Solved

Java program with two separate implementations each based on a different design pattern(s)

Posted on 2004-09-30
5
182 Views
Last Modified: 2010-03-31
Hey everyone,

This is not so much of a technical question, but rather I was looking from someone to point me in the right direction.  I'm thinking about ideas for a technical project (for school) and am interested in taking a Java program that has been implemented with different design pattern approaches and redesigining them with ApsectJ (Aspect Oriented Programming).  My goal would be to see if the AOP implementation would be easier to redesign with a different set of patterns after the initial implementation and compare that with the differences with the two java implementations.  I was hoping that someone here might know of a somewhat simple opensource Java application that has been designed with two separate implementations based on different patterns.  From there I could go with the AspectJ design and implementation.  Any additional input is welcome.

Chris
0
Comment
Question by:cgat
  • 2
5 Comments
 
LVL 21

Expert Comment

by:MogalManic
ID: 12198417
It is not simple, but how about the Sun's petstore application.  Just search in sourceforge and you will find some implementations.

Do you have any idea of what features you want in your application or do you just want to implement an algorithm?

Maybe something like this:http://www.edm2.com/0601/backpack.html (I just googled "backpack algorithm")
0
 

Author Comment

by:cgat
ID: 12205503
MogralManic,

Petstore is the type of thing I'm looking for, but you're right, it might be a bit big.  As for finding different implementations on sourcefourge my search came up dry?  I entered different variations of pet store, petstore, sun, java, ... and nothing.  I must be doing something wrong?

Chris
0
 
LVL 21

Accepted Solution

by:
MogalManic earned 125 total points
ID: 12211149
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
base64 decode encode 12 122
JList custom Cell Renderer refresh 15 53
GUI builder for Eclipse? 8 27
oracle 11g 23 50
Go is an acronym of golang, is a programming language developed Google in 2007. Go is a new language that is mostly in the C family, with significant input from Pascal/Modula/Oberon family. Hence Go arisen as low-level language with fast compilation…
Introduction This article is the last of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article covers our test design approach and then goes through a simple test case example, how …
Viewers learn about the “for” loop and how it works in Java. By comparing it to the while loop learned before, viewers can make the transition easily. You will learn about the formatting of the for loop as we write a program that prints even numbers…
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now