod(c,aux(m)) 10. ForAll v invdo deleteclass(v) 11. deleteclass( Visitor ) (b) Visitor to Composite transformation. Figure 4: Algorithms for reversible transformation from Composite to Visitor. 3.1 From Composite to Visitor The algorithm of this transformation is shown in Fig. 4(a). This transformation consists of three main stages: preparing for moving business code; moving the business code to the Visitor structure and recovering the conventional structure of the Visitor pattern. Steps from 1 to 4 (preparing for moving business code). For each business method create an empty visitor class (step 1). These classes will receive later the corresponding business code (in our example create two classes named PrintVisitor and PrettyprintVisitor). To keep the same interface, make the business methods delegating their codes to auxiliary methods (printaux and prettyprintaux) (step 2). These auxiliary methods will become accept in the final program (see Fig. 2). Then, to make the recursive calls to auxiliary methods explicit, replace each business method invocation existing in the sub-classes of the composite hierarchy by a call to its corresponding auxiliary method (step 3). Finally, in order to make the refactoring tool able to move the auxiliary methods to their right destinations, add the right references to these destinations in the methods (step 4) since the move operation must know the destination. To do that, make the type of each parameter refer to the corresponding target class that will receive the method (in the example, add to the methods printaux and prettyprintaux respectively parameters of type PrintVisitor and PrettyprintVisitor). Step 5 (move business code from Composite to Visitor classes). Move auxiliary methods containing the business code to visitor classes. In order to create the double dispatch between the visitor structure and the composite structure, keep a delegation of each moved method in its original class (these delegations will constitute later the method accept). Also, rename all moved methods into visit. 4 Actes de CIEL 2012
6 Steps from 6 to 8 (recovering Visitor structure). Extract a super-class from visitor classes (step 6). The extracted super-class will contain the abstract visitor methods whose implementations are in visitor classes. Then, replace references to visitor classes to a reference to the super-class of the visitor hierarchy (step 7). Finally, since auxiliary methods have equivalent bodies, replace them by a unique method called accept (step 8). Result. After performing this transformation to the program having the Composite structure (Fig. 1), we get a program structured according to the Visitor pattern (Fig. 2). The resulted program is semantically equivalent to the initial one since the transformation is a composition of elementary refactoring operations. The automatic transformation took about 3 seconds. 3.2 From Visitor to Composite We define now the algorithm that performs the reverse transformation. This algorithm transforms a Composite to a Visitor (see Fig. 4(b)). This transformation consists mainly in moving the business code to the composite structure and deleting any dependencies between the two structures. It is also based on the following three stages: Steps 1 and 2 (preparing for moving business code). In order to make the method accept dealing directly with concrete visitors instead of the abstract Visitor, produce specialized methods from the method accept. Each new method has the same name as the initial method accept but its parameter type is changed to one of its sub-types (in the example, we get two additional methods accept(printvisitor v) and accept(prettyprintvisitor) in the abstract class Graphic). Repeat this action according to the number of concrete visitor classes (step 1). The initial method accept can be deleted since its role is delegated to the new methods. In order to be able to in-line visit methods (to move business code into composite classes), delete all abstract visit methods from the abstract Visitor (step 2). Step 3 (move business code from Visitor to Composite classes). In order to move the business code into composite classes, in-line the methods existing in the visitor classes and delete them from these classes. Steps from 4 to 11 (recovering Composite structure). In order to avoid getting the same methods in the same scope when deleting the parameters of the two methods accept, rename the accept methods with names of dummy methods used in Sec. 3.1 (step 4). The name of each method will be fixed according to the method parameter type (for example: the method accept(printvisitor v) becomes printaux(printvisitor v)). In order to delete any use of visitors in the Composite structure, remove the dummy methods parameters (step 5). Then, in order to delete the delegation of the business code to the dummy methods: first, replace any invocation of dummy methods appearing in the composite classes by the respective invocation of the right delegator method (step 6) (example: replace printaux() by print()); then, make delegator methods abstract and push down their implementations to the sub-classes (step 7); after that, in order to be able to in-line the dummy methods, delete their declarations from the abstract composite (step 8) and then, in-line them in the concrete composites and delete their declarations (step 9). Finally, to get the conventional structure of the Composite pattern, delete visitor hierarchy since it is not used anymore. Result. After performing this transformation to the program with the Visitor structure (Fig. 2), we get a program that respects the Composite structure and which is equivalent to the one shown in Fig. 1 except a few changes in the layout and the comments. The automatic transformation took also about 3 seconds. 5
