2015
DOI: 10.5381/jot.2015.14.1.a1
|View full text |Cite
|
Sign up to set email alerts
|

Foundational MDA Patterns for Service-Oriented Computing .

Abstract: As the foundation of EDI, B2C and B2B, distributed computing is a key enabler for today's enterprises and will become even more important with the advent of cloud computing on the one hand and an ever more agile work organization on the other hand. Whilst the rapid evolution of distributed computing technologies in the last three decades has delivered a rich set of platforms and paradigms for building robust enterprise systems, it has also left a legacy of unresolved problems including fundamental inconsistenc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…In this section we validate out-of-place debugging by evaluating IDRA with respect to performance and usability. In particular, we compare IDRA to TelePharo [20], the remote debugger for Pharo programs [31]. TelePharo can be seen as state-of-practice mainstream technology in remote debugging.…”
Section: Validationmentioning
confidence: 99%
“…In this section we validate out-of-place debugging by evaluating IDRA with respect to performance and usability. In particular, we compare IDRA to TelePharo [20], the remote debugger for Pharo programs [31]. TelePharo can be seen as state-of-practice mainstream technology in remote debugging.…”
Section: Validationmentioning
confidence: 99%
“…Bifrost is an extension to the Smalltalk MOP that relies on explicit meta-objects to provide sub-method [DDLM07] and partial behavioral reflection [TNCC03]. Bifrost is implemented through dynamic re-compilation of methods.…”
Section: Existing Solutionsmentioning
confidence: 99%
“…Bifrost is implemented through dynamic re-compilation of methods. Method invocations are intercepted using reflective methods [Mar06] similarly to the wrappers abstraction introduced by Brant et al [BFJR98]. These are subsequently recompiled using AST meta-objects that control the generated bytecode.…”
Section: Existing Solutionsmentioning
confidence: 99%
See 2 more Smart Citations