Of Genericity and Other Daemons
نویسنده
چکیده
This paper presents genericity in an historical fashion, by rst explaining how it is commonly presented intuitively, then by showing how this intuitive way, while convenient from a training point of view, is limited and can be extended signiicantly if completed using a more formal framework. The current implementation of param-eterized classes in the YAFL programming language 1] is then described in order to show how this improved formalization can be put to work. 1 Reuse, a short history Reuse is one of the Loch Ness monsters of the software industry. There have been many attempts to formalize, measure, encourage, and control software reuse. Besides administrative incentives and organizational changes required in order to change a software development organization into a reuse intensive building-block oriented factory, one can distinguish between three diierent kinds of software reuse from a technical point of view: Function libraries. Given a set of input parameters, a function performs some task, computes something, writes data to disk, generates a pseudo-random number, etc... This kind of reuse has been around for decades, and is still widely used in the scientiic community, where function libraries are available for virtually any numerical or semi-numerical problem one can think of. This kind of reuse is very limited in scope, since it only works in cases where the problem to be solved can be extracted context-free, and where the parameters are reasonably easy to specify. It is not a reuse of design. The data structures deened in a functional library cannot be altered easily to adapt to a given reuse environment. Inheritance. A given data type is deened together with attached behavior, and one can deene new data types derived from this data type, extending it, reusing some of its attached behaviors, overriding or extending methods. For yet another deenition of inheritance, please refer to 2].
منابع مشابه
Hana Filip and Greg
There are various opinions about how the phenomenon of sentential genericity (Carlson and Pelletier, 1995) is related to other classes of expressions of natural language. The notion of 'genericity' is most commonly viewed as having close ties to tense, mood and aspect (cf. Dahl, 1985; Comrie, 1985). For instance, philosophers and occasionally linguists (e.g. Dahl, 1975, 1985, and 1995) make use...
متن کاملDaemon detection experiment
A month-long observation of two horizontal mutually light-isolated scintillating screens, 1 m in area and located one above the other a certain distance apart, revealed about 60–70 correlated signals, whose time shift corresponds to an average velocity of only ∼ 5(±0.3dex) km s. We assign the origin of these signals to the negative daemons, i.e. electrically charged Planckian particles which su...
متن کاملThe Service Configurator framework: an extensible architecture for dynamically configuring concurrent, multi-service network daemons
Developing extensible, robust, and efficient network daemons is a challenging task. This paper describes an object-oriented framework consisting of automated tools and reusable components that simplifies the task of developing, configuring, and reconfiguring concurrent, multi-service network daemons. These daemons may contain multiple communicationrelated services that execute in one or more pr...
متن کاملDaemon Conversions in Distributed Self-stabilizing Algorithms
We consider protocols to transform a self-stabilizing algorithm for one daemon to one that can run under a different daemon. In the literature, there are several daemons, and several possible attributes of those daemons, and it is customary to detail the choice of daemon one is using in designing a specific self-stabilizing algorithm. The choice of daemon plays an important role in designing se...
متن کاملBounded Site Failures: An Approach to Unreliable Grid Environments
The abstract behaviour of a grid application management system can be modelled as an Orc expression in which sites are called to perform sub-computations. An Orc expression specifies how a set of site calls are to be orchestrated so as to realise some overall desired computation. In this paper evaluations of Orc expressions in untrusted environments are analysed by means of game theory. The set...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996