Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.1145/2936314.2814223
|View full text |Cite
|
Sign up to set email alerts
|

Migrating large object-oriented Applications into component-based ones: instantiation and inheritance transformation

Abstract: Large object-oriented applications have complex and numerous dependencies, and usually do not have explicit software architectures. Therefore they are hard to maintain, and parts of them are difficult to reuse. Component-based development paradigm emerged for improving these aspects and for supporting effective maintainability and reuse. It provides better understandability through a high-level architecture view of the application. Thereby migrating object-oriented applications to component-based ones will con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Two or more individual reusable components are grouped together to form a cohesive cluster and all such clusters with higher values of TurboMQ are identified in the cluster solution of the Pareto front obtained. Finally, the obtained results are investigated using the metric proposed in equation (1). As part of the analysis, the following research questions are formulated: RQ1.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Two or more individual reusable components are grouped together to form a cohesive cluster and all such clusters with higher values of TurboMQ are identified in the cluster solution of the Pareto front obtained. Finally, the obtained results are investigated using the metric proposed in equation (1). As part of the analysis, the following research questions are formulated: RQ1.…”
Section: Methodsmentioning
confidence: 99%
“…Here, the sensitivity analysis is measured by computing the amount of deviation corresponding to the deviation introduced in the quality indicator function. This deviation is computed in terms of percentage, using equation (1).…”
Section: Sensitivity Analysis Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…The inheritance violation is caused when a class that inherits from another class belonging to a different microservice are encapsulated. To heal this encapsulation violation, we propose a two-step transformation process inspired from (Alshara et al, 2015): (i) Uncoupling the child/parent inheritance with a double proxy pattern. (ii) Recreating subtyping via interface inheritance.…”
Section: Inheritance Relationshipmentioning
confidence: 99%
“…The second mechanism that must be reproduced is the concept of polymorphic assignment. To preserve the first mechanism, we propose a double proxy pattern inspired by the work presented in (Alshara et al, 2015). In (Alshara et al, 2015), the authors propose a double delegate pattern to preserve the inheritance between the child and its parent class, residing each in a different components.…”
Section: Inheritance Relationshipmentioning
confidence: 99%