{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:14Z","timestamp":1750307834295,"version":"3.41.0"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60463002"],"award-info":[{"award-number":["60463002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005273","name":"Natural Science Foundation of Yunnan Province","doi-asserted-by":"publisher","award":["2007F008M"],"award-info":[{"award-number":["2007F008M"]}],"id":[{"id":"10.13039\/501100005273","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Yunnan University Science Foundation","award":["kl070033"],"award-info":[{"award-number":["kl070033"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2008,3]]},"abstract":"<jats:p>Component-Based Development, CBD for short, is becoming a main stream software development paradigm which reuses the off-the-shelf components and assembles them together to form a component-based application. CBD paradigm obviously has aroused a great attention among the engineering and academic domain and many new concepts, tools, and development methodologies have been coming out. However, CBD paradigms are usually questioned by its feasibility and performance. The inherent reason of this dilemma is lacking a methodology to guide researchers or engineers to clarify the behavior relativity among components. In this paper we proposed a new formalism, named component network, which is an extension of Petri net and its powerful capability to modeling distributed system is the guarantee of successful modeling component-based system. Further more, a series operation and theorems are presented, which are concerned to be the footstone of component behavior relativity analysis and software evolution research.<\/jats:p>","DOI":"10.1145\/1350802.1350814","type":"journal-article","created":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T16:08:32Z","timestamp":1207066112000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Component behavior relativity analysis"],"prefix":"10.1145","volume":"33","author":[{"given":"Wang","family":"Wei","sequence":"first","affiliation":[{"name":"Yunnan University, Kunming, P.R.China"}]},{"given":"Li","family":"Tong","sequence":"additional","affiliation":[{"name":"Yunnan University, Kunming, P.R.China"}]}],"member":"320","published-online":{"date-parts":[[2008,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Tadao Murata. Petri Nets: Properties Analysis and Applications Proceeding of the IEEE VOL. 77 NO 4 APRIL 1989  Tadao Murata. Petri Nets: Properties Analysis and Applications Proceeding of the IEEE VOL. 77 NO 4 APRIL 1989","DOI":"10.1109\/5.24143"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2005.30"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31984-9_3"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2005.30"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1049404"},{"key":"e_1_2_1_6_1","first-page":"80","volume-title":"ETAPS\/FASE","author":"Reussner R.H.","year":"2005"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/510378.510647"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUROMICRO.2006.50"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2007.71"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2007.102"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1191828.1192566"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2003.1194778"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2007.98"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1350802.1350814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1350802.1350814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:59Z","timestamp":1750255079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1350802.1350814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["10.1145\/1350802.1350814"],"URL":"https:\/\/doi.org\/10.1145\/1350802.1350814","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2008,3]]},"assertion":[{"value":"2008-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}