A framework for detecting interface violations in component-based software

Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is using, or a component implementation may fail to fulfil its obligations to the client. The paper proposes a systematic approach for detecting bo...

Full description

Saved in:
Bibliographic Details
Published inProceedings. Fifth International Conference on Software Reuse (Cat. No.98TB100203) pp. 46 - 55
Main Authors Edwards, S.H., Shakir, G., Sitaraman, M., Weide, B.W., Hollingsworth, J.
Format Conference Proceeding
LanguageEnglish
Published IEEE 1998
Subjects
Online AccessGet full text
ISBN9780818683770
0818683775
ISSN1085-9098
DOI10.1109/ICSR.1998.685729

Cover

Abstract Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is using, or a component implementation may fail to fulfil its obligations to the client. The paper proposes a systematic approach for detecting both kinds of violations, so that violation detection is not hard coded into base level components, but is "layered" on top of them, and so that it can be turned "on" or "off" selectively for one or more components, with practically no change to executable code (limiting changes to a few declarations). Among the salient features of this approach are its use of formal specifications, the ability to handle parameterized (i.e., generic, or template) components, and the automatic generation of routine aspects of violation detection. We have designed, built, and experimented with a generator of checking components for C++ templates.
AbstractList Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is using, or a component implementation may fail to fulfil its obligations to the client. The paper proposes a systematic approach for detecting both kinds of violations, so that violation detection is not hard coded into base level components, but is "layered" on top of them, and so that it can be turned "on" or "off" selectively for one or more components, with practically no change to executable code (limiting changes to a few declarations). Among the salient features of this approach are its use of formal specifications, the ability to handle parameterized (i.e., generic, or template) components, and the automatic generation of routine aspects of violation detection. We have designed, built, and experimented with a generator of checking components for C++ templates.
Author Shakir, G.
Hollingsworth, J.
Sitaraman, M.
Weide, B.W.
Edwards, S.H.
Author_xml – sequence: 1
  givenname: S.H.
  surname: Edwards
  fullname: Edwards, S.H.
  organization: Dept. of Comput. Sci. & Electr. Eng., West Virginia Univ., Morgantown, WV, USA
– sequence: 2
  givenname: G.
  surname: Shakir
  fullname: Shakir, G.
– sequence: 3
  givenname: M.
  surname: Sitaraman
  fullname: Sitaraman, M.
– sequence: 4
  givenname: B.W.
  surname: Weide
  fullname: Weide, B.W.
– sequence: 5
  givenname: J.
  surname: Hollingsworth
  fullname: Hollingsworth, J.
BookMark eNotj81KAzEYRQNWsK3di6u8wIzJZGbyZVkGfyoFwZ91ySRfJNpJShIsvr2FurpwFudwF2QWYkBCbjirOWfqbjO8vdZcKah76GSjLshKSWDAoQchJZuROWfQVYopuCKLnL8Ya1jLxZw8r6lLesJjTN_UxUQtFjTFh0_qQ8HktEH64-NeFx9DPkFq4nQ49UOpRp3R0hxdOeqE1-TS6X3G1f8uycfD_fvwVG1fHjfDelt5ztpSKWsdd90IaFCORjaAjbMcjHBK9M4qKbW1Flo1dtYYiW1jNfQja1qN6FAsye3Z6xFxd0h-0ul3d34u_gC5VlFL
