Looking for What Isn’t Officially There
نویسندگان
چکیده
C ommercial relationships and business contracts, which formally express the rights and obligations binding a client and a supplier, provide the inspiration for design by contract software development methodology. Software contracts take the form of routine preconditions (obligations on the caller), postconditions (benefits to the caller), and class invariants (consistency constraints), written into the program itself. The design by contract methodology uses such contracts for building each software element. This approach is particularly appropriate for developing safety-critical software and for reusable libraries. The Ariane 5 accident makes a textbook case for the precision that design by contract offers in specifying reusable components. The methodology is a key design element of some existing libraries, especially the Eiffel software development environment, which incorporates contract mechanisms in the programming language itself. As long-time practitioners of design by contract techniques, we see their benefits clearly and are surprised that recent languages and libraries, including the official libraries for Java and .NET and the C++ Standard Template Library, have not adopted them. Because we see the contract metaphor as inherent to quality software development, we undertook the work reported here as a sanity check: Do we see contracts everywhere simply because our development environment makes using them natural? Or are they intrinsically present, even when other designers don’t express or even perceive them? To answer these questions, we examined noncontracted libraries for hidden contracts—that is, for language or documentation techniques that suggest contract mechanisms such as precondition and postcondition clauses. Our first target is the Collections classes of the .NET Framework Class Library, the most recent addition to the world’s collection of fundamental data structure and algorithm libraries.
منابع مشابه
The Study and Archaeological Analysis of Defensive- Military Fortifications of Islamic Period in Narmashir Plain of Kerman
Narmashir located in southeastern of Kerman is located in the ways connected center and west of Iranian plateau to the Southeast and coast of Oman. According to this, the evidences of settlements were formed and the fortifications related to them were built in this region. The purpose of this study is to explain the architectural characteristics of these monuments. There are questions that what...
متن کاملIs HRM evidence-based and does it matter?
In these respects, HR practitioners are probably no different. Of course what is done is based firmly on evidence, isn’t it? And, there’s plenty of firm evidence around, isn’t there? What about all that CIPD research, the countless books, Dave Ulrich’s stuff, all those journal articles, and, of course, all the research conducted here at IES? To even speculate about whether the work of HR is evi...
متن کاملArtificial Intelligence: What Works and What Doesn't?
research and development dollars for decades now, and people are beginning to ask hard questions: What really works? What are the limits? What doesn’t work as advertised? What isn’t likely to work? What isn’t affordable? This article holds a mirror up to the community, both to provide feedback and stimulate more selfassessment. The significant accomplishments and strengths of the field are high...
متن کاملChapter 14 Philosophical and Conceptual Analysis
Philosophers spend a lot of time attempting to give analyses of philosophically interesting notions. Analyses have been proposed for knowledge, moral rightness, specieshood, objecthood, persistence, change, reference, and much more. It is therefore surprising that there isn’t more consensus among philosophers regarding what they are attempting to do in providing purported analyses. Philosophers...
متن کاملInternational Relations and Cyber Attacks: Official and Unofficial Discourse
The potential for cyberwarfare is vast and is of concern to all nations, and national security defence. It appears that many countries are actively trying to protect their computer networks, whilst looking for ways that might bring down the networks of other countries, although this is not officially acknowledged. Bringing down another nations computer networks could give the attacking national...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003