A framework for detecting interface violations in component-based software
Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is using, or a component implementation may fail to fulfil its obligations to the client. The paper proposes a systematic approach for detecting bo...
Saved in:
Published in | Proceedings. Fifth International Conference on Software Reuse (Cat. No.98TB100203) pp. 46 - 55 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
1998
|
Subjects | |
Online Access | Get full text |
ISBN | 9780818683770 0818683775 |
ISSN | 1085-9098 |
DOI | 10.1109/ICSR.1998.685729 |
Cover
Abstract | Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is using, or a component implementation may fail to fulfil its obligations to the client. The paper proposes a systematic approach for detecting both kinds of violations, so that violation detection is not hard coded into base level components, but is "layered" on top of them, and so that it can be turned "on" or "off" selectively for one or more components, with practically no change to executable code (limiting changes to a few declarations). Among the salient features of this approach are its use of formal specifications, the ability to handle parameterized (i.e., generic, or template) components, and the automatic generation of routine aspects of violation detection. We have designed, built, and experimented with a generator of checking components for C++ templates. |
---|---|
AbstractList | Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is using, or a component implementation may fail to fulfil its obligations to the client. The paper proposes a systematic approach for detecting both kinds of violations, so that violation detection is not hard coded into base level components, but is "layered" on top of them, and so that it can be turned "on" or "off" selectively for one or more components, with practically no change to executable code (limiting changes to a few declarations). Among the salient features of this approach are its use of formal specifications, the ability to handle parameterized (i.e., generic, or template) components, and the automatic generation of routine aspects of violation detection. We have designed, built, and experimented with a generator of checking components for C++ templates. |
Author | Shakir, G. Hollingsworth, J. Sitaraman, M. Weide, B.W. Edwards, S.H. |
Author_xml | – sequence: 1 givenname: S.H. surname: Edwards fullname: Edwards, S.H. organization: Dept. of Comput. Sci. & Electr. Eng., West Virginia Univ., Morgantown, WV, USA – sequence: 2 givenname: G. surname: Shakir fullname: Shakir, G. – sequence: 3 givenname: M. surname: Sitaraman fullname: Sitaraman, M. – sequence: 4 givenname: B.W. surname: Weide fullname: Weide, B.W. – sequence: 5 givenname: J. surname: Hollingsworth fullname: Hollingsworth, J. |
BookMark | eNotj81KAzEYRQNWsK3di6u8wIzJZGbyZVkGfyoFwZ91ySRfJNpJShIsvr2FurpwFudwF2QWYkBCbjirOWfqbjO8vdZcKah76GSjLshKSWDAoQchJZuROWfQVYopuCKLnL8Ya1jLxZw8r6lLesJjTN_UxUQtFjTFh0_qQ8HktEH64-NeFx9DPkFq4nQ49UOpRp3R0hxdOeqE1-TS6X3G1f8uycfD_fvwVG1fHjfDelt5ztpSKWsdd90IaFCORjaAjbMcjHBK9M4qKbW1Flo1dtYYiW1jNfQja1qN6FAsye3Z6xFxd0h-0ul3d34u_gC5VlFL |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICSR.1998.685729 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EndPage | 55 |