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICSR.1998.685729
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 55
ExternalDocumentID 685729
GroupedDBID 29O
6IE
6IK
6IL
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
M43
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i104t-9ddf1f5b8ece7bc728e2fd18c3f936fd977addd849b5dcc7e42da86b024aeefe3
IEDL.DBID RIE
ISBN 9780818683770
0818683775
ISSN 1085-9098
IngestDate Tue Aug 26 17:13:08 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i104t-9ddf1f5b8ece7bc728e2fd18c3f936fd977addd849b5dcc7e42da86b024aeefe3
PageCount 10
ParticipantIDs ieee_primary_685729
PublicationCentury 1900
PublicationDate 19980000
PublicationDateYYYYMMDD 1998-01-01
PublicationDate_xml – year: 1998
  text: 19980000
PublicationDecade 1990
PublicationTitle Proceedings. Fifth International Conference on Software Reuse (Cat. No.98TB100203)
PublicationTitleAbbrev ICSR
PublicationYear 1998
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020413
ssj0000396804
Score 1.2773083
Snippet Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is...
SourceID ieee
SourceType Publisher
StartPage 46
SubjectTerms Contracts
Formal specifications
Title A framework for detecting interface violations in component-based software
URI https://ieeexplore.ieee.org/document/685729
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA62J0_VWvFNDl6zzSbZ3eQoxVJ7EFELvZVNMgERWqktgr_eyT4qigdvu4HdYYds5vXNN4RcgxOQcgjMgzBM-TQwo5Vi0ZsTEnhkXI9oi_t8MlPTeTZveLarXhgAqMBnkMTLqpbvV24bU2XDXGfoC3ZIB3dZ3aq1S6dwaXIdI4sm1uIq3WHrDTe6on6M1PCyKLKGeKe95235kpvh3ejpMXbw6aQW9mPoSmVzxr26mfu9oiqMUJPXZLuxifv8ReT4z885IIPv5j76sDNbh2QPln3Sa6c70OZnPyLTGxpa5BZF15Z6iAUHfIZGjol1KPFFsa5f5_xwkUZ8-mqJQlk0jp6-4xn_Ua5hQGbj2-fRhDWTF9gLhmcbZrwPacisBgeFdYXQIIJPtZPByDx4dBrxXPRaGZt55wpQwpc6t2jwS4AA8ph0lyjvhFCphRVKc597p5wVpbFB5l47DBRR-_aU9KNmFm81ucaiVsrZn6vnZL9uCYwZkAvS3ay3cIk-wcZeVbvhC583sgo
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA86D3qazonf5uA1XZukbXKU4djmHKIb7Daa5AVE2GTrEPzrTfoxUTx4awPto4807-v3fg-hW9AUohAsMUAl4SayRArOiffmKIPQM657tMU46U_5cBbPKp7tohcGAArwGQT-sqjlm6Xe-FRZJxGx8wV30Z4z-zwum7W2CZWQyUT42KKKtkIebdH1MpSiIH_05PAsTeOKeqe-D-sCZig7g-7Ls-_hE0Ep7sfYlcLq9JplO_e6ICv0YJO3YJOrQH_-onL85wcdovZ3ex9-2hquI7QDixZq1vMdcPW7H6PhHbY1dgs75xYb8CUH9wz2LBMrm7kX-cp-mfVzi9gj1JcLJ5R482jw2p3yH9kK2mjau590-6SavUBeXYCWE2mMjWysBGhIlU6pAGpNJDSzkiXWOLfRnYxGcKlio3UKnJpMJMqZ_AzAAjtBjYWTd4owE1RRLkKTGM21oplUliVGaBcqOu2rM9Tympm_l_Qa81Ip53-u3qD9_uRxNB8Nxg8X6KBsEPT5kEvUyFcbuHIeQq6ui53xBSOatVc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings.+Fifth+International+Conference+on+Software+Reuse+%28Cat.+No.98TB100203%29&rft.atitle=A+framework+for+detecting+interface+violations+in+component-based+software&rft.au=Edwards%2C+S.H.&rft.au=Shakir%2C+G.&rft.au=Sitaraman%2C+M.&rft.au=Weide%2C+B.W.&rft.date=1998-01-01&rft.pub=IEEE&rft.isbn=9780818683770&rft.issn=1085-9098&rft.spage=46&rft.epage=55&rft_id=info:doi/10.1109%2FICSR.1998.685729&rft.externalDocID=685729
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1085-9098&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1085-9098&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1085-9098&client=summon