2000
DOI: 10.1002/(sici)1097-024x(20000425)30:5<481::aid-spe299>3.3.co;2-j
|View full text |Cite
|
Sign up to set email alerts
|

Construction of robust class hierarchies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2000
2000
2005
2005

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…is equal(e) : BOOL (5) pre: true (6) post: unchanged ∧ unchanged(e) ∧ res = (src = e.src ∧ dest = e.dest) (7) res := src = e.src ∧ dest = e.dest; (8) end; (9) end;…”
Section: Inheritance Anomaliesmentioning
confidence: 99%
See 2 more Smart Citations
“…is equal(e) : BOOL (5) pre: true (6) post: unchanged ∧ unchanged(e) ∧ res = (src = e.src ∧ dest = e.dest) (7) res := src = e.src ∧ dest = e.dest; (8) end; (9) end;…”
Section: Inheritance Anomaliesmentioning
confidence: 99%
“…See Frick et al [5,7] and Frigo et al [8] The predicates in Theorem 6 are type bounds. Type bounds can be viewed as predicates on the parameters of generic classes.…”
Section: Conformance Hierarchies Of Generic Classesmentioning
confidence: 99%
See 1 more Smart Citation
“…The question at this point is: How can checks, that determine whether or not a method may be called, be inserted automatically. The answer to this is easy: Non-conforming methods are generally covariant in the sense of [10]. This means that they usually only restrict their applicability by strengthening their precondition.…”
Section: Handling Critical Polymorphic Methods Callsmentioning
confidence: 99%
“…To preserve substitutability [10] and [12] propose a transformation of such structures. A detailed discussion of the transformation containing an optimal algorithm for this task can be found in [21].…”
mentioning
confidence: 99%