Review the Program. See the Quality. Join Us at COOTS

Total Page:16

File Type:pdf, Size:1020Kb

Review the Program. See the Quality. Join Us at COOTS Review the Program. See the Important Dates to Remember: Quality. Join us at COOTS ’99. Hotel and Pre-Registration Discount Deadline: http://www.usenix.org/events/coots99/ Friday, April 9, 1999 Papers Presented at USENIX Program at-a-Glance Conferences are Refereed. The refereed papers were reviewed by the Sunday, May 2, 1999 Program Committee and selected for their quality from a large number of submissions. 6:00 pm – 9:00 pm On-Site Registration We thank the Program Committee for their 6:00 pm – 9:00 pm Welcome Reception hard work. Monday, May 3, 1999 Conference Organizers 7:30 am – 5:00 pm On-Site Registration 9:00 am – 5:00 pm Tutorial Program Program Chair Murthy Devarakonda, Tuesday, May 4, 1999 IBM T.J. Watson Research Center 7:30 am – 5:00 pm On-Site Registration Tutorial Program Chair 9:00 am – 5:00 pm Tutorial Program Douglas C. Schmidt, Washington University 6:00 pm – 10:00 pm Birds-of-a-Feather Sessions Program Committee Wednesday, May 5, 1999 Ken Arnold, Sun Microsystems, Inc. Jennifer Hamilton, Microsoft Corporation 7:30 am – 5:00 pm On-Site Registration Doug Lea, SUNY Oswego 9:00 am – 10:30 am Opening Remarks and Keynote Gary Leavens, Iowa State University 11:00 am – 5:00 pm Technical Sessions Scott Meyers, Software Development Consultant 6:00 pm – 8:00 pm Conference Reception Ira Pohl, UC Santa Cruz 8:00 pm – 10:00 pm Birds-of-a-Feather Sessions Rajendra Raj, Morgan Stanley & Company Doug Schmidt, Washington University Thursday, May 6, 1999 Steve Vinoski, IONA Technologies, Inc. Werner Vogels, Cornell University 9:00 am – 5:00 pm Technical Sessions Jim Waldo, Sun Microsystems, Inc. Friday, May 7, 1999 Yi-Min Wang, Microsoft Research Advanced Topics Workshop Chair 9:00 am – 5:00 pm Advanced Topics Workshop Joe Sventek, Hewlett-Packard Labs (by invitation only—see page 9) Table of Contents 4–8 Tutorials 13 Activities / Student 9 Advanced Topics Stipends Email: [email protected] Workshop 14 Hotel and Travel Phone: 1.949.588.8649 Fax: 1.949.588.9706 10 Keynote Address Information Updates: www.usenix.org/coots99/ 10–11 Technical Sessions 14 Registration 12 USENIX & SAGE Information ? Information 15 Registration Form 2 R EGISTER ON-LINE AT: http://www.usenix.org/events/coots99/ Dear Colleague: The ability to keep up with the latest trends is essen- ■ Modifying the object runtime environment tial for your professional vitality. For researchers and to meet evolving user needs; practitioners alike, the Conference on Object- ■ What to look for when objects meet database Oriented Technologies and Systems (COOTS) is a technology; proven and invaluable source for the latest paradigms ■ How to develop performance-critical in object-oriented technologies. I invite you to join distributed OO applications; the COOTS community, and together lead the changing world. ■ Realistic, thought-provoking treatment of At COOTS ’99, you will meet and network with design patterns, meta-object protocols, the leading developers and researchers in the object- interception techniques, and virtual machine oriented systems arena: performance issues; James Gosling of Sun Microsystems will give the ■ How to manage enterprise-scale large object- keynote address. Where else but at this intentionally oriented applications; small conference can you hear Gosling talk, standing ■ Java, Java, and more Java. within 60 feet of you? It is guaranteed to be a thought-provoking discussion of how Java has On May 3–4, an excellent set of tutorials is offered. changed the way we write programs today and what Attendees from previous years tell us that the “Object-oriented it can do for us in the future. COOTS tutorials are the best in the business. Led by well-known experts and educators, these tutorials will programming has Professor Barbara Liskov of MIT will offer another enlightening talk on the second day of the technical introduce or update you on topics such as: frame- become the main- program. An experienced researcher in the field of works, patterns, and components; efficient C++ pro- stay of program- programming languages and object databases, she gramming; Java Beans, distributed Java, and the ming, and if there will share with us issues in controlling information Jini™ platform; CORBA servers; COM and COM+; scalable ODBMS applications; and perfor- is one conference flow to protect the privacy of shared information. The COOTS technical program is the venue for mance issues in OO applications. that will give you learning about advanced R&D results from the lead- On May 7th, an Advanced Topics Workshop takes an edge in this ing universities and industrial labs. This year the place. Joe Sventek, Hewlett-Packard Labs, chairs this year’s workshop with the timely theme of “Validating area, I am sure it technical program is stronger than ever. The high quality of submissions allowed the program commit- the Composition and/or Execution of Component- is COOTS ‘99. The tee to select the very best papers representing the lat- Based Systems.” Attendance is limited and based on program commit- est advances and creative new directions in hot areas acceptance of a position paper. (Presenters within the tee has put such as Java, COM, and CORBA. The two days of regular conference may also attend.) See page 9 for more information. together an out- reports of research and experience cover a wide range of topics, including: Object-oriented programming has become the standing confer- mainstay of programming, and if there is one confer- ■ Using and enhancing Java in realistic settings; ence with ence that will give you an edge in this area, I am sure ■ Providing essential qualities of service in it is COOTS. I look forward to seeing you in San tutorials, invited distributed object-oriented systems; Diego during May 3–7, 1999. talks, refereed ■ Extending CORBA and COM to meet evolving papers, and an user needs; On behalf of the Program Committee, Advanced Topics ■ Managing enterprise-scale applications with Murthy Devarakonda Workshop. object-oriented techniques; ” IBM Thomas J. Watson Research Center ■ Murthy Devarakonda, Leveraging re-usable design knowledge to IBM Thomas J. Watson enhance programmer productivity; Research Center Program Chair FAX ... FOR MORE INFORMATION 3 Tutorial Program Monday and Tuesday, May ‒, Master the newest technology. Stay on top of utorials are intensive, informative, practical, Continuing Education Units (CEUs) the latest and essential to your professional develop- USENIX provides CEUs for a small administrative fee. technology. Tment. They are delivered by experts with Established by the International Association for Con- Register now hands-on experience. tinuing Education and Training, the CEU is a nation- for tutorials. Sign up for tutorials and you will get an immediate ally recognized standard unit of measure for payoff. You’ll gain command of the newest develop- continuing education and training, and is used by ments and put them to work at your site. USENIX thousands of organizations across the United States. tutorials aim to provide the critical information you Completion of one full day of the tutorial program Tutorial fees include: need. Delivered by experts with hands-on experi- qualifies for 0.6 CEUs. You can request CEU credit by • Admission to the ence, tutorials are practical, intensive, and essential checking the appropriate box on the registration tutorials you select form. USENIX provides a certificate and maintains • Lunch to your professional development. transcripts for each attendee who chooses CEU • Printed and bound Our guarantee: If you feel a tutorial does not meet tutorial materials credits. CEUs are not the same as college credits. the high standards you have come to expect from from your sessions Consult your employer or school to determine their USENIX, let us know by the first break and we will applicability. change you to any available tutorial immediately. Seating is limited, so register now to guarantee your first choice. Tutorial Overview Each tutorial runs from 9:00 AM to 12:30 PM or from 1:30 PM to 5:00 PM. Please select one morning and one afternoon tutorial each day. Sorry, no partial or split-day registrations are allowed. Lunch is included with your tutorial fees. Monday, May 3, 1999 Tuesday, May 4, 1999 Full Day Tutorial Session (9:00am–5:00pm): Morning Tutorial Sessions (9:00am–12:30pm): M1 Patterns at Work T1AM Programming for the Jini™ Platform Frank Buschmann, Siemens AG Ken Arnold, Sun Microsystems, Jini Team Morning Tutorial Sessions (9:00am–12:30pm): T2AM Patterns and Performance of Real-time Object Request Brokers M2AM Writing Efficient C++ Programs Douglas C. Schmidt, Washington University, St. Louis Stan Lippman, Consultant T3AM Distributed Java: Building Collaborative Applications M3AM Implementing CORBA Servers Using the Portable Object Ron I. Resnick, DiaLogos, Inc. Adapter Steve Vinoski, IONA Technologies Afternoon Tutorial Sessions (1:30pm–5:00pm): Afternoon Tutorial Sessions (1:30pm–5:00pm): T4PM Advanced Principles of Object-Oriented Design in UML Robert C. Martin, Object Mentor Inc. M4PM Introduction to Java Beans T5PM JavaBean Components: Specification, Design and Test Uwe Steinmueller, Siemens Microelectronics with Catalysis/UML M5PM The COM(+) Programming Model