Saturday 4 February 2023

Design Patterns

NameDescriptionIn Design PatternsIn Code Complete[14]Other
Abstract factoryProvide an interface for creating families of related or dependent objects without specifying their concrete classes.YesYesOK
BuilderSeparate the construction of a complex object from its representation, allowing the same construction process to create various representations.YesNoOK
Dependency InjectionA class accepts the objects it requires from an injector instead of creating the objects directly.NoNoOK
Factory methodDefine an interface for creating a single object, but let subclasses decide which class to instantiate. Factory Method lets a class defer instantiation to subclasses.YesYesOK
Lazy initializationTactic of delaying the creation of an object, the calculation of a value, or some other expensive process until the first time it is needed. This pattern appears in the GoF catalog as "virtual proxy", an implementation strategy for the Proxy pattern.NoNoPoEAA[15]
MultitonEnsure a class has only named instances, and provide a global point of access to them.NoNo
Object poolAvoid expensive acquisition and release of resources by recycling objects that are no longer in use. Can be considered a generalisation of connection pool and thread pool patterns.NoNo
PrototypeSpecify the kinds of objects to create using a prototypical instance, and create new objects from the 'skeleton' of an existing object, thus boosting performance and keeping memory footprints to a minimum.YesNoOK
Resource acquisition is initialization (RAII)Ensure that resources are properly released by tying them to the lifespan of suitable objects.NoNo
SingletonEnsure a class has only one instance, and provide a global point of access to it.YesYesOK
Adapter, Wrapper, or TranslatorConvert the interface of a class into another interface clients expect. An adapter lets classes work together that could not otherwise because of incompatible interfaces. The enterprise integration pattern equivalent is the translator.YesYes
BridgeDecouple an abstraction from its implementation allowing the two to vary independently.YesYes
CompositeCompose objects into tree structures to represent part-whole hierarchies. Composite lets clients treat individual objects and compositions of objects uniformly.YesYes
DecoratorAttach additional responsibilities to an object dynamically keeping the same interface. Decorators provide a flexible alternative to subclassing for extending functionality.YesYes
DelegationExtent a class by composition instead of subclassing. The object handles a request by delegating to a second object (the delegate)
Extension objectAdding functionality to a hierarchy without changing the hierarchy.NoNoAgile Software Development, Principles, Patterns, and Practices[16]
FacadeProvide a unified interface to a set of interfaces in a subsystem. Facade defines a higher-level interface that makes the subsystem easier to use.YesYes
FlyweightUse sharing to support large numbers of similar objects efficiently.YesNo
Front controllerThe pattern relates to the design of Web applications. It provides a centralized entry point for handling requests.NoNo

J2EE Patterns[17] PoEAA[18]

