Specifying Component and Context Specification Using Promotion

نویسندگان

  • John Derrick
  • Eerke A. Boiten
چکیده

In this paper we discuss how the speciication of components may be separated from the description of the context in which they are used. There are a number of ways in which this might be possible and here we show how to use the technique of promotion in Object-Z to combine components which are speciied using process algebras. We discuss two approaches, the rst is to separate out the speciica-tion into two distinct viewpoints written in diierent languages. These viewpoints are then combined by a process of translation and uniica-tion. The second approach will be to use hybrid languages composed of a combination of CSP and Object-Z. We also consider how to reene such component based descriptions and consider issues of compositionality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recommendations for the Papers

When you start developing reusable components then you quickly will notice that specifying such components is different from specifying software for a given purpose for some dedicated customer. Stakeholders are no longer clearly identifiable. The context where a component will be used is still open at the time of specification. On the other hand, a component typically has a context of other com...

متن کامل

Specifying Contractual Use, Protocols and Quality Attributes for Software Components

We discuss the specification of signatures, protocols (behaviour) and quality of service within software component specification frameworks. In particular we focus on (a) contractually used components, (b) the specification of components with variable contracts and interfaces, and (c) of quality of service. Interface descriptions including these aspects allow powerful static interoperability ch...

متن کامل

Promotion of Local to Global Operation in Train Control System

Railway interlocking system is a safety critical system. Its failure can cause the loss of human life, severe injuries and loss of money. Therefore the complication of this type of system requires advanced methodologies, which provide complete security and quality of a system. One way of achieving this goal is by using formal methods, which are mathematically based languages, techniques and too...

متن کامل

ICA-based High Frequency VaR for Risk Management

Independent Component Analysis (ICA, see Comon, 1994 and Hyvärinen et al., 2001) is more appropriate when non-linearity and non-normality are at stake, as mentioned by Back and Weigend (1997) in a financial context. Using high-frequency data on the French Stock Market, we evaluate this technique when generating scenarii for accurate Value-atRisk computations, reducing by this mean the effective...

متن کامل

Specifying and Verifying Systems with Multiple Clocks

Multiple clock domains are a challenge for hardware specification and verification. We present a method for specifying the relations between multiple clocks, and for modeling the possible behaviors. We can then verify a hardware design assuming that the clocks meet these constraints. We implement our ideas in the context of SAT based Bounded Model Checking (BMC), using ANSI–C programs to specif...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999