{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:13:23Z","timestamp":1758874403004},"reference-count":81,"publisher":"Elsevier","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1016\/s0065-2458(08)60164-3","type":"book-chapter","created":{"date-parts":[[2011,1,19]],"date-time":"2011-01-19T05:56:15Z","timestamp":1295416575000},"page":"1-65","source":"Crossref","is-referenced-by-count":36,"title":["Reusable Software Components"],"prefix":"10.1016","author":[{"given":"Bruce W.","family":"Weide","sequence":"first","affiliation":[]},{"given":"William F.","family":"Ogden","sequence":"additional","affiliation":[]},{"given":"Stuart H.","family":"Zweben","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0065-2458(08)60164-3_bib1","unstructured":"Ada Joint Program Office (1983). \u201cReference Manual for the Ada Programming Language.\u201d ANSI\/MIL-STD-1815A-1983. U.S. Government Printing Office, Washington, D.C."},{"key":"10.1016\/S0065-2458(08)60164-3_bib2","unstructured":"Apple Computer (1985). \u201cInside Macintosh\u2014Volumes I\u2013V.\u201d Addison-Wesley, Reading, Massachusetts."},{"key":"10.1016\/S0065-2458(08)60164-3_bib3","series-title":"Writing Efficient Programs","author":"Bentley","year":"1982"},{"key":"10.1016\/S0065-2458(08)60164-3_bib4","series-title":"Creating Reusable Ada Software","author":"Berard","year":"1987"},{"key":"10.1016\/S0065-2458(08)60164-3_bib5","author":"Biggerstaff","year":"1989"},{"key":"10.1016\/S0065-2458(08)60164-3_bib6","series-title":"Simula Begin","author":"Birtwistle","year":"1973"},{"key":"10.1016\/S0065-2458(08)60164-3_bib7","author":"Bj\u00f8rner","year":"1987"},{"issue":"9","key":"10.1016\/S0065-2458(08)60164-3_bib8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MC.1987.1663694","article-title":"Improving Software Productivity","volume":"20","author":"Boehm","year":"1987","journal-title":"Computer"},{"key":"10.1016\/S0065-2458(08)60164-3_bib9","series-title":"Software Components with Ada","author":"Booch","year":"1987"},{"key":"10.1016\/S0065-2458(08)60164-3_bib10","unstructured":"Computer Science and Technology Board (1990). Scaling Up: A Research Agenda for Software Engineering. Comm. ACM 33 (3), 281\u2013293."},{"key":"10.1016\/S0065-2458(08)60164-3_bib11","series-title":"Object Oriented Programming: An Evolutionary Approach","author":"Cox","year":"1986"},{"issue":"5","key":"10.1016\/S0065-2458(08)60164-3_bib12","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1145\/359104.359106","article-title":"Social Processes and Proofs of Theorems and Programs","volume":"22","author":"DeMillo","year":"1979","journal-title":"Comm. ACM"},{"issue":"10","key":"10.1016\/S0065-2458(08)60164-3_bib13","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1145\/355604.361591","article-title":"The Humble Programmer","volume":"15","author":"Dijkstra","year":"1972","journal-title":"Comm. ACM"},{"key":"10.1016\/S0065-2458(08)60164-3_bib14","series-title":"Third Ann. Workshop: Methods and Tools for Reuse.","article-title":"The 3C Model of Reusable Software Components.","author":"Edwards","year":"1990"},{"key":"10.1016\/S0065-2458(08)60164-3_bib15","first-page":"144","article-title":"Assessing the Quality of Abstract Data Types Written in Ada.","author":"Embley","year":"1988","journal-title":"Proc. Intl. Conf. on Softw. Eng. IEEE"},{"issue":"4","key":"10.1016\/S0065-2458(08)60164-3_bib16","first-page":"522","article-title":"Verification of Programs with Procedure-Type Parameters","volume":"2","author":"Ernst","year":"1982","journal-title":"Acta Inf."},{"key":"10.1016\/S0065-2458(08)60164-3_bib17","series-title":"Software Engineering Concepts","author":"Fairley","year":"1985"},{"key":"10.1016\/S0065-2458(08)60164-3_bib18","series-title":"Data Structures with Modula-2","author":"Feldman","year":"1988"},{"issue":"9","key":"10.1016\/S0065-2458(08)60164-3_bib19","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1145\/48529.48530","article-title":"Program Verification: The Very Idea","volume":"31","author":"Fetzer","year":"1988","journal-title":"Comm. ACM"},{"key":"10.1016\/S0065-2458(08)60164-3_bib20","first-page":"119","article-title":"Assigning Meanings to Programs.","author":"Floyd","year":"1967","journal-title":"Proc. AMS Symp. on Appl. Math. MAS"},{"issue":"3","key":"10.1016\/S0065-2458(08)60164-3_bib21","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/357139.357140","article-title":"Data-Abstraction Implementation, Specification, and Testing","volume":"3","author":"Gannon","year":"1981","journal-title":"TOPLAS"},{"issue":"1","key":"10.1016\/S0065-2458(08)60164-3_bib22","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0096-0551(87)90009-9","article-title":"Two Implementation Models of Abstract Data Types","volume":"12","author":"Gannon","year":"1987","journal-title":"Comp. Lang."