{"id":"https://openalex.org/W2120076858","doi":"https://doi.org/10.1109/mc.2003.1244535","title":"Cover feature - Uncovering hidden contracts: the .net example","display_name":"Cover feature - Uncovering hidden contracts: the .net example","publication_year":2003,"publication_date":"2003-11-01","ids":{"openalex":"https://openalex.org/W2120076858","doi":"https://doi.org/10.1109/mc.2003.1244535","mag":"2120076858"},"language":"en","primary_location":{"id":"doi:10.1109/mc.2003.1244535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.2003.1244535","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067547886","display_name":"Karine Arnout","orcid":null},"institutions":[{"id":"https://openalex.org/I54157616","display_name":"Swiss Finance Institute","ror":"https://ror.org/02cgn2a44","country_code":"CH","type":"education","lineage":["https://openalex.org/I54157616"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"K. Arnout","raw_affiliation_strings":["Swiss Fed. Inst. of Technol., Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Swiss Fed. Inst. of Technol., Zurich, Switzerland","institution_ids":["https://openalex.org/I54157616"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073925128","display_name":"Bertrand Meyer","orcid":"https://orcid.org/0000-0002-5985-7434"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"B. Meyer","raw_affiliation_strings":["ETH (Swiss Federal Institute of Technology)","ETH-Swiss Federal Institute of Technology, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH (Swiss Federal Institute of Technology)","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"ETH-Swiss Federal Institute of Technology, Z\u00fcrich, Switzerland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067547886"],"corresponding_institution_ids":["https://openalex.org/I54157616"],"apc_list":null,"apc_paid":null,"fwci":1.4045,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.854773,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"36","issue":"11","first_page":"48","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eiffel","display_name":"Eiffel","score":0.9457987546920776},{"id":"https://openalex.org/keywords/design-by-contract","display_name":"Design by contract","score":0.9176032543182373},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8687633275985718},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.6288766860961914},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.5679693818092346},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49878597259521484},{"id":"https://openalex.org/keywords/metaphor","display_name":"Metaphor","score":0.4607677459716797},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4428950846195221},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4365350008010864},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.41450023651123047},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.36158686876296997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31697434186935425},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.2570107579231262},{"id":"https://openalex.org/keywords/object-oriented-programming","display_name":"Object-oriented programming","score":0.09037670493125916}],"concepts":[{"id":"https://openalex.org/C186362262","wikidata":"https://www.wikidata.org/wiki/Q732089","display_name":"Eiffel","level":3,"score":0.9457987546920776},{"id":"https://openalex.org/C80291951","wikidata":"https://www.wikidata.org/wiki/Q1200691","display_name":"Design by contract","level":5,"score":0.9176032543182373},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8687633275985718},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.6288766860961914},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.5679693818092346},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49878597259521484},{"id":"https://openalex.org/C2778311575","wikidata":"https://www.wikidata.org/wiki/Q18534","display_name":"Metaphor","level":2,"score":0.4607677459716797},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4428950846195221},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4365350008010864},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.41450023651123047},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.36158686876296997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31697434186935425},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.2570107579231262},{"id":"https://openalex.org/C73752529","wikidata":"https://www.wikidata.org/wiki/Q79872","display_name":"Object-oriented programming","level":2,"score":0.09037670493125916},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mc.2003.1244535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.2003.1244535","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1500894086","https://openalex.org/W1521711401","https://openalex.org/W2052363833","https://openalex.org/W2090496119","https://openalex.org/W2110050316","https://openalex.org/W2158641382","https://openalex.org/W2161825580","https://openalex.org/W2166890706","https://openalex.org/W3023216518","https://openalex.org/W3183224878"],"related_works":["https://openalex.org/W1870068274","https://openalex.org/W2168732959","https://openalex.org/W47563837","https://openalex.org/W2102076681","https://openalex.org/W1518075319","https://openalex.org/W1002434765","https://openalex.org/W2105142318","https://openalex.org/W2114735670","https://openalex.org/W1566936408","https://openalex.org/W1518796915"],"abstract_inverted_index":{"Software":[0,57],"contracts":[1,24,99,112,136],"take":[2],"the":[3,14,55,65,70,73,84,88,130],"form":[4],"of":[5,50],"routine":[6],"preconditions,":[7],"postconditions,":[8],"and":[9,40,137],"class":[10],"invariants":[11],"written":[12],"into":[13],"program":[15],"itself.":[16,68],"The":[17],"design":[18,48],"by":[19],"contract":[20,62,74],"methodology":[21,44],"uses":[22],"such":[23],"for":[25,36,134],"building":[26],"each":[27],"software":[28,39,80],"element,":[29],"an":[30],"approach":[31],"that":[32,140],"is":[33,45],"particularly":[34],"appropriate":[35],"developing":[37],"safety-critical":[38],"reusable":[41],"libraries.":[42],"This":[43],"a":[46,91],"key":[47],"element":[49],"some":[51],"existing":[52],"libraries,":[53],"especially":[54],"Eiffel":[56],"development":[58,104],"environment,":[59],"which":[60],"incorporates":[61],"mechanisms":[63],"in":[64,87],"programming":[66],"language":[67],"Because":[69],"authors":[71],"see":[72,98],"metaphor":[75],"as":[76,90],"inherent":[77],"to":[78,94],"quality":[79],"development,":[81],"they":[82,97],"undertook":[83],"work":[85],"reported":[86],"article":[89],"sanity":[92],"check":[93],"determine":[95],"whether":[96,111],"everywhere":[100],"simply":[101],"because":[102],"their":[103],"environment":[105],"makes":[106],"using":[107],"them":[108,145],"natural":[109],"or":[110,122],"are":[113],"intrinsically":[114],"present,":[115],"even":[116,123],"when":[117],"other":[118],"designers":[119],"don't":[120],"express":[121],"perceive":[124],"them.":[125],"They":[126],"studied":[127],"classes":[128],"from":[129,143],".NET":[131],"collections":[132],"library":[133],"implicit":[135],"assessed":[138],"improvements":[139],"might":[141],"result":[142],"making":[144],"explicit.":[146]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