Desmond D’Souza, Platinum Technology Don Box, DevelopMentor T6PM Building Scalable ODBMS Applications Matt BenDaniel, Object Design, Inc. 4 U PDATES: http://www.usenix.org/events/coots99/ Tutorial Program Monday and Tuesday, May ‒, Monday, May 3, 1999 Morning Tutorial Sessions This tutorial first reviews the basics of (9:00 am – 12:30 pm): CORBA and shows where Object Adapters fit into the overall CORBA architecture. It then Full Day Tutorial Session M2AM Writing Efficient C++ explores details of the standard Portable Object (9:00 am – 5:00 pm): Programs Adapter (POA), including: ■ POA policies, which control POA M1 PATTERNS AT WORK Stan Lippman, Consultant features and behavior Frank Buschmann, Siemens AG Who should attend: Programmers either ■ Servant life cycle issues using, or about to use C++ for the delivery of ■ CORBA object life cycle issues Who should attend: People with solid production code in which efficiency is a ■ Servant management and activation knowledge of OO design and programming, concern.
Recommended publications
  • A Pairwise Abstraction for Round-Based Protocols
    A Pairwise Abstraction for Round-Based Protocols Lonnie Princehouse Nate Foster Ken Birman Department of Computer Science, Cornell University f lonnie, jnfoster, ken [email protected] Distributed systems are hard to program, for a number of make predictable use of the network. As such, they are reasons. Some of these reasons are inherent. System state “good neighbors” in massive multi-tenant data centers, such is scattered across multiple nodes, and is not random ac- as those that drive Amazon’s EC2. Many cloud computing cess. Bandwidth is an ever-present concern. Fault tolerance services have relaxed consistency requirements in favor of is much more complicated in a partial-failure model. This availability, and this also plays to the strengths of round- presents both a challenge and an opportunity for the pro- based protocols. gramming languages community: What should languages Our goal with CPG is to design abstractions for describ- for distributed systems look like? What are the shortcom- ing these protocols that make it easy to develop richer proto- ings of conventional languages for describing systems that cols via composition and code re-use. The fundamental unit extend beyond a single machine? seen by programmers in CPG is a pair of nodes. A protocol Prior work in this area has produced diverse solutions. in CPG is defined using a select function, which identifies The DryadLINQ [7] language expresses distributed compu- pairs of nodes to communicate in each round, and an up- tations using SQL-like queries. BLOOM [1] also follows a date function, which takes the states of the selected nodes data-centric approach, but assumes an unordered program- as input and produces their updated states after communica- ming model by default.
    [Show full text]
  • In This Day of 3D Graphics, What Lets a Game Like ADOM Not Only Survive
    Ross Hensley STS 145 Case Study 3-18-02 Ancient Domains of Mystery and Rougelike Games The epic quest begins in the city of Terinyo. A Quake 3 deathmatch might begin with a player materializing in a complex, graphically intense 3D environment, grabbing a few powerups and weapons, and fragging another player with a shotgun. Instantly blown up by a rocket launcher, he quickly respawns. Elapsed time: 30 seconds. By contrast, a player’s first foray into the ASCII-illustrated world of Ancient Domains of Mystery (ADOM) would last a bit longer—but probably not by very much. After a complex process of character creation, the intrepid adventurer hesitantly ventures into a dark cave—only to walk into a fireball trap, killing her. But a perished ADOM character, represented by an “@” symbol, does not fare as well as one in Quake: Once killed, past saved games are erased. Instead, she joins what is no doubt a rapidly growing graveyard of failed characters. In a day when most games feature high-quality 3D graphics, intricate storylines, or both, how do games like ADOM not only survive but thrive, supporting a large and active community of fans? How can a game design seemingly premised on frustrating players through continual failure prove so successful—and so addictive? 2 The Development of the Roguelike Sub-Genre ADOM is a recent—and especially popular—example of a sub-genre of Role Playing Games (RPGs). Games of this sort are typically called “Roguelike,” after the founding game of the sub-genre, Rogue. Inspired by text adventure games like Adventure, two students at UC Santa Cruz, Michael Toy and Glenn Whichman, decided to create a graphical dungeon-delving adventure, using ASCII characters to illustrate the dungeon environments.
