Specifying Component and Context Specification Using Promotion
نویسندگان
چکیده
In this paper we discuss how the speciication of components may be separated from the description of the context in which they are used. There are a number of ways in which this might be possible and here we show how to use the technique of promotion in Object-Z to combine components which are speciied using process algebras. We discuss two approaches, the rst is to separate out the speciica-tion into two distinct viewpoints written in diierent languages. These viewpoints are then combined by a process of translation and uniica-tion. The second approach will be to use hybrid languages composed of a combination of CSP and Object-Z. We also consider how to reene such component based descriptions and consider issues of compositionality.
منابع مشابه
Recommendations for the Papers
When you start developing reusable components then you quickly will notice that specifying such components is different from specifying software for a given purpose for some dedicated customer. Stakeholders are no longer clearly identifiable. The context where a component will be used is still open at the time of specification. On the other hand, a component typically has a context of other com...
متن کاملSpecifying Contractual Use, Protocols and Quality Attributes for Software Components
We discuss the specification of signatures, protocols (behaviour) and quality of service within software component specification frameworks. In particular we focus on (a) contractually used components, (b) the specification of components with variable contracts and interfaces, and (c) of quality of service. Interface descriptions including these aspects allow powerful static interoperability ch...
متن کاملPromotion of Local to Global Operation in Train Control System
Railway interlocking system is a safety critical system. Its failure can cause the loss of human life, severe injuries and loss of money. Therefore the complication of this type of system requires advanced methodologies, which provide complete security and quality of a system. One way of achieving this goal is by using formal methods, which are mathematically based languages, techniques and too...
متن کاملICA-based High Frequency VaR for Risk Management
Independent Component Analysis (ICA, see Comon, 1994 and Hyvärinen et al., 2001) is more appropriate when non-linearity and non-normality are at stake, as mentioned by Back and Weigend (1997) in a financial context. Using high-frequency data on the French Stock Market, we evaluate this technique when generating scenarii for accurate Value-atRisk computations, reducing by this mean the effective...
متن کاملSpecifying and Verifying Systems with Multiple Clocks
Multiple clock domains are a challenge for hardware specification and verification. We present a method for specifying the relations between multiple clocks, and for modeling the possible behaviors. We can then verify a hardware design assuming that the clocks meet these constraints. We implement our ideas in the context of SAT based Bounded Model Checking (BMC), using ANSI–C programs to specif...
متن کامل