15.06.2013 Views

Dispensa in PDF - Dipartimento di Scienze Ambientali, Informatica e ...

Dispensa in PDF - Dipartimento di Scienze Ambientali, Informatica e ...

Dispensa in PDF - Dipartimento di Scienze Ambientali, Informatica e ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Carnielli Efrem: Programmazione a componenti<br />

Programmazione a componenti<br />

3.1.4.1 Chiamata <strong>di</strong> funzione come message pass<strong>in</strong>g ...................................60<br />

3.1.4.2 Passaggio dei parametri <strong>in</strong> Java...........................................................61<br />

3.1.5 Esempio: utilizzo efficiente ......................................................................63<br />

3.2 Buona Progettazione .........................................................................................63<br />

3.2.1 Riduzione del traffico <strong>di</strong> rete ...................................................................65<br />

3.2.1.1 Applicazioni s<strong>in</strong>gle-user e multi-user.................................................65<br />

3.2.1.2 Modalità <strong>di</strong> richiesta dei dati ...............................................................65<br />

3.2.1.3 Push style, pull style e poll<strong>in</strong>g .............................................................66<br />

3.2.1.4 Tecnica dello stream..............................................................................67<br />

3.2.2 Scalabilità....................................................................................................69<br />

3.2.3 Concorrente vs simultaneo.......................................................................71<br />

3.3 Gestione degli errori .........................................................................................71<br />

4 Unified Software Process (USP) ..............................................................................72<br />

4.1 Inception .............................................................................................................73<br />

4.1.1 Ban<strong>di</strong> <strong>di</strong> gara ..............................................................................................74<br />

4.2 Elaboration .........................................................................................................74<br />

4.2.1 Abbattimento dei rischi sui requisiti ......................................................75<br />

4.2.1.1 UML (unifier modell<strong>in</strong>g language).....................................................75<br />

4.2.1.2 Use Case Diagram .................................................................................76<br />

4.2.1.3 Activity <strong>di</strong>agrams ..................................................................................91<br />

4.2.1.4 Prototipi <strong>di</strong> <strong>in</strong>terfaccia ..........................................................................98<br />

4.2.2 Abbattimento dei Technological Risks .................................................105<br />

4.2.3 Abbattimento dei Political Risks ...........................................................106<br />

4.3 Construction.....................................................................................................107<br />

4.3.1 Release Pla<strong>in</strong>.............................................................................................108<br />

4.3.2 Refactor<strong>in</strong>g ...............................................................................................108<br />

4.3.3 Rispettare i contratti................................................................................109<br />

4.3.4 Class Diagram..........................................................................................111<br />

4.3.4.1 Classi e tabelle del database...............................................................115<br />

4.3.5 Confronto tra relazioni nel DB e nell’applicazione.............................117<br />

4.3.6 Sicurezza applicativa: ruoli – casi d’uso...............................................119<br />

4.3.7 Deployment <strong>di</strong>agram ..............................................................................120<br />

4.3.8 Sequence <strong>di</strong>agram ...................................................................................122<br />

4.4 Transition..........................................................................................................126<br />

5 Organizzazione delle risorse..................................................................................127<br />

5.1 Replicazione .....................................................................................................130<br />

5.2 Ripartizione......................................................................................................131<br />

5.3 Riorganizzazione.............................................................................................132<br />

5.4 Cach<strong>in</strong>g .............................................................................................................133<br />

6 Applicazioni Client-Server e database .................................................................135<br />

6.1 Trigger...............................................................................................................135<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!