},{"key":"10.1016\/S0065-2458(08)60164-3_bib23","author":"Gautier","year":"1990"},{"issue":"1","key":"10.1016\/S0065-2458(08)60164-3_bib24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/32.44359","article-title":"Formal Specification and Design Time Testing","volume":"16","author":"Gerrard","year":"1990","journal-title":"IEEE Trans, on Softw. Eng."},{"issue":"5","key":"10.1016\/S0065-2458(08)60164-3_bib25","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/TSE.1984.5010277","article-title":"Parameterized Programming","volume":"SE-10","author":"Goguen","year":"1984","journal-title":"IEEE Trans. on Softw. Eng."},{"key":"10.1016\/S0065-2458(08)60164-3_bib26","series-title":"Smalltalk-80: The Language and Its Implementation","author":"Goldberg","year":"1983"},{"issue":"6","key":"10.1016\/S0065-2458(08)60164-3_bib27","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/TSE.1983.235433","article-title":"A Mathematical Framework for the Investigation of Testing","volume":"SE-9","author":"Gourlay","year":"1983","journal-title":"IEEE Trans. on Softw. Eng."},{"issue":"11","key":"10.1016\/S0065-2458(08)60164-3_bib28","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.43523","article-title":"A Structured Approach for VLSI Circuit Design","volume":"22","author":"Gu","year":"1989","journal-title":"Computer"},{"issue":"9","key":"10.1016\/S0065-2458(08)60164-3_bib29","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/32.58790","article-title":"Formal Verification of Ada Programs","volume":"16","author":"Guaspari","year":"1990","journal-title":"IEEE Trans. on Softw. Eng."},{"issue":"5","key":"10.1016\/S0065-2458(08)60164-3_bib30","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MS.1985.231756","article-title":"The Larch Family of Specification Languages","volume":"2","author":"Guttag","year":"1985","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60164-3_bib31","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/0167-6423(86)90021-3","article-title":"Report on the Larch Shared Language","volume":"6","author":"Guttag","year":"1986","journal-title":"Sci. of Comp. Prog."},{"key":"10.1016\/S0065-2458(08)60164-3_bib32","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/0167-6423(86)90022-5","article-title":"A Larch Shared Language Handbook","volume":"6","author":"Guttag","year":"1986","journal-title":"Sci. of Comp. Prog."},{"key":"10.1016\/S0065-2458(08)60164-3_bib33","unstructured":"Harms, D. E. (1990). The Influence of Software Reuse on Programming Language Design. Ph.D. dissertation, Dept. of Computer and Information Science, Ohio State University, Columbus"},{"key":"10.1016\/S0065-2458(08)60164-3_bib34","unstructured":"Hegazy, W. A. (1989). The Requirements of Testing a Class of Reusable Software Modules. Ph.D. dissertation, Dept. of Computer and Information Science, Ohio State University, Columbus."},{"key":"10.1016\/S0065-2458(08)60164-3_bib35","first-page":"35","article-title":"Programming in Ada: Examples.","author":"Hibbard","year":"1983"},{"issue":"10","key":"10.1016\/S0065-2458(08)60164-3_bib36","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1145\/363235.363259","article-title":"An Axiomatic Basis for Computer Programming","volume":"12","author":"Hoare","year":"1969","journal-title":"Comm. ACM"},{"key":"10.1016\/S0065-2458(08)60164-3_bib37","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09507-2_3","article-title":"Hints on Programming Language Design","author":"Hoare","year":"1983"},{"key":"10.1016\/S0065-2458(08)60164-3_bib38","unstructured":"IEEE (1984). Special issue on software reusability. IEEE Trans. on Software Eng. SE-10(5)."},{"key":"10.1016\/S0065-2458(08)60164-3_bib39","series-title":"Data Structures Using Modula-2","author":"Jones","year":"1988"},{"key":"10.1016\/S0065-2458(08)60164-3_bib40","unstructured":"Krone, J. (1988). The Role of Verification in Software Reusability. Ph.D. dissertation, Dept. of Computer and Information Science, Ohio State University, Columbus."