7 4 Discussion and Further Work We have automated reversible transformations between Composite and Visitor patterns which are supposed to guarantee semantic preservation. These transformations have been applied successfully to the programs of Figs. 1 and 2. They take a relevant time comparing to the semi-automatic transformations done by triggering each basic refactoring operation from the GUI. The fully automatic one takes 3 seconds in each way, while the semi-automatic one takes 12 minutes in each way. The refactoring operations missing from IntelliJ Idea have been implemented in order to make the transformations fully automated. The algorithms of the transformations have been extended in order to support some variations in the above patterns: methods having parameters, methods returning values (Visitor with generic types), class hierarchies with several levels, an interface instead of abstract class and access to private fields (see [1]). As a future work, we aim to validate our algorithms by applying them to real programs and to real cases of software evolutions. We look also for formalizing these algorithms, proofing their correctness, calculating their minimum preconditions and studying their complexities. Acknowledgement: We thank Dmitry Jeremov and Anna Kozlova (JetBrains) for their help with the refactoring tool of IntelliJ IDEA. References [1] Akram and Julien Cohen. Refactoring Composite to Visitor and Inverse Transformation in Java. Technical report. Technical Report hal , archives-ouvertes.fr/hal , 19 pages. [2] Don Batory and Lance Tokuda. Automated software evolution via design pattern transformations. Technical report, University of Texas at Austin, [3] Julien Cohen, Rémi Douence, and Akram. Invertible Program Restructurings for Continuing Modular Maintenance. In CSMR 2012, Hungary, March pages, Early Research Achievements Track. [4] Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman, [5] Mark Hills, Paul Klint, Tijs Van Der Storm, and Jurgen Vinju. A case of visitor versus interpreter pattern. In Proceedings of the 49th international conference on Objects, models, components, patterns, TOOLS 11, pages Springer-Verlag, [6] Joshua Kerievsky. Refactoring to Patterns. Pearson Higher Education, [7] Paul Klint, Tijs van der Storm, and Jurgen Vinju. Rascal: A domain specific language for source code analysis and manipulation. In Proceedings of Source Code Analysis and Manipulation, SCAM 09, pages IEEE, [8] Tom Mens and Tom Tourwé. A survey of software refactoring. IEEE Trans. Softw. Eng., 30: , February [9] Mel O Cinnéide. Automated Application of Design Patterns: A Refactoring Approach. PhD thesis, Trinity College, Dublin, Oct Actes de CIEL 2012
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
A model driven approach for bridging ILOG Rule Language and RIF
A model driven approach for bridging ILOG Rule Language and RIF Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali To cite this version: Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali.
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
Territorial Intelligence and Innovation for the Socio-Ecological Transition
Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
Reusable Connectors in Component-Based Software Architecture
in Component-Based Software Architecture Abdelkrim Amirat, Mourad Oussalah To cite this version: Abdelkrim Amirat, Mourad Oussalah. Reusable Connectors in Component-Based Software Architecture. Ninth international
Cobi: Communitysourcing Large-Scale Conference Scheduling
Cobi: Communitysourcing Large-Scale Conference Scheduling Haoqi Zhang, Paul André, Lydia Chilton, Juho Kim, Steven Dow, Robert Miller, Wendy E. Mackay, Michel Beaudouin-Lafon To cite this version: Haoqi
Novel Client Booking System in KLCC Twin Tower Bridge
Novel Client Booking System in KLCC Twin Tower Bridge Hossein Ameri Mahabadi, Reza Ameri To cite this version: Hossein Ameri Mahabadi, Reza Ameri. Novel Client Booking System in KLCC Twin Tower Bridge.
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
Advantages and disadvantages of e-learning at the technical university
Advantages and disadvantages of e-learning at the technical university Olga Sheypak, Galina Artyushina, Anna Artyushina To cite this version: Olga Sheypak, Galina Artyushina, Anna Artyushina. Advantages
ASSISTING REFACTORING TOOL DEVELOPMENT THROUGH REFACTORING CHARACTERIZATION
ASSISTING REFACTORING TOOL DEVELOPMENT THROUGH REFACTORING CHARACTERIZATION Raúl Marticorena, Carlos López Language and Informatic Systems, University of Burgos, EPS Campus Vena Edificio C, Burgos, Spain
IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs
IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs Thomas Durieux, Martin Monperrus To cite this version: Thomas Durieux, Martin Monperrus. IntroClassJava: A Benchmark of 297 Small and Buggy
Patterns in. Lecture 2 GoF Design Patterns Creational. Sharif University of Technology. Department of Computer Engineering
Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 2 GoF Design Patterns Creational 1 GoF Design Patterns Principles Emphasis on flexibility and reuse through decoupling of classes. The underlying
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.