ExternalDocumentID | 685729 |
GroupedDBID | 29O 6IE 6IK 6IL AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI M43 OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i104t-9ddf1f5b8ece7bc728e2fd18c3f936fd977addd849b5dcc7e42da86b024aeefe3 |
IEDL.DBID | RIE |
ISBN | 9780818683770 0818683775 |
ISSN | 1085-9098 |
IngestDate | Tue Aug 26 17:13:08 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i104t-9ddf1f5b8ece7bc728e2fd18c3f936fd977addd849b5dcc7e42da86b024aeefe3 |
PageCount | 10 |
ParticipantIDs | ieee_primary_685729 |
PublicationCentury | 1900 |
PublicationDate | 19980000 |
PublicationDateYYYYMMDD | 1998-01-01 |
PublicationDate_xml | – year: 1998 text: 19980000 |
PublicationDecade | 1990 |
PublicationTitle | Proceedings. Fifth International Conference on Software Reuse (Cat. No.98TB100203) |
PublicationTitleAbbrev | ICSR |
PublicationYear | 1998 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020413 ssj0000396804 |
Score | 1.2773083 |
Snippet | Two kinds of interface contract violations can occur in component based software: a client component may fail to satisfy a requirement of a component it is... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 46 |
SubjectTerms | Contracts Formal specifications |
Title | A framework for detecting interface violations in component-based software |
URI | https://ieeexplore.ieee.org/document/685729 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA62J0_VWvFNDl6zzSbZ3eQoxVJ7EFELvZVNMgERWqktgr_eyT4qigdvu4HdYYds5vXNN4RcgxOQcgjMgzBM-TQwo5Vi0ZsTEnhkXI9oi_t8MlPTeTZveLarXhgAqMBnkMTLqpbvV24bU2XDXGfoC3ZIB3dZ3aq1S6dwaXIdI4sm1uIq3WHrDTe6on6M1PCyKLKGeKe95235kpvh3ejpMXbw6aQW9mPoSmVzxr26mfu9oiqMUJPXZLuxifv8ReT4z885IIPv5j76sDNbh2QPln3Sa6c70OZnPyLTGxpa5BZF15Z6iAUHfIZGjol1KPFFsa5f5_xwkUZ8-mqJQlk0jp6-4xn_Ua5hQGbj2-fRhDWTF9gLhmcbZrwPacisBgeFdYXQIIJPtZPByDx4dBrxXPRaGZt55wpQwpc6t2jwS4AA8ph0lyjvhFCphRVKc597p5wVpbFB5l47DBRR-_aU9KNmFm81ucaiVsrZn6vnZL9uCYwZkAvS3ay3cIk-wcZeVbvhC583sgo |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA86D3qazonf5uA1XZukbXKU4djmHKIb7Daa5AVE2GTrEPzrTfoxUTx4awPto4807-v3fg-hW9AUohAsMUAl4SayRArOiffmKIPQM657tMU46U_5cBbPKp7tohcGAArwGQT-sqjlm6Xe-FRZJxGx8wV30Z4z-zwum7W2CZWQyUT42KKKtkIebdH1MpSiIH_05PAsTeOKeqe-D-sCZig7g-7Ls-_hE0Ep7sfYlcLq9JplO_e6ICv0YJO3YJOrQH_-onL85wcdovZ3ex9-2hquI7QDixZq1vMdcPW7H6PhHbY1dgs75xYb8CUH9wz2LBMrm7kX-cp-mfVzi9gj1JcLJ5R482jw2p3yH9kK2mjau590-6SavUBeXYCWE2mMjWysBGhIlU6pAGpNJDSzkiXWOLfRnYxGcKlio3UKnJpMJMqZ_AzAAjtBjYWTd4owE1RRLkKTGM21oplUliVGaBcqOu2rM9Tympm_l_Qa81Ip53-u3qD9_uRxNB8Nxg8X6KBsEPT5kEvUyFcbuHIeQq6ui53xBSOatVc |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings.+Fifth+International+Conference+on+Software+Reuse+%28Cat.+No.98TB100203%29&rft.atitle=A+framework+for+detecting+interface+violations+in+component-based+software&rft.au=Edwards%2C+S.H.&rft.au=Shakir%2C+G.&rft.au=Sitaraman%2C+M.&rft.au=Weide%2C+B.W.&rft.date=1998-01-01&rft.pub=IEEE&rft.isbn=9780818683770&rft.issn=1085-9098&rft.spage=46&rft.epage=55&rft_id=info:doi/10.1109%2FICSR.1998.685729&rft.externalDocID=685729 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1085-9098&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1085-9098&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1085-9098&client=summon |