Sciweavers

124 search results - page 21 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
PLDI
2005
ACM
15 years 3 months ago
Permission-based ownership: encapsulating state in higher-order typed languages
Today’s module systems do not effectively support information hiding in the presence of shared mutable objects, causing serious problems in the development and evolution of larg...
Neelakantan R. Krishnaswami, Jonathan Aldrich
ICSE
2004
IEEE-ACM
15 years 9 months ago
Skoll: Distributed Continuous Quality Assurance
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Atif M. Memon, Adam A. Porter, Cemal Yilmaz, Adith...
OOPSLA
2007
Springer
15 years 3 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
CORR
2004
Springer
129views Education» more  CORR 2004»
14 years 9 months ago
Runtime Reconfiguration of J2EE Applications
: Runtime reconfiguration considered as "applying required changes to a running system" plays an important role for providing high availability not only of safety- and mi...
Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm H...
NGITS
1993
Springer
15 years 1 months ago
AMOS - An Architecture for Active Mediators
AMOS (Active Mediators Object System) is an architecture to model, locate, search, combine, update, and monitor data in information systems with many work stations connected using...
Gustav Fahl, Tore Risch, Martin Sköld