A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Constructing persistent object-oriented models with standard C++
2006
Journal of Object Technology
In this paper, it is suggested an approach and a design pattern for developing object-oriented models that need to be persistent, including the databases of moderate size, with using only the standard ...
The objects' serialization, reading, and management is implemented with using the virtual functions, list of type names, and object factory technique. 70 J OURNAL OF OBJECT TECHNOLOGY The possible solution ...
When programming the persistent object-oriented models in C++, it would be useful to find out the ways of writing the programs on the standard C++ language [Stroustrup1997] rather than using extensions ...
doi:10.5381/jot.2006.5.1.a2
fatcat:tpj4pdatdrelvmgng43id62gei
The ins and outs of Clean I/O
1995
Journal of functional programming
It has been used to write applications such as a window-based text editor, an object based drawing program, a relational database, and a spreadsheet program. ...
Clean file I/O is as powerful and flexible as it is in common imperative languages (one can read, write, and seek directly in a file). ...
Acknowledgements We would like to thank Marko van Eekelen for comments on the text, and also for pointing out that hygienic use of environments is not a programming conven tion but rather an obligatory ...
doi:10.1017/s0956796800001258
fatcat:qdfbfq6ykvb2vgo5ve4lxmj4we
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
2009
Journal in Computer Virology
This article deals with operational attacks leaded against cryptographic tools. ...
Sometimes, an attacker can only access encrypted streams, without having necessary tools to generate such a stream, and is unable to break the encryption used. ...
It should be able to retrieve Key structures with OpenSSL or any program manipulating DSA objects of OpenSSL (Apache certificates, for example). ...
doi:10.1007/s11416-008-0117-x
fatcat:q2hdupxwijhcznluzf4qbfv25u
Serialization for Ubiquitous Systems: An Evaluation of High Performance Techniques on Java Micro Edition
2008
2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
It thus reduces the source lines of code required to transmit objects across a network. This abstraction often comes with a runtime and data penalty. ...
Object marshaling, called Serialization in Java, offers a high level of abstraction for information interchange in object oriented systems. ...
Runtime Overhead The runtime tests measure the time it takes our implementation of object serialization to marshal the object and write it to the data stream. ...
doi:10.1109/ubicomm.2008.81
fatcat:k66piyf65rhzpnxcmca5nz4ode
Serialization in Object-Oriented Programming Languages
[chapter]
2019
Software Design and Modelling [Working Title]
This chapter depicts the process of converting object state into a format that can be transmitted or stored in currently used object-oriented programming languages. ...
It is a low-level technique, and several technical issues should be considered like endianness, size of memory representation, representation of numbers, object references, recursive object connections ...
In particular, C++ standard library contains stream representation as well as conversions between a binary or text streams and built-in data types. ...
doi:10.5772/intechopen.86917
fatcat:zag5loaclne4timnlm32weejdu
Pre-Columbian Transoceanic Contacts: Far-Out Fantasy, Unproven Possibility, or Undeniable Reality?
2014
Journal of Scientific Exploration
The standard view has been that once the Americas were settled via Beringia, the human denizens of the Western Hemisphere were essentially cut off from interaction with peoples of the Old World. ...
Heine-Geldern compared the forms of metal objects from these areas with those of the Dong Son (Đông Sơn) culture of northern Vietnam. ...
Critical commentators who purvey these kinds of characterizations typically write entertainingly but with anger and/or irony and sarcasm rather than with the neutral language that is supposed to distinguish ...
doaj:8096bc5386844156b49ca4e6b0c1d097
fatcat:xev6kfnjjje6jnrcok3dok3i2a
A types-as-sets semantics for milner-style polymorphism
1984
Proceedings of the 11th ACM SIGACT-SIGPLAN symposium on Principles of programming languages - POPL '84
The resulting semantics is simpler than that for fully polymorphic models [Leivant 83], and generalizes (,he standard constructions, such as retracts and ideals. ...
In this paper we present a semantics for Milner-style polymorphism in which types are sets. ...
