skip to main content
article

Event-based implicit invocation decentralized in Ada

Authors Info & Claims
Published:01 March 2002Publication History
Skip Abstract Section

Abstract

Nowadays more and more attraction is drawn by the event-based implicit invocation --- one of useful architectural patterns, because of its loose coupling between components in the architecture and reactive integration in software systems. Analyzing object-oriented interaction with objects, this paper, based upon the principle of software architecture, presents an approach on event-based object model with Ada exception handler. Consequently it is possible for us to improve, with adding specific architectural patterns, traditional programming languages into architectural description languages.

References

  1. Mary Shaw and David Garlan, Software Architecture: Perspectives on an emerging discipline, Prentice-Hall International, Inc 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Nenad Medvidovic and Richard N. Taylor, A Classification and comparison Framework for Software Architecture Description Languages, IEEE Transactions on SE, VOL.26, NO. 1,Jan. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Laurence Vamhelsuwe, Mastering JavaBeans, SYBEX Inc., 1997.Google ScholarGoogle Scholar
  4. Liang Xianzhong and Wang Zhenyu, Ada-based Support for Abstraction, Encapsulation and Unit Hierarchy, Proceedings of Tri-Ada'91 International Conference, San Jose, USA, 1991.10.P116-125 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bertrand Meyer, Object-Oriented Software Construction, Prentice-Hall International, Inc1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Liang Xianzhong, Wang Zhenyu, Remolding Diversified Objects in Ada95: Toward A-Object Pattern, Proc. ISES-01, Wuhan, China, Mar. 23-28, 2001Google ScholarGoogle Scholar

Index Terms

  1. Event-based implicit invocation decentralized in Ada

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader