TITLE

A Simple Mechanism for Type Security Across Compilation Units

AUTHOR(S)
Scott, Michael L.; Finkel, Raphael A.
PUB. DATE
August 1988
SOURCE
IEEE Transactions on Software Engineering;Aug88, Vol. 14 Issue 8, p1238
SOURCE TYPE
Academic Journal
DOC. TYPE
Letter
ABSTRACT
A simple technique detects structural type clashes across compilation units with an arbitrarily high degree of confidence. The type of each external object is described in canonical form. A hash function compresses the description into a short code. lithe code is embedded in a symbol-table name, then consistency can be checked by an ordinary linker. For distributed programs, run-time checking of message types can be performed with very little overhead.
ACCESSION #
14315964

 

Related Articles

  • In this issue. Harrison, Rachel // Software Quality Journal;Jun2014, Vol. 22 Issue 2, p151 

    An introduction is presented in which the editor discusses reports within the issue on topics including the black-box software testing, aspects for testing embedded software, and experimental software engineering.

  • Virtual Node - To Achieve Temporal Isolation and Predictable Integration of Real-Time Components. Inam, Rafia; Mäki-Turja, Jukka; Carlson, Jan; Sjödin, Mikael // GSTF Journal on Computing;Jan2012, Vol. 1 Issue 4, p63 

    We present an approach of two-level deployment process for component models used in distributed real-time embedded systems to achieve predictable integration of real-time components. Our main emphasis is on the new concept of virtual node with the use of a hierarchical scheduling technique....

  • Trends in Embedded Software Engineering. Liggesmeyer, Peter; Trapp, Mario // IEEE Software;May/Jun2009, Vol. 26 Issue 3, p19 

    The article discusses the state of embedded software engineering as of 2009. The need for renewed approaches in software development as a result of the tendency for the complexity of embedded systems' functional and extrafunctional requirements to increase is noted. The growth in the influence...

  • Comparison of type-based and alias-based component recognition for embedded systems software. Schreiner, Dietmar; Barany, Gergö; Schordan, Markus; Knoop, Jens // International Journal on Software Tools for Technology Transfer;Feb2013, Vol. 15 Issue 1, p41 

    Component-based software engineering has found broad acceptance within the embedded systems community over the last years. However, to fully exploit its potential in terms of reusability and cost-efficiency, existing code-bases have to be refactored in a component-based way. To support...

  • Embedded-system programmers must learn the fundamentals. Hyde, Randall // EDN;5/26/2005, Vol. 50 Issue 11, p91 

    The article discusses the need for computer embedded-system programmers not to rely on Moore's Law when it comes to determine processor performance. Central processing unit (CPU) power has dictated the way software engineers design and implement embedded-software options....

  • Predicting Fault-Prone Modules in Embedded Systems Using Analogy-Based Classification Models. Khoshgoftaar, Taghi M.; Cukic, Bojan; Seliya, Naeem // International Journal of Software Engineering & Knowledge Engine;Apr2002, Vol. 12 Issue 2, p201 

    Embedded systems have become ubiquitous and essential entities in our ever growing high-tech world. The backbone of today's information-highway infrastructure are embedded systems such as telecommunication systems. They demand high reliability, so as to prevent severe consequences of failures...

  • MODEL BEHAVIOR: CREATING EMBEDDED-SOFTWARE SHORT CUTS. Webb, Warren // EDN;1/18/2007, Vol. 52 Issue 2, p58 

    The article discusses the use of model-based tools in creating embedded-software circuits. Automatic code generation is an element of model-based design that facilitates the design of a system through a formal graphical presentation instead of a traditional written specification. Model-based...

  • AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDED SYSTEMS. Nanda, Manju; Jayanthi, J.; Rao, Shrisha // International Journal of Software Engineering & Applications;Mar2013, Vol. 4 Issue 2, p123 

    This paper presents the best practices to carry out the verification and validation (V&V) for a safety-critical embedded system, part of a larger system-of-systems. The paper talks about the effectiveness of this strategy from performance and time schedule requirement of a project. The best...

  • A rational programming decision. Langley, Nick // Computer Weekly;9/2/2003, p38 

    Rational Rose enables teams of developers to pool their skills and work with end-users to specify, design, generate and test applications. Analyst firm IDC called Rational Rose an analysis, modeling and design (AMD) tool. These models can then be used to generate code, forming re-usable software...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics