{"id":"https://openalex.org/W2169627802","doi":"https://doi.org/10.1109/hase.2002.1173125","title":"An approach to specify and test component-based dependable software","display_name":"An approach to specify and test component-based dependable software","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W2169627802","doi":"https://doi.org/10.1109/hase.2002.1173125","mag":"2169627802"},"language":"en","primary_location":{"id":"doi:10.1109/hase.2002.1173125","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hase.2002.1173125","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"7th IEEE International Symposium on High Assurance Systems Engineering, 2002. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005426902","display_name":"Arshad Jhumka","orcid":"https://orcid.org/0000-0003-0540-2845"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"A. Jhumka","raw_affiliation_strings":["Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068568445","display_name":"Martin Hiller","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"M. Hiller","raw_affiliation_strings":["Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079786056","display_name":"Neeraj Suri","orcid":"https://orcid.org/0000-0003-1688-1167"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"N. Suri","raw_affiliation_strings":["Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005426902"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":1.8603,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.85993387,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"211","last_page":"220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7455793619155884},{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.6650577783584595},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6252171397209167},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5424005389213562},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.522411584854126},{"id":"https://openalex.org/keywords/modularity","display_name":"Modularity (biology)","score":0.48696836829185486},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46223029494285583},{"id":"https://openalex.org/keywords/component-based-software-engineering","display_name":"Component-based software engineering","score":0.4539186954498291},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.4408613443374634},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4287320077419281},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.4232673645019531},{"id":"https://openalex.org/keywords/model-based-testing","display_name":"Model-based testing","score":0.4147736132144928},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3603367209434509},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.3433806896209717},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.28305527567863464},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1239742636680603},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.10742482542991638}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7455793619155884},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.6650577783584595},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6252171397209167},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5424005389213562},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.522411584854126},{"id":"https://openalex.org/C2779478453","wikidata":"https://www.wikidata.org/wiki/Q6889748","display_name":"Modularity (biology)","level":2,"score":0.48696836829185486},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46223029494285583},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.4539186954498291},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.4408613443374634},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4287320077419281},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.4232673645019531},{"id":"https://openalex.org/C165825675","wikidata":"https://www.wikidata.org/wiki/Q1399743","display_name":"Model-based testing","level":4,"score":0.4147736132144928},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3603367209434509},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.3433806896209717},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.28305527567863464},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1239742636680603},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.10742482542991638},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1109/hase.2002.1173125","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hase.2002.1173125","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"7th IEEE International Symposium on High Assurance Systems Engineering, 2002. Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.10.1810","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.1810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.deeds.informatik.tu-darmstadt.de/publications/hase02.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.936.6175","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.936.6175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.researchgate.net/profile/Neeraj_Suri/publication/4000909_An_approach_to_specify_and_test_component-based_dependable_software/links/00b495352419c7779c000000.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.950.1092","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.950.1092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.researchgate.net/profile/Arshad_Jhumka/publication/2877393_An_Approach_to_Specify_and_Test_Component-Based_Dependable_Software/links/02e7e525d1a0a14ca4000000.pdf","raw_type":"text"},{"id":"pmh:oai:eprints.lancs.ac.uk:137642","is_oa":false,"landing_page_url":"https://eprints.lancs.ac.uk/id/eprint/137642/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Contribution in Book/Report/Proceedings"},{"id":"pmh:oai:publications.lib.chalmers.se:173625","is_oa":false,"landing_page_url":"http://publications.lib.chalmers.se/publication/173625-an-approach-to-specify-and-test-component-based-dependable-software","pdf_url":null,"source":{"id":"https://openalex.org/S4377196470","display_name":"Chalmers Publication Library (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text.Article.Conference.PeerReviewed"},{"id":"pmh:oai:research.chalmers.se:173625","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/173625","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W303139982","https://openalex.org/W1527688737","https://openalex.org/W1538342089","https://openalex.org/W1568997950","https://openalex.org/W1575308494","https://openalex.org/W1952581049","https://openalex.org/W1979248560","https://openalex.org/W2004960548","https://openalex.org/W2016079676","https://openalex.org/W2076253536","https://openalex.org/W2109033710","https://openalex.org/W2111164171","https://openalex.org/W2115484804","https://openalex.org/W2121411024","https://openalex.org/W2125539770","https://openalex.org/W2132264164","https://openalex.org/W2134435800","https://openalex.org/W2139250089","https://openalex.org/W2147661183","https://openalex.org/W2150155141","https://openalex.org/W2151474392","https://openalex.org/W2168230617","https://openalex.org/W2499974232","https://openalex.org/W2501075555","https://openalex.org/W2914206182","https://openalex.org/W6610773549","https://openalex.org/W6631503219","https://openalex.org/W6632262690","https://openalex.org/W6640719758","https://openalex.org/W6669522156","https://openalex.org/W6681951400","https://openalex.org/W6684602958"],"related_works":["https://openalex.org/W1581733465","https://openalex.org/W2127350021","https://openalex.org/W2018145554","https://openalex.org/W1598160211","https://openalex.org/W2903616347","https://openalex.org/W2204156854","https://openalex.org/W2246269111","https://openalex.org/W2135609499","https://openalex.org/W2061323929","https://openalex.org/W2061183036"],"abstract_inverted_index":{"Components":[0],"(in-house":[1],"or":[2],"pre-fabricated)":[3],"are":[4,50],"increasingly":[5],"being":[6],"used":[7],"to":[8,33,36,53,94,130,135,147,153],"reduce":[9],"the":[10,30,55,91,101,116,120,142,145,149],"cost":[11],"of":[12,57,64,144,159],"software":[13,77],"development.":[14],"Given":[15],"that":[16,113],"these":[17],"components":[18,31],"may":[19],"not":[20,22],"have":[21],"been":[23],"developed":[24],"with":[25,38],"dependability":[26],"as":[27],"a":[28,61,69],"driver,":[29],"need":[32],"be":[34],"adapted":[35],"deal":[37],"errors":[39],"coming":[40],"from":[41,79,84],"their":[42],"environment.":[43],"To":[44,99],"achieve":[45],"this,":[46],"error":[47,102],"containment":[48,103],"wrappers":[49,104],"often":[51],"added":[52],"increase":[54],"robustness":[56],"such":[58],"components.":[59,138],"Adopting":[60],"gray-box":[62],"perspective":[63],"software,":[65],"we":[66,108,126],"first":[67],"present":[68,110],"modular":[70,88],"approach":[71,89,129],"for":[72,96,106],"specifying":[73],"and":[74],"verifying":[75],"embedded":[76],"made":[78],"components,":[80],"based":[81],"on":[82],"concepts":[83],"category":[85],"theory.":[86],"This":[87],"allows":[90],"system":[92],"designer":[93],"check":[95],"semantic":[97],"compatibility.":[98],"generate":[100],"needed":[105],"adaptation,":[107],"subsequently":[109],"an":[111,128],"algorithm":[112],"systematically":[114],"generates":[115],"required":[117],"wrappers.":[118],"Using":[119],"information":[121],"obtained":[122],"through":[123],"wrapper":[124],"design,":[125],"develop":[127],"identify":[131,148],"relevant":[132,150],"test":[133,136,151],"cases":[134,152],"individual":[137],"We":[139],"further":[140],"exploit":[141],"modularity":[143],"specification":[146],"perform":[154],"testing":[155],"at":[156],"different":[157],"levels":[158],"SW":[160],"abstraction.":[161]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