Auk nowledgements A preliminary version of this paper was presented at the Workshop on Types and Polymorphism in Programming Languages, at Carnegle-Mellon University. ...
doi:10.1145/800017.800527
dblp:conf/popl/Wand84
fatcat:ezcjo6jcjzckrhs2tg7q5orqii
Calculating Functional Programs
[chapter]
2002
Lecture Notes in Computer Science
co-datatypes In the same way, T A = codata (A⊕) defines a polymorphic co-datatype, with destructor out T A :: T A → A ⊕ T A This induces a polymorphic unfold with universal property h = unfold T A f ⇔ ...
this type is out Stream :: Stream A → A × Stream A. ...
doi:10.1007/3-540-47797-7_5
fatcat:t4mkcq5aqvgnzcgneswpr6njve
PiCo: A Novel Approach to Stream Data Analytics
[chapter]
2018
Lecture Notes in Computer Science
PiCo proposes a programming model based on pipelines and operators that are polymorphic with respect to data types in the sense that it is possible to re-use the same algorithms and pipelines on different ...
data models (e.g., streams, lists, sets, etc.). ...
As we discuss in the present paper, all PiCo operators are polymorphic with respect to data types. ...
doi:10.1007/978-3-319-75178-8_10
fatcat:2yaxzubpibhtnlniose365ww6m
Piccola — A Small Composition Language
[chapter]
1999
Formal Methods for Open Object-Based Distributed Systems
Although object-oriented languages are well-suited to implement software components, they fail to shine in the construction of component-based applications, largely because object-oriented design tends ...
leads to designs based on domain objects and non-standard architectures. ...
In the Wiki application, we use wrapped Java output streams for writing HTML. ...
doi:10.1007/978-0-387-35562-7_1
fatcat:fgg7bav5ovafbo2gkbdc55vjiq
Object-oriented composition untangled
2001
Proceedings of the 16th ACM SIGPLAN conference on Object oriented programming, systems, languages, and applications - OOPSLA '01
However, often non-standard composition semantics is needed, with a mixture of composition properties, which is not provided as such by any of the standard composition mechanisms. ...
Object-oriented languages come with pre-defined composition mechanisms, such as inheritance, object composition, or delegation, each characterized by a certain set of composition properties, which do not ...
Due to subtype polymorphism, an instance of a subtype of Out-putStream may be assigned to the stream instance variable. This subtype may contain methods that are not available in OutputStream. ...
doi:10.1145/504282.504303
dblp:conf/oopsla/OstermannM01
fatcat:qm6ztl25pnbqhjzcdxa6g72awi
Drugged Out: How Cognitive Bias Hurts Drug Innovation
2013
Social Science Research Network
Indeed, in writing this Article, this Author struggled with how to explain the schemas without reinforcing them. ...
Pushing Cost of Drugs Out of Reach, N.Y. ...
doi:10.2139/ssrn.2318820
fatcat:hxak63qe2ngypf3tvlsmlj45sa
Object-oriented composition untangled
2001
SIGPLAN notices
However, often non-standard composition semantics is needed, with a mixture of composition properties, which is not provided as such by any of the standard composition mechanisms. ...
Object-oriented languages come with pre-defined composition mechanisms, such as inheritance, object composition, or delegation, each characterized by a certain set of composition properties, which do not ...
Due to subtype polymorphism, an instance of a subtype of Out-putStream may be assigned to the stream instance variable. This subtype may contain methods that are not available in OutputStream. ...
doi:10.1145/504311.504303
fatcat:ncr5fddjqrcs3kc7ex7ol27q7a
Safe stream-based programming with refinement types
2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering - ASE 2018
This is particularly impactful when asynchronous stream-based code interacts with thread-limited features such as UI frameworks that restrict UI access to a single thread, since the threading behavior ...
In stream-based programming, data sources are abstracted as a stream of values that can be manipulated via callback functions. ...
On the other hand, the body of an effect-polymorphic method may only call other effect-polymorphic methods when they share the same receiver object, since arbitrary other effect-polymorphic methods may ...
doi:10.1145/3238147.3238174
dblp:conf/kbse/SteinCSC18
fatcat:t2npufdwlvgbzhnkhcjoncjdoy
Using inheritance to implement concurrency
1996
ACM SIGCSE Bulletin
The simulations use inheritance which was introduced into the new Ada 95 standard. They can also be used as examples of inheritance when teaching object-oriented programming. ...
With the adoption of the new standard ([Int95] ) in 1995, full support for object-oriented programming is now available. ...
with record I: Integer; end record; type EOS Stream is new Stream with null record;
In Ada 95, a monitor-like facility called protected objects was introduced to allow simple mutual exclusion to be ...
doi:10.1145/236462.236535
fatcat:eoafaund6ngzvfltsldwojsu6q
« Previous
Showing results 1 — 15 out of 6,601 results