Guarded methods vs. inheritance anomaly
- 1 February 1995
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGPLAN Notices
- Vol. 30 (2) , 49-58
- https://doi.org/10.1145/199873.199881
Abstract
The term Inheritance Anomaly has been introduced into Object-Oriented Concurrent Programming (OOCP). It has also been shown how different kinds of synchronization mechanisms fall into one of the three anomalies. Guarded Methods are shown to be an inadequate tool to solve either History-only Sensitive Anomaly or Modification of Acceptable States. This paper argues that any of the anomalies can be solved by Guarded Methods when a suitable semantics is found for it. The main contribution of the paper is the exposition that the concept of Guarded Methods, provided Guarded Methods are interpreted as Conditional Critical Regions, is an adequate language tool for expressing synchronization constraints in OOCP. Guarded Method based solutions are given for the above mentioned two cases of anomalies.Keywords
This publication has 9 references indexed in Scilit:
- Highly efficient and encapsulated re-use of synchronization code in concurrent object-oriented languagesPublished by Association for Computing Machinery (ACM) ,1993
- ActorsPublished by MIT Press ,1986
- Implementing remote procedure callsACM Transactions on Computer Systems, 1984
- Selected Writings on Computing: A personal PerspectivePublished by Springer Nature ,1982
- The design of EdisonSoftware: Practice and Experience, 1981
- Distributed processesCommunications of the ACM, 1978
- Viewing control structures as patterns of passing messagesArtificial Intelligence, 1977
- MonitorsCommunications of the ACM, 1974
- Structured multiprogrammingCommunications of the ACM, 1972