Why inheritance anomaly is not worth solving
Abstract
References
Index Terms
- Why inheritance anomaly is not worth solving
Recommendations
The inheritance anomaly: ten years after
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingThe term inheritance anomaly was coined in 1993 by Matsuoka and Yonezawa [15] to refer to the problems arising by the coexistence of inheritance and concurrency in concurrent object oriented languages (COOLs). The quirks arising by such combination have ...
Synchronisation, concurrent object-oriented programming and the inheritance anomaly
There have been a number of models proposed for integrating concurrency and object-oriented programming. Unfortunately, there have been few criteria proposed for evaluating them. In focusing on issues of inheritance, designers of new concurrent object-...
Behaviour Equation as Solution of Inheritance Anomaly in Concurrent Object-Oriented Programming Languages
PDP '96: Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96)Abstract: In this paper, we propose a new model called Behaviour Description Equation which solves the problem of inheritance anomaly found in concurrent object-oriented programming languages and provides a means for the reuse of synchronisation code. ...
Comments
Information & Contributors
Information
Published In
Sponsors
- Uppsala University, Department of Information Science: Uppsala University, Department of Information Science
- AITO: Assoc Internationale por les Technologies Objects
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- Uppsala University, Department of Information Science
- AITO
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 125Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in