{"id":"https://openalex.org/W2047378206","doi":"https://doi.org/10.1016/s1571-0661(04)80438-9","title":"Composition of Distributed Software with Algon \u2014 Concepts and Possibilities","display_name":"Composition of Distributed Software with Algon \u2014 Concepts and Possibilities","publication_year":2002,"publication_date":"2002-04-01","ids":{"openalex":"https://openalex.org/W2047378206","doi":"https://doi.org/10.1016/s1571-0661(04)80438-9","mag":"2047378206"},"language":"en","primary_location":{"id":"doi:10.1016/s1571-0661(04)80438-9","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80438-9","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/s1571-0661(04)80438-9","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103207582","display_name":"Judith Bishop","orcid":"https://orcid.org/0000-0002-2892-1632"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Judith Bishop","raw_affiliation_strings":["Department of Computer Science, University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035796880","display_name":"Karen Renaud","orcid":"https://orcid.org/0000-0002-7187-6531"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Karen Renaud","raw_affiliation_strings":["Department of Computing Science, University of Glasgow, Glasgow, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Glasgow, Glasgow, United Kingdom","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089227641","display_name":"Basil Worrall","orcid":null},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Basil Worrall","raw_affiliation_strings":["Department of Computer Science, University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035796880","https://openalex.org/A5089227641","https://openalex.org/A5103207582"],"corresponding_institution_ids":["https://openalex.org/I69552723","https://openalex.org/I7882870"],"apc_list":null,"apc_paid":null,"fwci":0.8994,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78234954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"65","issue":"4","first_page":"56","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8442177176475525},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.7804344892501831},{"id":"https://openalex.org/keywords/common-object-request-broker-architecture","display_name":"Common Object Request Broker Architecture","score":0.5888094902038574},{"id":"https://openalex.org/keywords/separation-of-concerns","display_name":"Separation of concerns","score":0.5827910900115967},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.5801081657409668},{"id":"https://openalex.org/keywords/mutual-exclusion","display_name":"Mutual exclusion","score":0.5795514583587646},{"id":"https://openalex.org/keywords/distributed-algorithm","display_name":"Distributed algorithm","score":0.5360446572303772},{"id":"https://openalex.org/keywords/deadlock","display_name":"Deadlock","score":0.5217772126197815},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5093313455581665},{"id":"https://openalex.org/keywords/distributed-design-patterns","display_name":"Distributed design patterns","score":0.44838687777519226},{"id":"https://openalex.org/keywords/distributed-computing-environment","display_name":"Distributed Computing Environment","score":0.4474027752876282},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3783729672431946},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21117684245109558}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8442177176475525},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.7804344892501831},{"id":"https://openalex.org/C49312422","wikidata":"https://www.wikidata.org/wiki/Q691593","display_name":"Common Object Request Broker Architecture","level":2,"score":0.5888094902038574},{"id":"https://openalex.org/C76214141","wikidata":"https://www.wikidata.org/wiki/Q2465506","display_name":"Separation of concerns","level":3,"score":0.5827910900115967},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.5801081657409668},{"id":"https://openalex.org/C56348326","wikidata":"https://www.wikidata.org/wiki/Q1047554","display_name":"Mutual exclusion","level":2,"score":0.5795514583587646},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.5360446572303772},{"id":"https://openalex.org/C159023740","wikidata":"https://www.wikidata.org/wiki/Q623276","display_name":"Deadlock","level":2,"score":0.5217772126197815},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5093313455581665},{"id":"https://openalex.org/C42112101","wikidata":"https://www.wikidata.org/wiki/Q5283146","display_name":"Distributed