2006
DOI: 10.1007/11804192_15
|View full text |Cite
|
Sign up to set email alerts
|

Modular Specification of Encapsulated Object-Oriented Components

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…We exploited this information in the context of distributed object-oriented programming to check whether an access or method call is local or remote. Locations can also be used for other purposes, in particular -as scheduling units in multi-core scenarios [23], -to raise the level of granularity of memory management and garbage collection from single objects to group of objects [24], -for encapsulation of objects [25] or other values [13], and -to support specification and verification techniques [26].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…We exploited this information in the context of distributed object-oriented programming to check whether an access or method call is local or remote. Locations can also be used for other purposes, in particular -as scheduling units in multi-core scenarios [23], -to raise the level of granularity of memory management and garbage collection from single objects to group of objects [24], -for encapsulation of objects [25] or other values [13], and -to support specification and verification techniques [26].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…During runtime each object belongs to exactly one box, thus defining a clear runtime boundary. A more detailed description including the discussion of design decisions and showing the use of the model for modular specification can be found in [20].…”
Section: Motivating Examplementioning
confidence: 99%
“…The cast restriction allows the implementation to be changed without breaking compatibility with clients, even in the presence of downcasting. This also improves the reasoning about the behavior and about properties of a box in a modular way (see [20] for more details). Figure 3 shows an example client implementation.…”
Section: Motivating Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Boxes [36] is an alias control schema based on ownership types. The system requires that the program is split into a series of modules, each of which is similar to alias-protected containers [32].…”
Section: Boxes Inferencementioning
confidence: 99%