Advertisement

SCiJP: Solving Computing Issues by Java Design Pattern

  • Hanu Gautam
  • Rahul Johari
  • Riya BhatiaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1059)

Abstract

The types, needs, advantages and disadvantages of Java Design Patterns have been explained, and Java Cryptography Architecture (JCA) case study has been discussed. The broad survey cross the spectrum of high-end programming language shows Java is the only programming language that offers concept and features which can be used extensively to design applications and software to harness the advantages of exascale computing.

Notes

Acknowledgements

We would like to express our sincere thanks and gratitude to our institution Guru Gobind Singh Indraprastha University for providing a great exposure to accomplish research-oriented tasks and achievements.

References

  1. 1.
    Alexander C (1977) A pattern language: towns, buildings, construction. Oxford University Press, New YorkGoogle Scholar
  2. 2.
    Nystrom N, Clarkson MR, Myers AC (2003) Polyglot: an extensible compiler framework for Java. In: Hedin G (eds) Compiler construction. Lecture notes in computer science, vol 2622. Springer, BerlinGoogle Scholar
  3. 3.
    Garcia A, Sant’Anna C, Figueiredo E., Kulesza U., Lucena C., von Staa A. (2006) Modularizing design patterns with aspects: a quantitative study. In: Rashid A, Aksit M (eds) Transactions on aspect-oriented software development I. Lecture notes in computer science, vol 3880. Springer, BerlinGoogle Scholar
  4. 4.
    Karaorman M, Hlzle U, Bruno J (1999) jContractor: a reflective Java library to support design by contract. In: Cointe P (eds) Meta-level architectures and reflection. Lecture notes in computer science, vol 1616. Springer, BerlinCrossRefGoogle Scholar
  5. 5.
    Antoy S, Hanus M (2002) Functional logic design patterns. In: Hu Z, Rodrguez-Artalejo M (eds) Functional and logic programming. FLOPS, Lecture notes in computer science, vol 2441. Springer, BerlinCrossRefGoogle Scholar
  6. 6.
    Tatsubori M, Chiba S, Killijian MO, Itano K (2000) OpenJava: a class-based macro system for Java. In: Cazzola W, Stroud RJ, Tisato F (eds) Reflection and software engineering. OORaSE, Lecture notes in computer science, vol 1826. Springer, BerlinCrossRefGoogle Scholar
  7. 7.
    Hannemann J, Kiczales G (2002) Design pattern implementation in Java and AspectJ. In: ACM Sigplan, vol 37, no 11. ACM, pp 161–173 (November)Google Scholar
  8. 8.
    Heuzeroth D, Holl T, Hogstrom G, Lowe W (2003) Automatic design pattern detection. In: 11th IEEE international workshop on program comprehension, 2003. IEEE, pp 94–103 (May)Google Scholar
  9. 9.
    Tsantalis N, Chatzigeorgiou A, Stephanides G, Halkidis ST (2006) Design pattern detection using similarity scoring. IEEE Trans Softw Eng 32(11):896–909CrossRefGoogle Scholar
  10. 10.
    Jeon SU, Lee JS, Bae DH (2002) An automated refactoring approach to design pattern-based program transformations in Java programs. In: Ninth Asia-Pacific Software Engineering Conference, 2002. IEEE, pp 337–345Google Scholar
  11. 11.
    Dong J, Lad DS, Zhao Y (2007) DP-miner: design pattern discovery using matrix. In: 14th annual IEEE international conference and workshops on the engineering of computer-based systems, 2007. ECBS’07. IEEE, pp 371–380 (March)Google Scholar
  12. 12.
    Shi N, Olsson RA (2006) Reverse engineering of design patterns from java source code. In: 21st IEEE/ACM international conference on automated software engineering, 2006. ASE’06. IEEE, pp 123–134 (September)Google Scholar
  13. 13.
    Antoniol G, Fiutem R, Cristoforetti L (1998) Design pattern recovery in object-oriented software. In: 6th international workshop on program comprehension, 1998. IWPC’98. Proceedings. IEEE, pp 153–160 (June)Google Scholar
  14. 14.
    Johari R, Gupta N (2011) Secure query processing in delay tolerant network using java cryptography architecture. In: 2011 international conference on computational intelligence and communication networks (CICN). IEEE, pp 653–657 (October)Google Scholar
  15. 15.
    Gamma E (1995) Design patterns: elements of reusable object-oriented software. Pearson Education IndiaGoogle Scholar
  16. 16.
    Gong L, Ellison G (2003) Inside Java (TM) 2 platform security: architecture, api design, and implementation. Pearson EducationGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.USICT, GGSIPUDelhiIndia

Personalised recommendations