MarkerEmpty interface to associate metadata with a class.NoNoEffective Java[19]
ModuleGroup several related elements, such as classes, singletons, methods, globally used, into a single conceptual entity.NoNo
ProxyProvide a surrogate or placeholder for another object to control access to it.YesNo
Twin[20]Twin allows modeling of multiple inheritance in programming languages that do not support this feature.NoNo
BlackboardArtificial intelligence pattern for combining disparate sources of data (see blackboard system)NoNo
Chain of responsibilityAvoid coupling the sender of a request to its receiver by giving more than one object a chance to handle the request. Chain the receiving objects and pass the request along the chain until an object handles it.YesNoOK (DEV)
CommandEncapsulate a request as an object, thereby allowing for the parameterization of clients with different requests, and the queuing or logging of requests. It also allows for the support of undoable operations.YesNoOK
InterpreterGiven a language, define a representation for its grammar along with an interpreter that uses the representation to interpret sentences in the language.YesNo
IteratorProvide a way to access the elements of an aggregate object sequentially without exposing its underlying representation.YesYes
MediatorDefine an object that encapsulates how a set of objects interact. Mediator promotes loose coupling by keeping objects from referring to each other explicitly, and it allows their interaction to vary independently.YesNo
MementoWithout violating encapsulation, capture and externalize an object's internal state allowing the object to be restored to this state later.YesNo
Null objectAvoid null references by providing a default object.NoNo
Observer or Publish/subscribeDefine a one-to-many dependency between objects where a state change in one object results in all its dependents being notified and updated automatically.YesYes
ServantDefine common functionality for a group of classes. The servant pattern is also frequently called helper class or utility class implementation for a given set of classes. The helper classes generally have no objects hence they have all static methods that act upon different kinds of class objects.NoNo
SpecificationRecombinable business logic in a Boolean fashion.NoNo
StateAllow an object to alter its behavior when its internal state changes. The object will appear to change its class.YesNo
StrategyDefine a family of algorithms, encapsulate each one, and make them interchangeable. Strategy lets the algorithm vary independently from clients that use it.YesYes
Template methodDefine the skeleton of an algorithm in an operation, deferring some steps to subclasses. Template method lets subclasses redefine certain steps of an algorithm without changing the algorithm's structure.YesYes
VisitorRepresent an operation to be performed on instances of a set of classes. Visitor lets a new operation be defined without changing the classes of the elements on which it operates.YesNo
Fluent InterfaceDesign an API to be method chained so that it reads like a DSL. Each method call returns a context through which the next logical method call(s) are made available.NoNo
Active ObjectDecouples method execution from method invocation that reside in their own thread of control. The goal is to introduce concurrency, by using asynchronous method invocation and a scheduler for handling requests.Yes
BalkingOnly execute an action on an object when the object is in a particular state.No
Binding propertiesCombining multiple observers to force properties in different objects to be synchronized or coordinated in some way.[22]No
Compute kernelThe same calculation many times in parallel, differing by integer parameters used with non-branching pointer math into shared arrays, such as GPU-optimized Matrix multiplication or Convolutional neural network.No
Double-checked lockingReduce the overhead of acquiring a lock by first testing the locking criterion (the 'lock hint') in an unsafe manner; only if that succeeds does the actual locking logic proceed.

Can be unsafe when implemented in some language/hardware combinations. It can therefore sometimes be considered an anti-pattern.

Yes
Event-based asynchronousAddresses problems with the asynchronous pattern that occur in multithreaded programs.[23]No
Guarded suspensionManages operations that require both a lock to be acquired and a precondition to be satisfied before the operation can be executed.No
JoinJoin-pattern provides a way to write concurrent, parallel and distributed programs by message passing. Compared to the use of threads and locks, this is a high-level programming model.No
LockOne thread puts a "lock" on a resource, preventing other threads from accessing or modifying it.[24]NoPoEAA[15]
Messaging design pattern (MDP)Allows the interchange of information (i.e. messages) between components and applications.No
Monitor objectAn object whose methods are subject to mutual exclusion, thus preventing multiple objects from erroneously trying to use it at the same time.Yes
ReactorA reactor object provides an asynchronous interface to resources that must be handled synchronously.Yes
Read-write lockAllows concurrent read access to an object, but requires exclusive access for write operations. An underlying semaphore might be used for writing, and a Copy-on-write mechanism may or may not be used.No
SchedulerExplicitly control when threads may execute single-threaded code.No
Thread poolA number of threads are created to perform a number of tasks, which are usually organized in a queue. Typically, there are many more tasks than threads. Can be considered a special case of the object pool pattern.No
Thread-specific storageStatic or "global" memory local to a thread.Yes
Safe Concurrency with Exclusive OwnershipAvoiding the need for runtime concurrent mechanisms, because exclusive ownership can be proven. This is a notable capability of the Rust language, but compile-time checking isn't the only means, a programmer will often manually design such patterns into code - omitting the use of locking mechanism because the programmer assesses that a given variable is never going to be concurrently accessed.No
CPU atomic operationx86 and other CPU architectures support a range of atomic instructions that guarantee memory safety for modifying and accessing primitive values (integers). For example, two threads may both increment a counter safely. These capabilities can also be used to implement the mechanisms for other concurrency patterns as above. The C# language uses the Interlocked class for these capabilities.No
ChoreographyHave each component of the system participate in the decision-making process about the workflow of a business transaction, instead of relying on a central point of control.Yes                              
OK https://learn.microsoft.com/en-us/azure/ar            chitecture/patterns/choreography    






Strangler Fig Facade Incrementally migrate a legacy system by gradually replacing specific pieces of functionality with new applications and services. As features from the legacy system are replaced, the new system eventually replaces all of the old system's features, strangling the old system and allowing you to decommission it.Yes                              
OK https://learn.microsoft.com/en-us/azure/architecture/patterns/_images/strangler.png