    [Show full text]
  • Towards Rogue-Soar: Amulet of Yendor Using Its Levitation Capabilities.” Combining Soar, Curses and Micropather
    Gameplay The purpose of Rogue is “to descend into the Dungeons of Doom, defeat monsters, find treasure, and return to the surface with the Towards Rogue-Soar: amulet of Yendor using its levitation capabilities.” Combining Soar, Curses and Micropather Johnicholas Hines Advisor: Clare Bates Congdon May 17, 2010 Figure: The player (‘@’) is fighting a bat (‘B’). History Novelty I In the late 1970s, Ken Arnold designed a library (later named Rogue does not seem like a novel environment for Soar. curses[1]) to put characters at specific locations, enabling a I Discrete-Space crude form of interactive graphics. I Discrete-Time / Synchronous I Using this library, Michael Toy and Glen Wichman designed I Two-Dimensional Rogue[4]. I Single-Agent I In 1983, Rogue became popular when it was included in BSD Unix 4.2. Why should you be interested? I In 1984, Michael L. Mauldin, Guy Jacobson, Andrew Appel, and Leonard Hamey published “Rog-o-matic: A belligerent expert system”[3]. I In 1987, John Laird, Paul Rosenbloom, and Allen Newell published “Soar: An Architecture for General Intelligence”[2]. Is writing an Rog-o-matic-competitive agent easy now? Why you should be interested Rogue-Soar I/O I Rogue is a real human activity; people played it. ˆio I Rogue has been previously studied. ˆinput-link ˆspot I Because Rogue was written decades ago, it is now fast. ˆrow <0..23> I The generic I/O link could be reused for other curses-based ˆcolumn <0..79> roguelikes (ADoM, Angband, Crawl, Moria, NetHack). ˆcontents <char> I The generic I/O link could be reused for other curses-based ˆoutput-link applications (vi, emacs, lynx, w3m).
    [Show full text]
  • Cisc 7124X [*709.2X]
    Brooklyn College Department of Computer & Information Sciences CISC 7124 [*709.2X] Object-Oriented Programming 37½ hours plus conference and independent work; 3 credits Object-oriented programming concepts and techniques: data abstraction and encapsulation, classes, inheritance, overloading, polymorphism, interfaces. Introduction to and use of one or more object-oriented languages such as C++ or Smalltalk. An introduction to object-oriented design. Syllabus Procedural programming in Java Introduction to object-oriented design and programming View classes as abstract data types o Int class o Rectangle class o Stack class o Queue class Object-oriented programming in Java (Classes, Methods, Messages, and Instances) o Built-in classes . Boolean, Character, Byte, Short, Integer, Long, Float, Double, String & StringBuffer, Vector, Hashtable Interfaces and Packages Collections Inheritance Midterm exam (BinaryTree.java | SumLines.java) I/O o Echo.java o CopyTextFile.java Graphics programming with AWT (Components & Graphic & Layout managers) o TestDrawString.java o TestImage.java Event handling o TestEvent.java o TestCardLayout.java o TestImageCards.java Applets Advanced topics o Network programming with sockets o Multithreaded programming and animation . DigitClock.java . Greeting1.java . AnimatedImage.java . PingPong.java . ProducerConsumer.java . Clocks.java o JDBC and MySql o Servlet programming Textbook : The Java Tutorial: A Short Course on the Basics, 4th Edition Bibliography: Big Java: Programming and Practice, by Cay S. Horstmann, Wiley, 2002. A Programmer's Guide to Java (tm) Certification -- Khalid Azim Mughal, Rolf Rasmussen, 2000. Core Java 2, Volume I -- Fundamentals, by Cay S. Horstmann and Gary Cornell, Prentice Hall, 1999. Introduction to Programming Using Java : An Object-Oriented Approach, by David M. Arnow, Gerald Weiss, Addison-Wesley, 1998.
