Reflective Java: Making Java Even More Flexible

نویسنده

  • Zhixue Wu
چکیده

Java has become popular as a programming language for the Internet because of its ability to simplify the development of flexible, portable applications with graphical user interfaces. Using Java, users can write a program once and run it on any platform. However, Java lacks a good mechanism to support integration of system software, which is required by new applications such as mobile computing, networked interactive multimedia and network programming. In this paper, we present the Reflective Java project which aims to enable Java-powered systems to be customised dynamically, flexibly and transparently to cater for the particular requirements of an application, or changes in its run-time environment. Reflective Java enables metalevel programming of systems functions as wrappers around method calls. Using metalevel programming, a clear separation can be made between those parts of an application that are concerned with implementing its basic functionality and those parts that are concerned with addressing system issues. Thus, it becomes possible to change the quality of application delivery through alternative infrastructures without disturbing the application components. We first explain how to use a metaobject protocol to achieve flexibility and customisability. Then we show how reflection can be obtained without making any change to the Java language, its compiler or its virtual machine. As an example, an object transaction service is described to demonstrate the benefits and feasibility of Reflective Java. Reflective Java: Making Java Even More Flexible

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reflective Java and A Reflective Component-Based Transaction Architecture

In this paper, we first give a brief introduction to our Reflective Java technology. Then we describe our work on using Reflective Java to implement a flexible transaction architecture that meets the needs of Internet applications. Finally, we report some of our experience, particularly our two-layer approach on constructing metaobjects.

متن کامل

USENIX Association Proceedings of the 6 th USENIX Conference on Object - Oriented Technologies and Systems

Many authors have proposed using byte code rewriting as a way of adapting or extending the behaviour of Java classes. There are toolkits available that simplify this process and raise the level of abstraction above byte code. However, to the best of our knowledge, none of these toolkits provide a complete model of behavioural reflection for Java. In this paper, we describe how we have used load...

متن کامل

Kava - Using Byte code Rewriting to add Behavioural Reflection to Java

Many authors have proposed using byte code rewriting as a way of adapting or extending the behaviour of Java classes. There are toolkits available that simplify this process and raise the level of abstraction above byte code. However, to the best of our knowledge, none of these toolkits provide a complete model of behavioural reflection for Java. In this paper, we describe how we have used load...

متن کامل

BT position paper - The use of Reflective techniques in middleware for end to end QoS control of real time applications on the Internet

This position paper describes some of the work done and forthcoming at BT in the area of reflective techniques to support real-time services. Reflection provides flexibility, adaptability, system independence and dynamic facilities and is therefore a very suitable technique to provide offthe-shelf flexible software components for real time middleware. A current result of the work in this area i...

متن کامل

Reflective Middleware and Security: OOPP meets Obol

The manner in which one can apply the security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either too simple and limited or too complex and difficult to use. In both cases are the provided features static and do not support the flexibility needed in a wide range of applications. This paper presents an approach to flexible security mechanisms in the contex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997