期刊文献+

可重用Java数据库操作组件的设计和实现 被引量:4

Design and Implementation of Module for Database in Java
下载PDF
导出
摘要 基于Data AccessObject(DAO)设计模式,利用抽象、接口、类反射技术设计和实现了可重用Java数据库操作组件。它封装了注册和载入JDBC驱动程序、建立数据库连接、运行Structured Query Language(SQL)语句及处理查询结果集、查询结果集的分页显示操作,简化了Java DataBase Connectivity(JDBC)代码的编写,通过编写SQL语句,完成与数据库的交互。它设计的目标是简化中小型Java数据库应用的开发,提高开发的速度和测试的速度,降低数据库应用与数据来源的相关性,实现集中管理数据存取逻辑的功能。它与Struts框架有机结合,可进一步提高开发W eb应用的效率。为方便使用它,通过一个例子给予了详细描述。 The module for the database in Java through abstract is designed and Implemented, interface and reflection technique. It encloses the common operations such as registering and loading JDBC driver, building database connection, running SQL and dealing with result sets, paging the record. It simplifies the coding of JDBC and completes the operations of accessing database through writing SQL. It will simplify the development of the database application in Java, make the procedure of the development more easy, decrease the relativity between the database and the application and centralize the management of the data access. It can integrate with Struts model perfectly. This paper will demonstrate how to use this module through a simple example.
出处 《计算机应用研究》 CSCD 北大核心 2006年第2期160-162,166,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(90304014)
关键词 DAO设计模式 数据库 JDBC 连接 抽象 STRUTS 类反射 JAVABEANS DAO Design Pattern Database JDBC Connection Abstract Struts Reflection Tag JavaBeans
  • 相关文献

参考文献7

二级参考文献10

共引文献25

同被引文献29

  • 1肖爱华,汪诗林.J2EE通用数据访问对象(DAO)模式设计与实现[J].计算机应用与软件,2005,22(9):136-138. 被引量:9
  • 2王庆波,金漳,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2010. 被引量:40
  • 3刘鹏.云计算技术基础[M].北京:电子工业出版社,2011:15. 被引量:1
  • 4SHAMIR A. Identity-Based Cryptosystems and SignatureSchemes[EB/OL], http://xueshu.baidu.com/s?wd = paperuri%3A%28b3c4ef361fl35 8c0814a5f7e50d77dbl%29&filter = sc_long_sign&tn = SE_xueshusource_2kduw22v&sc_vurl=http%3 A%2F%2Flink. springer. com%2F 10.1007%2F3 -540-39568-7_5&ie=utf-8&sc_us=l3678124633247398632, 2016-3-15. 被引量:1
  • 5BONEHD, FRANKLIN M. Identity-based Encryption from the WeilPairing [J]. Siam Journal on Computing, 2003, 32⑶:213-229. 被引量:1
  • 6H OR WITZ J, LYNN B. Toward Hierarchical Identity-Based Encryption [EB/OL]. http://xueshu.baidu.com/sPwd= paperuri%3A%281fedd490f8eb480a63edb7b78clf2dbc%29&filter=sc_long_sign&tn = SE_xueshusource_2kduw22v&sc_vurl = http%3A%2F%2Fwww.springerlink.com%2Fcontent%2F8qa6q2vn0e5n6dyq&ie -utf-8&sc_us = 5573111262823163698,2016-3-15. 被引量:1
  • 7GENTRYC, SILERBERG A. Hierarchical ID-Based Cryptography [J].Lecture Notes in Computer Science, 2002, 82(4):548-566. 被引量:1
  • 8BONEHD, BOYEN X. Efficient Selectice-ID Secure Identitybased Ncryption without Random Oracles[J]. Journal of Cryptology,2004(4):223-238. 被引量:1
  • 9DAN B, BOYEN X,GOH E J. Hierarchical Identity-basedEncryption with Constant Size Ciphertext[C]//InternationalAssociation for Cryptologic Research. 24th Annual InternationalConference on Theory and Applications of CryptographicTechniques, May 22-26,2005, Computer Science Department ofUniversity of Aarhus, Aarhus, Denmark. Berlin: Springer, 2005:440-456. 被引量:1
  • 10GUPTA R. Above the Clouds: A View of Cloud ComputingJJ]. EecsDepartment University of California Berkeley, 2009,53 (4) : 50-58. 被引量:1

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部