Assessment of Ontological Reuse versus Object Oriented Reuse Anchored in Various Reuse Subclasses
نویسندگان
چکیده
It is extensively reckoned that the development and utilization of reusable software artifacts is necessary for improving software development efficiency and software prominence. Most software development methodologies recognize the utility of reuse, and some even provide processes and contrivances to directly support it. Therefore, an object-oriented software engineering methodology is grounded in the utility and benefits of the development and reuse of software artifacts. This paper examines the role of ontologies within software engineering to potentially apply the intentional development of reusable artifacts, representation and classification of artifacts into repositories, and utilization of the artifacts from repositories. Also, a range of classes of reuse are identified, inhibitors to successful reuse are pointed-out, and technical issues for achieving reuse are examined. An explicit apprehension is focused to ontological reuse amplification over the object oriented reuse in software engineering.
منابع مشابه
Dwarf Frankenstein is still in your memory: tiny code reuse attacks
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
متن کاملBlack-Box Reuse within Frameworks based on Visual Programming
Application frameworks allow structured reuse of object-oriented design and source code, provided that the developer understands the source code and has knowledge of the frame-work's design conventions. The notion " white-box reuse " refers to the process of developing software by writing subclasses with the knowledge and understanding of the internals of the parent classes. When applying black...
متن کاملAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
متن کاملOntology Composition using a Role Modeling Approach
There is an increasing use of ontologies to represent domain knowledge, however, no notion of ontology components has so far been established. This lack hampers partial reuse of ontologies and makes a reuse-oriented engineering approach difficult. We propose to enable component-based ontology engineering by bringing together ontologies and role modeling, a well-known modeling paradigm from the ...
متن کاملComparison of growth parameters, cortisol and muscle gene expression of rainbow trout reared in an open and water reuse system
Fish farming in recirculating aquaculture systems (RAS) has been expanding in the recent years, but the effects of water reuse are not well known. The aim of the present study was to compare the growth parameters, stress response and muscle stress- and growth- related gene expression of rainbow trout (Oncorhynchus mykiss) in open system (OS) versus water reuse system (WRS). For this purpose, yo...
متن کامل