    [Show full text]
  • The Jini/Sup TM/ Architecture: Dynamic Services in a Flexibie Network
    9.3 The JiniTMArchitecture: Dynamic Services in a Flexible Network Ken Arnold Sun Microsystems, Inc. 1 Network Drive Burlington, MA 01 804 +01-781-442-0720 [email protected] 1. ABSTRACT capable printer, the proxy object that implements the This paper gives an overview of the JiniTM Printer interface will convert the text to PostScript and architecture, which provides a federated infra- send it to the printer. A different printing service whose printer uses PCL as a printing language will have a a proxy structure for dynamic services in a network. object that converts the text to PCL commands. Services may be large or small. The universal platform provided by the virtual machine also 1.1 Keywords means that code can be downloaded to the client if necessary. Jini, Java, networks, distribution, distributed computing This means that the client can use services whose implementations were previously unknown. If a client using 2. INTRODUCTION the PostScript capable print service has never used it before, The JiniTM architecture provides an infrastructure for the conversion code can be automatically downloaded on defining, advertising, and finding services in a network. demand by the virtual machine. Clients can talk to services Services are defined by one or more JavaTM language that they have never seen before (and may never see again) interfaces or classes. These types define a contract with the without any human intervention, such as installing drivers on clients of the service. all the systems that will use a new printing service. For example, if a service supports a printer interface it A discovery protocol lets clients and services find available supports a Printer service.
    [Show full text]
  • The Javascript Programming Language
    The JavaScript Programming Language The JavaScript Programming Language - 95 pages - Jones & Bartlett Publishers, 2009 - 2009 - 1449662676, 9781449662677 - Ray Toal, John David Dionisio The JavaScript Programming Language provides a brief introduction to the JavaScript language that is now an important component of every programmers tool box. It offers an overview of JavaScript to students interested in pursuing advanced programming skills. Clear and Concise, The JavaScript Programming Language is an excellent primer to this popular dynamic language and is ideal for use on its own or when coupled with one of Jones and Bartlett's outstanding introductory computer science texts. DOWNLOAD PDF FILE http://resourceid.org/2gcPGlG.pdf Programming with JavaScript: Algorithms and Applications for Desktop and Mobile Browsers - John David Dionisio, Ray Toal - Computers - Designed specifically for the CS-1 Introductory Programming Course, "Programming with JavaScript: Algorithms and Applications for Desktop and Mobile Browsers" introduces - 694 pages - ISBN:9780763780609 - Dec 19, 2011 DOWNLOAD PDF FILE http://resourceid.org/2gcUGGJ.pdf Web Development with JavaScript and Ajax Illuminated - Oct 22, 2010 - ISBN:9781449613242 - Computers - 497 pages - Web Development with JavaScript and AJAX teaches your students the cutting-edge techniques for web development for Web 2.0 and 3.0. Ideal for the undergraduate student delving - Richard Allen, Kai Qian, Southern Polytechnic State University Kai Qian, Lixin Tao, Xiang Fu DOWNLOAD PDF FILE http://resourceid.org/2gcPFOx.pdf JavaScript Pocket Reference - Computers - ISBN:9781449335991 - David Flanagan - JavaScript is the ubiquitous programming language of the Web, and for more than 15 years, JavaScript: The Definitive Guide has been the bible of JavaScript programmers around - 280 pages - Apr 9, 2012 - Activate Your Web Pages DOWNLOAD PDF FILE http://resourceid.org/2gcPEdr.pdf It is usable as either a programming language (that is compiled to JavaScript) or as a JavaScript library, and is designed for both uses.
