共查询到20条相似文献,搜索用时 140 毫秒
1.
2.
3.
4.
异构数据库集成中间件的研究与实现 总被引:7,自引:0,他引:7
为了解决企业网络环境中异构数据库的数据集成和共享问题,重点研究了如何利用XML技术屏蔽数据库间的异构数据难题.提出了基于XML和中间件的集成异构数据库数据源的框架模型,该模型主要实现两部分的功能:数据库信息映射字典的生成和中间件系统查询的运行.中间件系统以XML作为数据交换的中介,提出了关系数据库数据与XML文档相互转换的方法,实现了用户对异构数据库数据的透明化共享.该模型适合企业信息化建设的需要. 相似文献
5.
6.
Internet为分布应用提供了一种开放、动态的运行环境,这要求分布应用的主要基础设施中间件能够支持运行时查看并调整平台内部状态和行为,由此产生了反射式中间件.目前的反射式中间件研究与实践存在3个不足:注重系统局部或单个实体的反射而缺乏全局视图;注重中间件平台内部功能的反射,而对上层应用的反射不够;集中于CORBA平台,而对J2EE平台的反射性研究较少.介绍了一个反射式的J2EE应用服务器PKUAS.基于构件化的平台内部体系结构,PKUAS引入软件体系结构作为全局视图以实现反射体系对系统整体的表示和控制,作为J2EE应用服务器,PKUAS可反射底层平台以及上层EJB构件.同时,以PKUAS实时监控工具为例,探讨了如何利用基于软件体系结构的反射体系管理整个系统,并给出了PKUAS与其他几种反射式中间件的比较.该工作有效地解决了现阶段反射式中间件研究的不足,提高了反射式中间件的实用性. 相似文献
7.
中间件是构件化软件的一种表现形式,中间件抽象了典型的应用模式.以一个移动增值平台为例,阐述构件化中间件系统的基本技术及在移动增值领域的应用.通过移动中间件在实际应用系统的具体设计与模块实现,设计一种基于数据库为中介的通用移动增值服务平台,并具体分析中间件满足快速开发和增强系统稳定性的优点,以及在增值领域开发还需要关注的问题.阐述了用移动中间件建立通用移动增值服务系统的必然性. 相似文献
8.
在企业的信息化发展过程中.形成的"信息孤岛"已成为现代企业信息共享的一个制约因素.论文对当前企业应用集成的需求、方法及存在的问题进行了分析和讨论,通过结合中间件技术和Web Services技术特点,探讨了一个基于中间件技术的企业应用集成框架.该集成框架以中间件系统为核心构建分布式应用平台,克服了传统应用集成方法的不足,有效地解决了企业内部的跨平台应用间的集成问题,并为企业发展电子商务提供支持. 相似文献
9.
本文首先介绍了中间件的基本概念,重点介绍了交易中间件BEA Tuxedo。结合笔者所参与的应用项目实例,对传统C/S模式下实现的系统与三层架构C/S模式下实现的系统进行了性能比较。简单介绍了利用Tuxedo的开发过程,实现了基于Tuxedo的一个数据综合服务平台,并对该平台的性能进行了评估,突出了中间件Tuxedo在系统开发中的重要作用。 相似文献
10.
11.
Context: The verification of the control flow of a Collaborative Business Process (CBP) is important when developing cross-organizational systems, since the control flow defines the behavior of the cross-organizational collaboration. Behavioral anti-patterns have been proposed to improve the performance of formal verification methods. However, a systematic approach for the discovery and specification of behavioral anti-patterns of CBPs has not been proposed so far.Objective: The aim of this work is an approach to systematically discover and specify the behavioral anti-patterns of block-structured CBP models.Method: The approach proposes using the metamodel of a CBP language to discover all possible combinations of constructs leading to a problem in the behavior of block-structured CBPs. Each combination is called minimal CBP. The set of all minimal CBPs with behavioral problems defines the unsoundness profile of a CBP language, from which is possible specifying the behavioral anti-patterns of such language.Results: The approach for specification of behavioral anti-patterns was applied to the UP-ColBPIP language. Twelve behavioral anti-patterns were defined, including support to complex control flow such as advanced synchronization, cancellation and exception management, and multiple instances. Anti-patterns were evaluated on a repository of block-structured CBP models and compared with a formal verification method. Results show that the verification based on anti-patterns is as accurate as the formal method, but it clearly improves the performance of the latter.Conclusion: By using the proposed approach, it is possible to systematically specify behavioral anti-patterns for block-structured CBP languages. During the discovery of anti-patterns different formalisms can be used. With this approach, the specification of anti-patterns provides the exact combination of elements that can cause a problem, making error correction and result interpretation easier. Although the proposed approach was defined for the context of CBPs, it could be applied to the context of intra-organizational processes. 相似文献
12.
13.