},{"issue":"2","key":"10.1016\/S0065-2458(08)60164-3_bib41","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1145\/63264.63265","article-title":"Designing Families of Data Types Using Exemplars","volume":"11","author":"LaLonde","year":"1989","journal-title":"TOPLAS"},{"key":"10.1016\/S0065-2458(08)60164-3_bib42","series-title":"Third Ann. Workshop: Methods and Tools for Reuse","article-title":"Descriptive and Predictive Aspects of the 3Cs Model: SETA 1 Working Group Summary.","author":"Latour","year":"1990"},{"key":"10.1016\/S0065-2458(08)60164-3_bib43","series-title":"Abstraction and Specification in Program Development","author":"Liskov","year":"1986"},{"issue":"1","key":"10.1016\/S0065-2458(08)60164-3_bib44","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/TSE.1975.6312816","article-title":"Specification Techniques for Data Abstractions","volume":"SE-1","author":"Liskov","year":"1975","journal-title":"IEEE Trans. on Softw. Eng."},{"key":"10.1016\/S0065-2458(08)60164-3_bib45","series-title":"CLU Reference Manual","author":"Liskov","year":"1981"},{"issue":"5","key":"10.1016\/S0065-2458(08)60164-3_bib46","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/TSE.1984.5010278","article-title":"Design of Ada Systems Yielding Reusable Components: An Approach Using Structured Algebraic Specification","volume":"SE-10","author":"Livintchouk","year":"1984","journal-title":"IEEE Trans. on Softw. Eng."},{"issue":"3","key":"10.1016\/S0065-2458(08)60164-3_bib47","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/75200.75218","article-title":"Specifying Reusable Components Using Z: Realistic Sets and Dictionaries","volume":"14","author":"London","year":"1989","journal-title":"Softw. Eng. Notes"},{"key":"10.1016\/S0065-2458(08)60164-3_bib48","series-title":"ANNA: A Language for Annotating Ada Programs","author":"Luckham","year":"1987"},{"key":"10.1016\/S0065-2458(08)60164-3_bib49","series-title":"Data Types and Data Structures","author":"Martin","year":"1986"},{"key":"10.1016\/S0065-2458(08)60164-3_bib50","first-page":"88","article-title":"Mass-Produced Software Components","author":"McIlroy","year":"1976"},{"issue":"1","key":"10.1016\/S0065-2458(08)60164-3_bib51","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MS.1985.229776","article-title":"On Formalism in Specification","volume":"2","author":"Meyer","year":"1985","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60164-3_bib52","first-page":"391","article-title":"Genericity versus Inheritance.","author":"Meyer","year":"1986"},{"key":"10.1016\/S0065-2458(08)60164-3_bib53","series-title":"Object-Oriented Software Construction","author":"Meyer","year":"1988"},{"key":"10.1016\/S0065-2458(08)60164-3_bib54","first-page":"188","article-title":"On Inclusion of the Private Part in Ada Package Specifications.","author":"Muralidharan","year":"1989"},{"key":"10.1016\/S0065-2458(08)60164-3_bib55","first-page":"515","article-title":"Should Data Abstraction Be Violated to Enhance Software Reuse?","author":"Muralidharan","year":"1990"},{"key":"10.1016\/S0065-2458(08)60164-3_bib56","series-title":"The Ada Generic Library: Linear List Processing Packages","author":"Musser","year":"1989"},{"issue":"12","key":"10.1016\/S0065-2458(08)60164-3_bib57","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1145\/361598.361623","article-title":"On the Criteria to Be Used in Decomposing Systems into Modules","volume":"15","author":"Parnas","year":"1972","journal-title":"Comm. ACM"},{"key":"10.1016\/S0065-2458(08)60164-3_bib58","unstructured":"Pittel, T. S. (1990). \u201cPointers in RESOLVE: Specification and Implementation.\u201d M. S. thesis, Dept. of Computer and Information Science, Ohio State University, Columbus."},{"key":"10.1016\/S0065-2458(08)60164-3_bib59","first-page":"23","article-title":"Domain Analysis for Reusability.","author":"Prieto-Diaz","year":"1987"},{"issue":"2","key":"10.1016\/S0065-2458(08)60164-3_bib60","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/382296.382703","article-title":"Domain Analysis: An Introduction","volume":"15","author":"Prieto-Diaz","year":"1990","journal-title":"Softw. Eng. Notes"},{"key":"10.1016\/S0065-2458(08)60164-3_bib61","series-title":"Third Ann. Workshop: Methods and Tools for Reuse","article-title":"Code Inheritance Considered Harmful.","author":"Raj","year":"1990"},{"issue":"4","key":"10.1016\/S0065-2458(08)60164-3_bib62","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1093\/comjnl\/32.4.312","article-title":"A Compositional Model for Software Reuse","volume":"32","author":"Raj","year":"1989","journal-title":"Comp. J."