    [Show full text]
  • Extreme Java G22.3033-007
    Extreme Java G22.3033-007 Session 8 - Sub-Topic 2 OMA Trading Services Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Trading Services for Distributed Enterprise Communications Dr. Jean-Claude Franchitti Page 1 Presentation Agenda • Enterprise Systems Technology Classifications • Naming, Directory, and Trading Services in a Nutshell • CORBA as a Trading Service • Microsoft Active Directory Services • Jini as a Trading Service – Jini Component Architecture – Jini Programming Model – Jini Infrastructure – Jini Class Architecture and Development Process – Jini Service Example – From the Logical Infrastructure to a Physical Solution – Physical Solution Implementation Steps • Conclusions 2 Enterprise Systems Technology Classifications Q User Interfacing Q AWT, Swing, JMF, JavaBeans Q Distributed Communications Enabling Q TCP/IP, HTTP, CORBA, RMI/IIOP, COM+ Q Services for Distributed Communications Q JNDI, CORBA Trading, JINI, Activation, JMS, JavaMail, JTA, JTS, etc. Q Systems Assurance Q Security, Reliability, Availability, Maintainability, Safety Q Data Enabling Q JDBC, RDBMs, ODBMSs Q Web Enabling Q HTML, XML, Applets, Servlets, JSPs Q Applications Enabling Q EJB, EAI 3 Page 2 Services for Distributed Communications Q Naming Q DNS, JNDI Q Directory Q NIS, NDS, LDAP, Microsoft Active Directory Q Trading Q CORBA Trading Service, JINI Q Activation Q CORBA LifeCycle Service, Java Activation Framework Q Messaging Q JMS, JavaMail, CORBA Event Service, CORBA Messaging Service,
    [Show full text]
  • Irrevocability in Games
    IRREVOCABILITY IN GAMES Interactive Qualifying Project Report completed in partial fulfillment of the Bachelor of Science degree at Worcester Polytechnic Institute, Worcester, MA Submitted to: Professor Brian Moriarty Daniel White Michael Grossfeld 1 Abstract This report examines the history and future application of irrevocability in video games. Decision making is an essential part of playing video games and irrevocability negates replayability by disallowing alternate decisions. We found that successful games with this theme exhibit irreversibility in both story and game mechanics. Future games looking to use irrevocability well must create an ownership that the player feels towards the experience by balancing these two mechanics. 2 Table of Contents IRREVOCABILITY IN GAMES .............................................................................................................. 1 Abstract .................................................................................................................................................... 2 Table of Contents ................................................................................................................................... 3 Part One: Concept of Irrevocability ................................................................................................ 4 Introduction .......................................................................................................................................................... 4 Part Two: Chronology of Irrevocability ........................................................................................
    [Show full text]
  • A Framework for Run-Time Correctness Assurance of Real- Time Systems
    University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science January 1998 MaC: A Framework for Run-Time Correctness Assurance of Real- Time Systems Moonjoo Kim University of Pennsylvania Mahesh Viswanathan University of Pennsylvania Hanene Ben-Abdallah University of Pennsylvania Sampath Kannan University of Pennsylvania, [email protected] Insup Lee University of Pennsylvania, [email protected] See next page for additional authors Follow this and additional works at: https://repository.upenn.edu/cis_reports Recommended Citation Moonjoo Kim, Mahesh Viswanathan, Hanene Ben-Abdallah, Sampath Kannan, Insup Lee, and Oleg Sokolsky, "MaC: A Framework for Run-Time Correctness Assurance of Real-Time Systems", . January 1998. University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-98-37. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_reports/77 For more information, please contact [email protected]. MaC: A Framework for Run-Time Correctness Assurance of Real-Time Systems Abstract We describe the Monitoring and Checking (MaC) framework which provides assurance on the correctness of program execution at run-time. Our approach complements the two traditional approaches for ensuring that a system is correct, namely static analysis and testing. Unlike these approaches, which try to ensure that all possible executions of the system are correct, our approach concentrates on the correctness of the current execution of the system. The MaC architecture consists of three components: a filter, an event recognizer, and a run-time checker. The filter extracts low-level information, e.g,, values of program variables and function calls, from the system code, and sends it to the event recognizer.
    [Show full text]
  • Rogue-Like Warum Rogue-Like?