As a popular infrastructure for distributed systems running on the Internet, middleware has to support much more diverse and complex interactions for coping with the drastically increasing demand on information technology and the extremely open and dynamic nature of the Internet. These supporting mechanisms facilitate the development, deployment, and integration of distributed systems, as well as increase the occasions for distributed systems to interact in an undesired way. The undesired interactions may cause serious problems, such as quality violation, function loss, and even system crash. In this paper, the problem is studied from the perspective of the feature interaction problem (FIP) in telecom, and an online approach to the detection and solution on runtime systems is proposed. Based on a classification of middleware enabled interactions, the existence of FIP in middleware based systems is illustrated by four real cases and a conceptual comparison between middleware based systems and telecom systems. After that, runtime software architecture is employed to facilitate the online detection and solution of FIP. The approach is demonstrated on J2EE (Java 2 Platform Enterprise Edition) and applied to detect and resolve all of the four real cases. 相似文献
14.
15.
Opportunistic grid computing middleware has as a main concern the need to preserve the performance of the local applications running on machines that donate resources to the grid. This concern, together with the fact that it happens in an extremely dynamic environment, causes the adoption of a treatment based on thetextitbest‐effort principle for grid applications. This means that efficient application management schemes are usually not employed, which results in less than optimal performance as grid applications often need to be restarted due to (often temporary) resource claims by local user applications. This paper presents a method to improve the performance of grid applications, taking into account resource usage profiles for local applications, trying to identify when such resource claims are temporary and avoiding costly actions such as the migration of grid tasks. The approach is proposed as an extension to the InteGrade middleware and its evaluation shows promising results for the efficient management of grid applications. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
16.
17.
Ioannis Stamelos Author Vitae 《Journal of Systems and Software》2010,83(1):52-59
This paper explores the area of bad practices, namely anti-patterns, and their consequences in software project management (SPM). The paper surveys the multitude of anti-patterns that have been reported and documented up to now and stresses the need for tools to formally represent SPM anti-patterns, proposing specific formalisms for such purpose, namely Bayesian Belief Networks, Ontologies and Social Networks. It is also explained how the Web can provide an opportunity for capturing, storing, disseminating and ultimately avoiding SPM anti-patterns. As a consequence, anti-patterns may provide an excellent tool for educating active and future software managers. Finally, conclusions and future research trends are given. 相似文献
18.
This paper explores the use of design patterns and anti-patterns in teaching human–computer interaction principles. Patterns are increasingly popular and are seen as an efficient knowledge transfer mechanism in many fields, including software development in the field of software engineering, and more recently in the field of human–computer interaction. In software engineering a concerted effort is also being made to identify and document anti-patterns for recording the experiences of expert software developers to caution novices against potential bad practices. It is, however, essential that we ensure compatibility with the learner’s internal knowledge representation and acquisition processes, whether we are attempting to convey the knowledge in the form of a pattern or an anti-pattern. Since teaching with anti-patterns implies using negation, the primary aim of the research reported in this paper is to explore the efficacy of negative, rather than positive, teaching mechanisms. Evidence from theories of mental modelling and knowledge acquisition that highlight significant dangers in the use of anti-patterns to teach novices human–computer interaction principles is presented and supported with empirical findings. We started off by investigating the use of patterns (positive) in teaching, and then carried out experiments to test the use of anti-patterns (negative) in teaching HCI principles. This paper, whilst reporting mainly on our findings with respect to HCI design anti-patterns, will also identify some problems with the structure and use of patterns and anti-patterns in pedagogy. 相似文献
19.
Samia Allaoua Chelloug Mohamed A. El-Zawawy 《Intelligent Automation and Soft Computing》2018,24(2):309-318
The Internet of things (IoT) applications span many potential fields. Furthermore, smart homes, smart
cities, smart vehicular networks, and healthcare are very attractive and intelligent applications. In
most of these applications, the system consists of smart objects that are equipped by sensors and
Radio Frequency Identification (RFID) and may rely on other technological computing and paradigm
solutions such as M2M (machine to machine) computing, Wifi, Wimax, LTE, cloud computing, etc. Thus,
the IoT vision foresees that we can shift from traditional sensor networks to pervasive systems, which
deliver intelligent automation by running services on objects. Actually, a significant attention has been
given to designing a middleware that supports many features; heterogeneity, mobility, scalability,
multiplicity, and security. This papers reviews the-state-of-the-art techniques for IoT middleware
systems and reveals an interesting classification for these systems into service and agent-oriented
systems. Therefore two visions have emerged to provide the IoT middleware systems: Via designing
the middleware for IoT system as an eco-system of services or as an eco-system of agents. The most
common feature of the two approaches is the ability to overcome heterogeneity issues. However,
the agent approach provides context awareness and intelligent elements. The review presented in
this paper includes a detailed comparison between the IoT middleware approaches. The paper also
explores challenges that form directions for future research on IoT middleware systems. Some of the
challenges arise, because some crucial features are not provided (or at most partially provided) by the
existing middleware systems, while others have not been yet tackled by current research in IoT. 相似文献
20.
为了解决网络环境中的应用系统必须具备的能在异构平台上运行的能力,中间件(mid-dleware)就能做到这一点。讨论了基于中间件的分布式系统的开发过程以及主流技术的发展。给出了一个实例进行系统分析。 相似文献