{"title":"有限义务的实现","authors":"M. Feather","doi":"10.1109/KBSE.1993.341208","DOIUrl":null,"url":null,"abstract":"An implementation of bounded obligations is demonstrated. Bounded obligations facilitate the expression of requirements such as 'a user must return a book on or before its due date'. The implementation translates a simple, declarative form of a bounded obligation into the equivalent data structures and operations necessary to ensure its adherence. Incremental development and exploration is achieved by modifying a 'strict' bounded obligation to become 'violatable' together with a way of recognizing when it has been violated. Again, a simple declaration to this effect is appropriately translated by the implementation. Finally, response to such violations can also be declared and automatically translated into running code. The implementation is described and illustrated on examples drawn from a simple library system.<<ETX>>","PeriodicalId":371606,"journal":{"name":"Proceedings of 8th Knowledge-Based Software Engineering Conference","volume":"252 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"An implementation of bounded obligations\",\"authors\":\"M. Feather\",\"doi\":\"10.1109/KBSE.1993.341208\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An implementation of bounded obligations is demonstrated. Bounded obligations facilitate the expression of requirements such as 'a user must return a book on or before its due date'. The implementation translates a simple, declarative form of a bounded obligation into the equivalent data structures and operations necessary to ensure its adherence. Incremental development and exploration is achieved by modifying a 'strict' bounded obligation to become 'violatable' together with a way of recognizing when it has been violated. Again, a simple declaration to this effect is appropriately translated by the implementation. Finally, response to such violations can also be declared and automatically translated into running code. The implementation is described and illustrated on examples drawn from a simple library system.<<ETX>>\",\"PeriodicalId\":371606,\"journal\":{\"name\":\"Proceedings of 8th Knowledge-Based Software Engineering Conference\",\"volume\":\"252 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1993-09-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 8th Knowledge-Based Software Engineering Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/KBSE.1993.341208\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 8th Knowledge-Based Software Engineering Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KBSE.1993.341208","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An implementation of bounded obligations is demonstrated. Bounded obligations facilitate the expression of requirements such as 'a user must return a book on or before its due date'. The implementation translates a simple, declarative form of a bounded obligation into the equivalent data structures and operations necessary to ensure its adherence. Incremental development and exploration is achieved by modifying a 'strict' bounded obligation to become 'violatable' together with a way of recognizing when it has been violated. Again, a simple declaration to this effect is appropriately translated by the implementation. Finally, response to such violations can also be declared and automatically translated into running code. The implementation is described and illustrated on examples drawn from a simple library system.<>