Minkowski Sum of Polytopes Defined by Their Vertices
Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Block-o-Matic: a Web Page Segmentation Tool and its Evaluation
Block-o-Matic: a Web Page Segmentation Tool and its Evaluation Andrés Sanoja, Stéphane Gançarski To cite this version: Andrés Sanoja, Stéphane Gançarski. Block-o-Matic: a Web Page Segmentation Tool and
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,
Contribution of Multiresolution Description for Archive Document Structure Recognition
Contribution of Multiresolution Description for Archive Document Structure Recognition Aurélie Lemaitre, Jean Camillerapp, Bertrand Coüasnon To cite this version: Aurélie Lemaitre, Jean Camillerapp, Bertrand
GenericServ, a Generic Server for Web Application Development
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student [email protected] Bilal CHEBARO Assistant professor [email protected] Abstract
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Syed Zulkarnain Syed Idrus, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin To cite this version: Syed Zulkarnain Syed
Software Refactoring using New Architecture of Java Design Patterns
Software Refactoring using New Architecture of Java Design Patterns Norddin Habti, Prashant 1, 1 Departement d informatique et de recherche operationnelle, Universite de Montreal, Quebec, Canada (Dated:
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
The truck scheduling problem at cross-docking terminals
The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking
ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development
ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida To cite this version: Stefanie Scherzinger, Thomas
An update on acoustics designs for HVAC (Engineering)
An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
Génie Logiciel et Gestion de Projets. Patterns
Génie Logiciel et Gestion de Projets Patterns 1 Alexander s patterns Christoffer Alexander The Timeless Way of Building, Christoffer Alexander, Oxford University Press, 1979, ISBN 0195024028 Each pattern
Donatella Corti, Alberto Portioli-Staudacher. To cite this version: HAL Id: hal-01055802 https://hal.inria.fr/hal-01055802
A Structured Comparison of the Service Offer and the Service Supply Chain of Manufacturers Competing in the Capital Goods and Durable Consumer Goods Industries Donatella Corti, Alberto Portioli-Staudacher
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,
Good Practices as a Quality-Oriented Modeling Assistant
Good Practices as a Quality-Oriented Modeling Assistant Vincent Le Gloahec, Régis Fleurquin, Salah Sadou To cite this version: Vincent Le Gloahec, Régis Fleurquin, Salah Sadou. Good Practices as a Quality-Oriented
Use of tabletop exercise in industrial training disaster.
Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
RANKING REFACTORING PATTERNS USING THE ANALYTICAL HIERARCHY PROCESS
RANKING REFACTORING PATTERNS USING THE ANALYTICAL HIERARCHY PROCESS Eduardo Piveta 1, Ana Morra 2, Maelo Penta 1 João Araújo 2, Pedro Guerrro 3, R. Tom Price 1 1 Instituto de Informática, Universidade
Towards Collaborative Learning via Shared Artefacts over the Grid
Towards Collaborative Learning via Shared Artefacts over the Grid Cornelia Boldyreff, Phyo Kyaw, Janet Lavery, David Nutter, Stephen Rank To cite this version: Cornelia Boldyreff, Phyo Kyaw, Janet Lavery,
Chapter 8 The Enhanced Entity- Relationship (EER) Model
Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri
Multi-agent and Workflow-Based Web Service Management Model
Multi-agent and Workflow-Based Web Service Management Model Wenjia Niu, Quansheng Dou, Xu Han, Xinghua Yang, Zhongzhi Shi To cite this version: Wenjia Niu, Quansheng Dou, Xu Han, Xinghua Yang, Zhongzhi
Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network
Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network Harold Mouchère, Eric Anquetil To cite this version: Harold Mouchère, Eric Anquetil. Generalization Capacity of Handwritten
Detection and Identification of Android Malware Based on Information Flow Monitoring
Detection and Identification of Android Malware Based on Information Flow Monitoring Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong To cite this version: Radoniaina Andriatsimandefitra, Valérie
Evaluating OO-CASE tools: OO research meets practice
Evaluating OO-CASE tools: OO research meets practice Danny Greefhorst, Matthijs Maat, Rob Maijers {greefhorst, maat, maijers}@serc.nl Software Engineering Research Centre - SERC PO Box 424 3500 AK Utrecht
sql-schema-comparer: Support of Multi-Language Refactoring with Relational Databases
sql-schema-comparer: Support of Multi-Language Refactoring with Relational Databases Hagen Schink Institute of Technical and Business Information Systems Otto-von-Guericke-University Magdeburg, Germany
Ontological Representations of Software Patterns
Ontological Representations of Software Patterns Jean-Marc Rosengard and Marian F. Ursu University of London http://w2.syronex.com/jmr/ Abstract. This paper 1 is based on and advocates the trend in software
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China Pree Thiengburanathum, Jesus Gonzalez-Feliu, Yacine Ouzrout,
Comparative optical study and 2 m laser performance of the Tm3+ doped oxyde crystals : Y3Al5O12, YAlO3, Gd3Ga5O12, Y2SiO5, SrY4(SiO4)3O
Comparative optical study and 2 m laser performance of the Tm3+ doped oxyde crystals : Y3Al5O12, YAlO3, Gd3Ga5O12, Y2SiO5, SrY4(SiO4)3O R. Moncorge, H. Manaa, M. Koselja, G. Boulon, C. Madej, J. Souriau,
SELECTIVELY ABSORBING COATINGS
SELECTIVELY ABSORBING COATINGS J. Vuletin, P. Kuli ik, M. Bosanac To cite this version: J. Vuletin, P. Kuli ik, M. Bosanac. SELECTIVELY ABSORBING COATINGS. Journal de Physique Colloques, 1981, 42 (C1),
XFlash A Web Application Design Framework with Model-Driven Methodology
International Journal of u- and e- Service, Science and Technology 47 XFlash A Web Application Design Framework with Model-Driven Methodology Ronnie Cheung Hong Kong Polytechnic University, Hong Kong SAR,
A Meeting Room Scheduling Problem
A Scheduling Problem Objective Engineering, Inc. 699 Windsong Trail Austin, Texas 78746 512-328-9658 FAX: 512-328-9661 [email protected] http://www.oeng.com Objective Engineering, Inc., 1999-2007. Photocopying,
New implementions of predictive alternate analog/rf test with augmented model redundancy
New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:
Model Driven Interoperability through Semantic Annotations using SoaML and ODM
Model Driven Interoperability through Semantic Annotations using SoaML and ODM JiuCheng Xu*, ZhaoYang Bai*, Arne J.Berre*, Odd Christer Brovig** *SINTEF, Pb. 124 Blindern, NO-0314 Oslo, Norway (e-mail:
Reactive Variability Realization with Test-Driven Development and Refactoring
Reactive Variability Realization with Test-Driven Development and Refactoring Glauco Silva Neves Informatics and Statistics Department - INE Federal University of Santa Catarina - UFSC Florianópolis, Brazil
Does the Act of Refactoring Really Make Code Simpler? A Preliminary Study
Does the Act of Refactoring Really Make Code Simpler? A Preliminary Study Francisco Zigmund Sokol 1, Mauricio Finavaro Aniche 1, Marco Aurélio Gerosa 1 1 Department of Computer Science University of São
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni To cite this version: J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni. ANALYSIS OF SNOEK-KOSTER
Agile Software Development
Agile Software Development Lecturer: Raman Ramsin Lecture 13 Refactoring Part 3 1 Dealing with Generalization: Pull Up Constructor Body Pull Up Constructor Body You have constructors on subclasses with
Structural Design Patterns Used in Data Structures Implementation
Structural Design Patterns Used in Data Structures Implementation Niculescu Virginia Department of Computer Science Babeş-Bolyai University, Cluj-Napoca email address: [email protected] November,
The Class Blueprint A Visualization of the Internal Structure of Classes
The Class Blueprint A Visualization of the Internal Structure of Classes Michele Lanza Software Composition Group University Of Bern Bern, Switzerland [email protected] Stéphane Ducasse Software Composition
BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Software Engineering 2
BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT March 2013 EXAMINERS REPORT Software Engineering 2 General Comments The pass rate this year was significantly better than
Migrating Legacy Software Systems to CORBA based Distributed Environments through an Automatic Wrapper Generation Technique
Migrating Legacy Software Systems to CORBA based Distributed Environments through an Automatic Wrapper Generation Technique Hyeon Soo Kim School of Comp. Eng. and Software Eng., Kum Oh National University
Towards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
Towards Software Configuration Management for Test-Driven Development
Towards Software Configuration Management for Test-Driven Development Tammo Freese OFFIS, Escherweg 2, 26121 Oldenburg, Germany [email protected] Abstract. Test-Driven Development is a technique where
Architectural Patterns (3)
Scatter/Gather Architectural Patterns (3) Prof. Cesare Pautasso http://www.pautasso.info [email protected] @pautasso Goal: send the same message to multiple recipients which will (or may) reply to
Run-time Variability Issues in Software Product Lines
Run-time Variability Issues in Software Product Lines Alexandre Bragança 1 and Ricardo J. Machado 2 1 Dep. I&D, I2S Informática Sistemas e Serviços SA, Porto, Portugal, [email protected] 2 Dep.
Aligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
Refactoring (in) Eclipse
Refactoring (in) Eclipse J. van den Bos Master s thesis August 15, 2008 Master Software Engineering Universiteit van Amsterdam Thesis Supervisor: Prof. Dr. P. Klint Internship Supervisor: Drs. H.J.S. Basten
