{"id":"https://openalex.org/W2118477611","doi":"https://doi.org/10.1145/1858996.1859095","title":"Error-avoiding adaptors for black-box software components","display_name":"Error-avoiding adaptors for black-box software components","publication_year":2010,"publication_date":"2010-09-20","ids":{"openalex":"https://openalex.org/W2118477611","doi":"https://doi.org/10.1145/1858996.1859095","mag":"2118477611"},"language":"en","primary_location":{"id":"doi:10.1145/1858996.1859095","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1858996.1859095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM international conference on Automated software engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070832857","display_name":"Casandra Holotescu","orcid":null},"institutions":[{"id":"https://openalex.org/I3122695212","display_name":"Polytechnic University of Timi\u015foara","ror":"https://ror.org/02v91gy68","country_code":"RO","type":"education","lineage":["https://openalex.org/I3122695212"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Casandra Holotescu","raw_affiliation_strings":["Politehnica University of Timisoara, Timisoara, Romania","Politehnica University of Timisoara, Timisoara, Romania#TAB#"],"affiliations":[{"raw_affiliation_string":"Politehnica University of Timisoara, Timisoara, Romania","institution_ids":["https://openalex.org/I3122695212"]},{"raw_affiliation_string":"Politehnica University of Timisoara, Timisoara, Romania#TAB#","institution_ids":["https://openalex.org/I3122695212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5070832857"],"corresponding_institution_ids":["https://openalex.org/I3122695212"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14136594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"487","last_page":"492"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.8904125094413757},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7972744107246399},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.6938085556030273},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.640788197517395},{"id":"https://openalex.org/keywords/component-based-software-engineering","display_name":"Component-based software engineering","score":0.6039772033691406},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5645884871482849},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5114333033561707},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4360649883747101},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3751693367958069},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.35034626722335815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17364755272865295},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1702134609222412},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13747328519821167}],"concepts":[{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.8904125094413757},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7972744107246399},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.6938085556030273},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.640788197517395},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.6039772033691406},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5645884871482849},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5114333033561707},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4360649883747101},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3751693367958069},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.35034626722335815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17364755272865295},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1702134609222412},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13747328519821167},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1858996.1859095","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1858996.1859095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM international conference on Automated software engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.653.9148","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.653.9148","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.avantssar.eu/pdf/publications/phd_symposium_ase2010.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1482663303","https://openalex.org/W1511405608","https://openalex.org/W1539019418","https://openalex.org/W1583869287","https://openalex.org/W1862857158","https://openalex.org/W1975455609","https://openalex.org/W1998175705","https://openalex.org/W2001172870","https://openalex.org/W2036196659","https://openalex.org/W2048905609","https://openalex.org/W2054099039","https://openalex.org/W2059057465","https://openalex.org/W2095617372","https://openalex.org/W2099866050","https://openalex.org/W2120967289","https://openalex.org/W2127574686","https://openalex.org/W2135128114","https://openalex.org/W2153841169","https://openalex.org/W2163119090","https://openalex.org/W2293287097","https://openalex.org/W2401003083"],"related_works":["https://openalex.org/W2348289213","https://openalex.org/W2018121945","https://openalex.org/W2677345884","https://openalex.org/W1837917562","https://openalex.org/W4235602047","https://openalex.org/W2379062178","https://openalex.org/W2101817543","https://openalex.org/W2365172741","https://openalex.org/W114740100","https://openalex.org/W2373416126"],"abstract_inverted_index":{"A":[0],"lot":[1],"of":[2,10,24,105],"work":[3],"has":[4],"been":[5],"done":[6],"in":[7,69],"the":[8,25,88,106],"area":[9],"building":[11],"component-based":[12],"systems":[13],"with":[14,37],"correct-by-construction":[15],"adaptors.":[16],"This":[17],"is":[18],"accomplished":[19],"by":[20,109],"using":[21],"preexisting":[22],"specifications":[23,90],"component":[26,95,108],"behaviour.":[27],"But":[28],"what":[29],"happens":[30],"when":[31],"known":[32],"components":[33],"get":[34],"to":[35,59,74,113],"interact":[36],"incompletely":[38],"specified,":[39],"black-box":[40],"components,":[41],"and":[42,61,71,99],"errors":[43,50],"occur?":[44],"How":[45],"can":[46],"we":[47,100],"avoid":[48,83],"these":[49],"without":[51],"modifying":[52],"existing/legacy":[53],"components?":[54],"We":[55,86],"present":[56],"a":[57,76],"method":[58],"explore":[60],"control":[62],"such":[63],"systems.":[64],"Our":[65],"approach":[66],"exploits":[67],"information":[68,104],"correct":[70],"erroneous":[72],"runs":[73],"build":[75],"controller":[77],"that":[78],"ensures":[79],"our":[80,92],"system":[81],"will":[82],"observed":[84],"errors.":[85],"consider":[87],"behavioural":[89],"for":[91],"known,":[93],"legacy":[94],"as":[96],"already":[97],"documented":[98],"infer":[101],"partial":[102],"behaviour":[103],"unknown":[107],"studying":[110],"its":[111],"reactions":[112],"various":[114],"interaction":[115],"scenarios.":[116]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
