Describing the functionality of EJB using the behavior protocols

نویسندگان

  • Radek Pospíšil
  • František Plášil
چکیده

component architectures are getting more popular. Industrial and academic communities try to design facilities for description of component architectures. In the SOFA/DCUP project, the description of the architecture is based on the CDL (component definition language), that embodies the behavioral protocols. The behavioral protocols of components describe the behavior of the system. One of the biggest industrial company, Sun Microsystems created the Enterprise Java Beans architecture component architecture based on the Java language and environment. The EJB specification has not facilities for formal describing. In this paper, the behavioral protocols are used to describe the EJB. The preliminary results are presented, because the work is still in progress.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User interface code generation for EJB-based data models using intermediate form representations

The use of J2EE platform enables data model development based on EJB components. Data modeling concepts of EJB technology, although resembling those of relational databases, are different and need new methods for automated user interface code generation. This paper presents a method for user interface code generation based on intermediate form representations that can be used to build equivalen...

متن کامل

High–Available Enterprise JavaBeans Using Group Communication System Support

The Enterprise JavaBeans (EJB) architecture provides a structure to build scalable and distributed applications, based on transactions. Despite of the transactional service, if the server crashes, the EJB will be unavailable. The EJB could be recovered when the server restarts up. Its availability is restricted. High– available systems require fast recovery time that can be easily implemented u...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Accommodating Changing Requirements with EJB

Component Based Software Development promises to lighten the task of web application developers by providing a standard component architecture for building distributed object oriented business applications. Hard evidence consolidating this promise has yet to be provided, especially knowing that the standard libraries of today's programming languages offer considerable support for distribution (...

متن کامل

Study the curing behavior and mechanical properties of Pigmented UV curable epoxy acrylate monomers

The formulations contained different acrylate monomer with different structure and functionalities and TiO2, were applied to obtain pigmented acrylic films by UV exposure. The conversion and mechanical characteristic were correlated. The results showed that there is a significant interaction between pigment, reactive diluents’ type and mechanical properties of coatings. It seems that cured film...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999