Decomposing CALL statements

Decomposing CALL statements

Copying

Code sharing

Parameterized computation

Objects with overloaded method names

Remote procedure calls to distributed modules

Constrained (black box) access to encapsulated data

progress

in

scale of

computing

Extract

Invoke

Estimate

Inspect

Set Up

Previous slide Next slide Back to the first slide View Graphic Version

Notes:

5