Support for Programming by Contract
Explain the Support for Programming by Contract or pbc?
Expert
Programming by Contract can be supported on several levels, depending on the programming language and available third-party tools.
While direct support by language provides the most powerful support for contracts (e.g., loop variants/invariants), it depends on languages or language extensions that are not mainstream, and therefore might not be suitable for all projects. The two statically typed (compiled), publicly available programming languages supporting PbC at this level are Eiffel (Eiffel Software) and D (Digital Mars). Both are contemporary object-oriented languages, implemented in proprietary and open source compilers, supporting several hardware architectures and operating systems. Eiffel provides deeper PbC support (e.g., loop variants and invariants), and loosely resembles Pascal/Ada in terms of declaration and expression syntax. D resembles C/C++, but is not yet widely used and is less mature than Eiffel. Both languages have established user and developer communities, but cannot be considered as mainstream as C++.
While a PbC proposal exists for the upcoming C++0x standard (Abrahams et al. 2005), it is not yet clear if and when compiler vendors will support it. The syntax resembles D, in that it requires grammar extensions:
What bearer types are utilized for WAP in GSM? In GSM, WAP can be run over the Short Message Service (SMS) or by means of Circuit Switched Data (CSD). The latter provides much greater bandwidth.
Need of the concept of process: Processes are inert. We know that process is fundamentally the active state of a program which is the set of instruction intended to execute some specific job. Preceding to execution, the instructions should be converte
Black-Box Testing: Black-box testing assumes an external perspective of the system under test (SUT). It uses concrete input test data to obtain results from the SUT, which are then checked against some oracle. Usually, the oracle uses functional prope
Program Design Guidelines for Model Checking: Most of the significant software development projects use some kind of design and coding guidelines. There exist many such guidelines, some including tens or even hundreds of rules covering almost all aspe
Normal 0 false false
2000 Words A 62-year-old female with a history of type 2 diabetes mellitus and hypertension was admitted to a trauma center following a Motor vehicle accident. Examination revealed blunt thoracic and abdominal trauma and a fractured right femur. The patient was dyspneic, tachycardic, hypotensive, an
Define the term Asymmetric Encryption?
18,76,764
1946455 Asked
3,689
Active Tutors
1436310
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!