skip to main content
10.1145/1101908.1101917acmconferencesArticle/Chapter ViewAbstractPublication PagesaseConference Proceedingsconference-collections
Article

A component model for internet-scale applications

Published: 07 November 2005 Publication History

Abstract

This paper describes a component model where the overall semantics of a component is included in the interface definition. Such a model is necessary for future computing where programs will run at Internet-scales and will employ a combination of web services, grid technologies, peer-to-peer sharing, autonomic capabilities, and open source implementations. The component model is based on packages and supports static and dynamic objects, interfaces, structures, and exceptions. The interface definitions provide a practical approach to defining functional semantics and include appropriate extensions to provide semantics for security, privacy, recovery, and costs. The component model has been implemented in a prototype framework and demonstrated in an Internet-scale example.

References

[1]
Sudhir Ahuja, Nicholas Carriero, and David Gelernter, "Linda and friends," IEEE Computer Vol. 19(8) pp. 26--34 (August 1986).
[2]
Mike Barnett and Wolfram Schulte, "Spying on components: a runtime verification technique," Workshop on Specification and Verification of Component-Based Systems, (October 2001).
[3]
Mike Barnett and Wolfram Schulte, "The ABCs of specification: AsmL, behavior, and components," Informatica Vol. 25(4)(November 2001).
[4]
Antonia Bertolino and Andrea Polini, "A framework for component deployment testing," Proc 25th ICSE, pp. 221--231 (May 2003).
[5]
Ana Cavalli, Bruno Defude, Christian Rinderknecht, and Fatiha Zaidi, "A service-component testing method and a suitable CORBA architecture," Proc 6th IEEE Symp. on Computers and Communications, (2001).
[6]
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, and Scott Shenker, "Making Gnutella-like P2P systems scalable," Proc. ACM SIGCOMM 2003, (Aug 2003).
[7]
World Wide Web Consortium, "The platform for privacy pref-erences (P3P) specification," http://www.w3c.org/TR/P3P (2002).
[8]
Scott Draves, "Electric Sheep," http://electricsheep.org, ().
[9]
Eric Freeman, Susanne Hupfer, and Ken Arnold, Javaspaces Principles, Patterns, and Practice, Addison-Wesley (1999).
[10]
Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides, Design Patterns, Addison-Wesley (1995).
[11]
A. Ganek and T. Corbi, "The dawning of the autonomic computing era," IBM Systems Journal Vol. 42(1) pp. 5--18 (2002).
[12]
L. Gong, "JXTA: a network programming environment," IEEE Internet Computing Vol. 5 pp. 88--95 (2001).
[13]
J. V. Guttag, J. J. Horning, and J. M. Wing, "The Larch family of specification languages," IEEE Software Vol. 2(5) pp. 24--36 (March 1985).
[14]
Min-Yen Kan, "Web page classification without the web page," Proc 13th WWW Conference, (2004).
[15]
International Business Machines, Inc., "The enterprise privacy authorization language (EPAL) specification," http://www.zurich.ibm.com/security/enterprise-pri-vacy/epal/Specification (2003).
[16]
Nenad Medvidovic, "On the role of middleware in architecture- based software development," SEKE '02, pp. 299--306 (July 2002).
[17]
Bertrand Meyer, Object-Oriented Software Construction, Prentice-Hall (1988).
[18]
Bertrand Meyer, "The grand challenge of trusted components," Proc. 25th ICSE, pp. 660--667 (May 2003).
[19]
Sun Microsystems, "The Jini Architechture Specification," http://www.sun.com/software/jini/specs/index.xml, (June 2003).
[20]
Johann Oberleitner, Thomas Gschwind, and Mehdi Jazayeri, "The Vienna component framework: enabling composition across component models," Proc. 25th ICSE, pp. 25--35 (May 2003).
[21]
Ran Rinat and Scott Smith, "Modular Internet programming with cells," Proc. ECOOP 2002, Springer-Verlag LCNS 2374, (2002).
[22]
Ashish Shah and Dennis Kafura, "Symphony: a Java-based composition and maniuplation framework for distributed legacy resources," Proc. International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 2--12 (May 1999).
[23]
Clemens Szyperski, "Component technology - what, where, and how?," Proc 25th ICSE, pp. 684--693 (May 2003).
[24]
J. B. Wordsworth, Software Development with Z, Addison-Wesley (1992).
[25]
P. Wyckoff, "T Spaces," IBM Systems Journal Vol. 37(3)(1998).

Cited By

View all
  • (2018)Seeking the user interfaceAutomated Software Engineering10.1007/s10515-017-0216-325:1(157-193)Online publication date: 1-Mar-2018
  • (2012)Automatic programming as code search: A research agenda2012 4th International Workshop on Search-Driven Development: Users, Infrastructure, Tools, and Evaluation (SUITE)10.1109/SUITE.2012.6225473(1-4)Online publication date: Jun-2012
  • (2011)What is my program doing? program dynamics in programmer's termsProceedings of the Second international conference on Runtime verification10.1007/978-3-642-29860-8_19(245-259)Online publication date: 27-Sep-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASE '05: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering
November 2005
482 pages
ISBN:1581139934
DOI:10.1145/1101908
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. component models
  2. interface semantics
  3. internet-scale applications

Qualifiers

  • Article

Conference

ASE05

Acceptance Rates

Overall Acceptance Rate 82 of 337 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Seeking the user interfaceAutomated Software Engineering10.1007/s10515-017-0216-325:1(157-193)Online publication date: 1-Mar-2018
  • (2012)Automatic programming as code search: A research agenda2012 4th International Workshop on Search-Driven Development: Users, Infrastructure, Tools, and Evaluation (SUITE)10.1109/SUITE.2012.6225473(1-4)Online publication date: Jun-2012
  • (2011)What is my program doing? program dynamics in programmer's termsProceedings of the Second international conference on Runtime verification10.1007/978-3-642-29860-8_19(245-259)Online publication date: 27-Sep-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media