No description, website, or topics provided.
HTML Java Other
Switch branches/tags
wentigrator-0.0.1 WebSecurity-0.0.68 WebSecurity-0.0.67 WebSecurity-0.0.66 WebSecurity-0.0.65 WebSecurity-0.0.64 WebSecurity-0.0.63 WebSecurity-0.0.62 WebSecurity-0.0.61 WebSecurity-0.0.60 WebSecurity-0.0.59 WebSecurity-0.0.58 WebSecurity-0.0.57 WebSecurity-0.0.56 WebSecurity-0.0.55 WebSecurity-0.0.54 WebSecurity-0.0.53 WebSecurity-0.0.52 WebSecurity-0.0.51 WebSecurity-0.0.50 WebSecurity-0.0.49 WebSecurity-0.0.48 WebSecurity-0.0.47 WebSecurity-0.0.46 WebSecurity-0.0.45 WebSecurity-0.0.44 WebSecurity-0.0.43 WebSecurity-0.0.42 WebSecurity-0.0.41 WebSecurity-0.0.40 WebSecurity-0.0.39 WebSecurity-0.0.38 WebSecurity-0.0.37 WebSecurity-0.0.36 WebSecurity-0.0.35 WebSecurity-0.0.34 WebSecurity-0.0.33 WebSecurity-0.0.32 WebSecurity-0.0.31 WebSecurity-0.0.30 WebSecurity-0.0.29 WebSecurity-0.0.28 WebSecurity-0.0.27 WebSecurity-0.0.26 WebSecurity-0.0.25 WebSecurity-0.0.24 WebSecurity-0.0.23 WebSecurity-0.0.22 WebSecurity-0.0.21 WebSecurity-0.0.20 WebSecurity-0.0.19 WebSecurity-0.0.18 WebSecurity-0.0.17 WebSecurity-0.0.16 WebSecurity-0.0.15 WebSecurity-0.0.14 WebSecurity-0.0.13 WebSecurity-0.0.12 WebSecurity-0.0.11 WebSecurity-0.0.10 WebSecurity-0.0.9 WebSecurity-0.0.8 WebSecurity-0.0.7 WebSecurity-0.0.6 WebSecurity-0.0.5 WebSecurity-0.0.4 WebSecurity-0.0.3 WebSecurity-0.0.2 WebSecurity-0.0.1 Northwind-0.0.12 Northwind-0.0.11 Northwind-0.0.10 Northwind-0.0.9 Northwind-0.0.8 Northwind-0.0.7 Northwind-0.0.6 Northwind-0.0.5 Northwind-0.0.4 Northwind-0.0.3 Northwind-0.0.2 Movies-0.0.4 Movies-0.0.3 Movies-0.0.2 Movies-0.0.1 JEntigrator-0.0.967 JEntigrator-0.0.966 JEntigrator-0.0.965 JEntigrator-0.0.964 JEntigrator-0.0.963 JEntigrator-0.0.962 JEntigrator-0.0.961 JEntigrator-0.0.960 JEntigrator-0.0.959 JEntigrator-0.0.958 JEntigrator-0.0.957 JEntigrator-0.0.956 JEntigrator-0.0.955 JEntigrator-0.0.954 JEntigrator-0.0.953 JEntigrator-0.0.952
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
.metadata
.recommenders
Community
Graph
JEntigrator
Movies
Northwind
WebSecurity
dabs
wentigrator
README.md
jentigrator.pdf
quickstart.pdf
whitepaper.pdf

README.md

1.The subject.

The subject of this project is a program aiming to reflect evolving objects from the real world in program objects. An evolving object can change its content, structure and behavior during the life cycle.

2.The concept.

The object specification comprises state and behavior. In the object-oriented paradigm the state is defined as a set of named attributes and the behavior as a set of methods. Objects change during their lifetimes. Non-evolving objects only change their content (the values of attributes), evolving objects can also change the number and type of attributes and object's methods. Content management is a standard task that can be accomplished by an end user, the application usually provides the convenient interface to do it. The structure and methods changes are much more complicated challenges. These changes are arose during the life span of the object and may be unknown in the design time. The evolution (migration) demands changes in the application code and the database schema that must be done under the responsibility application developers and database designers. The compositional data model lets delegate the evolution to the end user without any coding.

The compositional data model is based on the assumption that the real data object can be represented as a composition of more elementary components called facets. A facet is defined as a portion of data and associated with it behavior. For example, the phone facet includes the phone number (data) and the call (behavior). The most fundamental fact is that the set of facets is essentially smaller and stabler than the set of data objects. The second important fact is that the data object structure can be built or modified in the same fashion as the content – by assigning data to the object without changing of the application code. The application analyzes the content of the data object at the runtime and recognizes all applied facets. The data object can be considered as a facet container and the data object design means to add/remove facets to it. The application developer must provide the permanent part of the application: a pool of facets and the interface to manage universal data objects – facet data containers. The end user takes over the design and maintenance of data objects, again, without any coding.

The composition data model has the ability to absorb data objects of the special extension type. The extension contains the library file and descriptors of facets belonging to this extension. It is enough to import the extension data object in the database in order to add new facets in the facet pool. The application loads the extension library and makes new facets available to the end user. In this way the application can be adapted to the specific user area. The application code stay intact. Both end users and developers benefit from this architecture. An end user can evolve data objects without assistance of developers. A facet developer must provide only a facet code without intervention into the application code.

3.The implementation.

The production environment includes the application jar file and one or more databases. The database is actually the file directory containing data objects and indexes. The persistent form of a data object is an XML file. Each data object has unique identifier and label within the database. The end user interacts with the application via GUI. The main application window is built as a frame for contexts. A context is a panel displaying information and controls related to the current task. Each facet can have one or more contexts. A user navigates through the set of contexts to perform the certain task. The application supports multi-user access to a database located on the network drive. The entity will be marked as locked if another user already opened it. Saving changes will be possible only after releasing the entity by another user or the time delay expires.