design patterns","level":3,"score":0.44838687777519226},{"id":"https://openalex.org/C3739613","wikidata":"https://www.wikidata.org/wiki/Q679003","display_name":"Distributed Computing Environment","level":2,"score":0.4474027752876282},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3783729672431946},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21117684245109558}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/s1571-0661(04)80438-9","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80438-9","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/s1571-0661(04)80438-9","is_oa":true,"landing_page_url":"https://doi.org/10.1016/s1571-0661(04)80438-9","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Notes in Theoretical Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W30912609","https://openalex.org/W122326208","https://openalex.org/W1484359890","https://openalex.org/W1497308906","https://openalex.org/W1573977097","https://openalex.org/W1610570299","https://openalex.org/W1649645444","https://openalex.org/W1992981673","https://openalex.org/W1997502136","https://openalex.org/W2074304133","https://openalex.org/W2118801004","https://openalex.org/W2124162097","https://openalex.org/W2136604606","https://openalex.org/W2144884804","https://openalex.org/W3000431003","https://openalex.org/W6668781933"],"related_works":["https://openalex.org/W2033977330","https://openalex.org/W2351710157","https://openalex.org/W2348430094","https://openalex.org/W2152401833","https://openalex.org/W2353525162","https://openalex.org/W4249114753","https://openalex.org/W2110336986","https://openalex.org/W1918001413","https://openalex.org/W4241229463","https://openalex.org/W2384245376"],"abstract_inverted_index":{"The":[0,22,106,157],"perceived":[1],"advantages":[2],"of":[3,18,24,34,43,50,68,113,159,183,197,209,216],"distributed":[4,25,83,87,134,172,218],"systems,":[5],"such":[6,20,148],"as":[7,149],"increased":[8,16],"reliability":[9],"and":[10,37,54,90,93,111,118,122,141,185,201],"availability,":[11],"are":[12,57,126,164],"offset":[13],"by":[14],"the":[15,31,35,41,80,114,132,142,171,178,198,207,213],"complexity":[17,74],"developing":[19],"applications.":[21],"developers":[23,163],"applications":[26],"have":[27],"to":[28,38,70,128,167],"both":[29],"understand":[30,168],"core":[32,214],"functionality":[33,215],"application,":[36],"cater":[39],"for":[40,206],"mechanisms":[42],"distribution.":[44],"Distribution":[45],"brings":[46],"with":[47,180,188],"it":[48],"issues":[49],"mutual":[51,88],"exclusion,":[52],"termination":[53],"deadlock":[55],"which":[56,85,125],"addressed":[58],"differently":[59],"in":[60,120],"a":[61,95,181,203,217],"centralised":[62],"system.":[63,105,219],"We":[64,77],"propose":[65],"using":[66],"separation":[67,208],"concerns.":[69],"control":[71],"any":[72,146],"additional":[73],"thus":[75],"introduced.":[76],"identify":[78],"specifically":[79],"well":[81],"known":[82],"algorithms":[84,173,187,211],"solve":[86],"exclusion":[89],"so":[91],"on,":[92],"provide":[94],"framework":[96,107],"whereby":[97],"they":[98],"can":[99,154],"be":[100,155],"injected":[101],"into":[102],"an":[103,195],"existing":[104],"is":[108,144,161],"called":[109],"Algon,":[110],"consists":[112],"algorithms,":[115],"various":[116],"wrappers":[117],"interfaces":[119],"Java,":[121],"sample":[123],"schedulers":[124],"needed":[127],"handle":[129],"communication":[130],"between":[131],"now":[133],"processes.":[135],"Algon":[136,160,176,199],"does":[137],"not":[138,165],"supply":[139],"middleware,":[140],"intention":[143],"that":[145,162],"middleware":[147],"RMI,":[150],"CORBA":[151],"or":[152,169],".NET":[153],"used.":[156],"novelty":[158],"expected":[166],"implement":[170],"themselves.":[174],"Moreover":[175],"provides":[177,202],"developer":[179],"choice":[182],"pre-coded":[184],"tested":[186],"different":[189],"performance":[190],"characteristics.":[191],"This":[192],"paper":[193],"gives":[194],"outline":[196],"approach,":[200],"pattern":[204],"specification":[205],"these":[210],"from":[212]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