},{"issue":"5","key":"10.1016\/S0065-2458(08)60164-3_bib63","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/52.7945","article-title":"Is Copyright Law Steering the Right Course?","volume":"5","author":"Samuelson","year":"1988","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60164-3_bib64","author":"Shaw","year":"1981"},{"key":"10.1016\/S0065-2458(08)60164-3_bib65","first-page":"7","article-title":"The Impact of Abstraction Concerns on Modern Programming Languages","author":"Shaw","year":"1983"},{"key":"10.1016\/S0065-2458(08)60164-3_bib66","unstructured":"Sitaraman, M. (1990). Mechanisms and Methods for Performance Tuning of Reusable Software Components. Ph.D. dissertation, Dept. of Computer and Information Science, Ohio State University, Columbus."},{"key":"10.1016\/S0065-2458(08)60164-3_bib67","first-page":"38","article-title":"Encapsulation and Inheritance in Object-Oriented Systems.","author":"Snyder","year":"1986"},{"key":"10.1016\/S0065-2458(08)60164-3_bib68","unstructured":"SofTech, Inc. 1985\u201cISEC (U.S. Army Information Systems Engineering Command) Reusability Guidelines.\u201d 3285\u20134\u2013247\/2. Waltham, Massachusetts."},{"key":"10.1016\/S0065-2458(08)60164-3_bib69","series-title":"The Z Notation: A Reference Manual","author":"Spivey","year":"1989"},{"key":"10.1016\/S0065-2458(08)60164-3_bib70","series-title":"The C++ Programming Language","author":"Stroustrup","year":"1986"},{"key":"10.1016\/S0065-2458(08)60164-3_bib71","series-title":"Data Structures with Abstract Data Types and Modula-2","author":"Stubbs","year":"1987"},{"issue":"1","key":"10.1016\/S0065-2458(08)60164-3_bib72","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MS.1987.229790","article-title":"How Japan's Recently Amended Copyright Law Affects Software","volume":"4","author":"Tomijima","year":"1987","journal-title":"IEEE Software"},{"issue":"4","key":"10.1016\/S0065-2458(08)60164-3_bib73","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MS.1987.231056","article-title":"Reusability Comes of Age","volume":"4","author":"Tracz","year":"1987","journal-title":"IEEE Software"},{"issue":"2","key":"10.1016\/S0065-2458(08)60164-3_bib74","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/382296.382702","article-title":"Where Does Reuse Start?","volume":"15","author":"Tracz","year":"1990","journal-title":"Softw. Eng. Notes"},{"key":"10.1016\/S0065-2458(08)60164-3_bib75","series-title":"Third Ann. Workshop: Methods and Tools for Reuse","article-title":"The Three Cons of Software Reuse.","author":"Tracz","year":"1990"},{"key":"10.1016\/S0065-2458(08)60164-3_bib76","series-title":"Reuse in Practice Workshop","article-title":"Implementation Issues Working Group Report.","author":"Tracz","year":"1989"},{"issue":"3","key":"10.1016\/S0065-2458(08)60164-3_bib77","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/52.28119","article-title":"Software Verification and Validation: An Overview","volume":"6","author":"Wallace","year":"1989","journal-title":"IEEE Software"},{"issue":"11","key":"10.1016\/S0065-2458(08)60164-3_bib78","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MC.1987.1663417","article-title":"Source Code","volume":"20","author":"Weiser","year":"1987","journal-title":"Computer"},{"issue":"1","key":"10.1016\/S0065-2458(08)60164-3_bib79","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/9758.10500","article-title":"Writing Larch Interface Language Specifications","volume":"9","author":"Wing","year":"1987","journal-title":"TOPLAS"},{"issue":"9","key":"10.1016\/S0065-2458(08)60164-3_bib80","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/2.58215","article-title":"A Specifier's Introduction to Formal Methods","volume":"23","author":"Wing","year":"1990","journal-title":"Computer"},{"key":"10.1016\/S0065-2458(08)60164-3_bib81","series-title":"Testing Formally Specified Data-Oriented Modules Using Program-Based Test Data Adequacy Criteria","author":"Zweben","year":"1989"}],"container-title":["Advances in Computers","Advances in Computers Volume 33"],"original-title":[],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T23:48:21Z","timestamp":1559951301000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245808601643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1016\/s0065-2458(08)60164-3","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[1991]]}}}