    Rogue-like Warum Rogue-like? Michael Toy, Ken Arnold and Glenn Wichman at U.C. Santa Cruz Ascii Grafik • http://www.lcurtisboyle.com/nitros9/rogue-80.gif D&D Regeln • Basiert meist auf Dungeons and Dragons • Es wird aber sehr viel experimentiert Prozeduraler Levelaufbau Perma Death Turnbased Dungeon Crawler Sehr hoher Schwierigkeitsgrad Unintuitive Steuerung • Viele Profi-Funktionen • Oft kann man Scripte schreiben, um vieles zu automatisieren Voraussetzungen Adventure 1975 • Fantasy Setting • in einem Höhlensystem • rein textbasiert Steuerung • HJKLY(Z)UBN VI Tasten Curses Library • Entwickelt von Ken Arnold • Bibliothek zum Positionieren des Cursors und setzen von Ascii-Zeichen beliebig auf dem Bildschirm • aus Curses wurde PDCurses • und daraus NCurses (n steht für New) • Software ist zwischen allen Versionen leicht portierbar BSD Unix • Santa Cruz, California, Michael Toy & Glenn Wichman • Michael reist nach U.C. Berkeley • Entwickelt dort mit Ken Arnold das Spiel weiter • Dort wurde auch BSD Unix entwickelt, die Grundlage für Mac OS X • Das Spiel wurde Teil von BSD • Damit wurde es auf allen Unirechnern der ganzen Welt verbreitet Unterscheidung von Rogue-likes • *band • Hack-likes *band • Set Your Own Pace: There isn't a hunger clock forcing you forward (or there is a shop to restock at). • No Level Memory: Levels are not preserved when you go up and down, so you can keep getting new monsters at any given difficulty level. • Lots of Items: There are a lot of items, ranging from broken sticks to super amazing swords. Equipment upgrade paths are long, rather than being very short. • Steep Power Curve: The PC is god-like powerful by the end of the game.
    [Show full text]
  • COOTS ‘99) Sponsored by the USENIX Association Conference Web Site
    Call for Papers 5th Conference on Object-Oriented Technologies and Systems (COOTS ‘99) Sponsored by The USENIX Association Conference Web site:http://www.usenix.org/events/coots99 May 3-7, 1999 San Diego, California, USA Important Due Dates In addition to experience-centered papers, COOTS '99 Paper submissions: Nov. 6, 1998 accepts papers on a wide range of topics, including but Tutorial submissions: Nov. 6, 1998 not limited to: Notification to authors: Dec. 16, 1998 Distributed Objects Camera-ready papers: March 23, 1999 Object-oriented systems performance Security for Distributed Objects Conference Organizers Object services Program Chair Mobile objects Murthy Devarakonda, IBM T.J. Watson Research Center Object-oriented design technigues Program Committee Component based operating systems Ken Arnold, Sun Microsystems, Inc. Standard Template Library Rachid Guerraoui, Swiss Federal Institute of Technology Advanced C++ topics/examples Jennifer Hamilton, Microsoft Corporation Java and Web programming languages Doug Lea, SUNY Oswego Container technologies (e.g. Java Beans) Gary Leavens, Iowa State University Design patterns Scott Meyers, Software Development Consultant Visual J++ and other development tools Ira Pohl, UC Santa Cruz Fault tolerance Rajendra Raj, Morgan Stanley & Company New OO programming languages Doug Schmidt, Washington University Object-Oriented database systems Joe Sventek, Hewlett-Packard Labs Building distributed applications Steve Vinoski, IONA Technologies, Inc. Persistent Object Issues Werner Vogels, Cornell University
    [Show full text]
  • A Guide to the Mazes of Menace: Guidebook for Nethack
    A Guide to the Mazes of Menace: Guidebook for NetHack Eric S. Raymond (Extensively edited and expanded for 3.4) February 12, 2003 1 Introduction Recently, you have begun to find yourself unfulfilled and distant in your daily occupation. Strange dreams of prospecting, stealing, crusading, and combat have haunted you in your sleep for many months, but you aren’t sure of the reason. You wonder whether you have in fact been having those dreams all your life, and somehow managed to forget about them until now. Some nights you awaken suddenly and cry out, terrified at the vivid recollection of the strange and powerful creatures that seem to be lurking behind every corner of the dungeon in your dream. Could these details haunting your dreams be real? As each night passes, you feel the desire to enter the mysterious caverns near the ruins grow stronger. Each morning, however, you quickly put the idea out of your head as you recall the tales of those who entered the caverns before you and did not return. Eventually you can resist the yearning to seek out the fantastic place in your dreams no longer. After all, when other adventurers came back this way after spending time in the caverns, they usually seemed better off than when they passed through the first time. And who was to say that all of those who did not return had not just kept going? Asking around, you hear about a bauble, called the Amulet of Yendor by some, which, if you can find it, will bring you great wealth.
    [Show full text]