By Rogério de Lemos, Cristina Gacek, Alexander Romanovsky

As software program platforms develop into ubiquitous, the problems of dependability develop into progressively more severe. provided that options to those matters has to be taken into consideration from the very starting of the layout method, it's acceptable that dependability is addressed on the architectural point. This book results from an attempt to collect the learn groups of software program architectures and dependability. encouraged via the ICSE 2003 Workshop on software program Architectures for responsible structures, the ebook makes a speciality of issues proper to bettering the cutting-edge in architecting accountable platforms. The 15 completely reviewed papers originate partially from the workshop; others have been solicited so one can in attaining entire assurance of all suitable elements. The papers are geared up into topical sections on architectures for dependability, fault-tolerance in software program architectures, dependability research in software program architectures, and commercial event.

Show description

Read Online or Download Architecting Dependable Systems II PDF

Best software design & engineering books

Concurrent Programming in ML

Concurrent Programming ML (CML), incorporated as a part of the SML of recent Jersey (SML/NJ) distribution, combines the simplest gains of concurrent programming and useful programming. This useful, "how-to" e-book specializes in using concurrency to enforce evidently concurrent functions. as well as an educational creation to programming in CML, the booklet provides 3 prolonged examples utilizing CML for functional platforms programming: a parallel software program construct method, an easy concurrent window supervisor, and an implementation of allotted tuple areas.

Deploying OpenLDAP

. .. i used to be excited to determine Deploying OpenLDAP, by way of Tom Jackiewicz and released through Apress, on Amazon's digital bookshelf. After reviewing the desk of Contents I speedy ordered the e-book. For the entire paintings and time invested in utilizing LDAP, now not sufficient time has been spent designing the structure and the good judgment of directories.

The Computer, the Writer and the Learner

Desktops are steadily infiltrating all levels of the writing strategy. more and more, academics, writers, scholars, software program builders, technical authors, and computing device scientists have to research extra in regards to the potent use of pcs for writing. This publication discusses how desktops may also help aid writing.

Additional info for Architecting Dependable Systems II

Sample text

In: 3rd Information Survivability Workshop, Software Engineering Institute (2000) 6. : Evolving and using coordinated systems. In: Proc. of the 5th Intl. Workshop on Principles of Software Evolution, ACM (2002) 43–46 7. : Consistency Preserving Dynamic Reconfiguration of Distributed Systems. PhD thesis, Imperial College London (1999) 8. Andrade: Software Design Using Java 2. Palgrave Macmillan (2002) 9. : Coordination languages and their significance. Communications of the ACM 35 (1992) 97–107 10.

The framework provides a way to separate business rules from services and to apply one or more rules to services depending on the exact service call. Moreover, the approach is applicable to systems with an interactive and a batch part (based on SQL procedures), both subject to the same rules. This avoids the traditional scenario of duplicated business rules scattered among many system services and entangled within their code, thus helping to prevent unintentional faults by developers during software maintenance.

The architectural framework we designed can be used both for interactive as well as batch application services. The difference lies in the fact that the batch application service has to get one representative data object for each rule, and only then can it create one processing service for each such data. The application service then asks each of the obtained configured services to generate the corresponding SQL code. Coordination contracts will also intercept these calls, in order to generate code that corresponds to the execution of the contract in the interactive case.

Download PDF sample

Rated 4.49 of 5 – based on 34 votes