| Line 17: | Line 17: | ||
* ''CiClass_xCjClass_y'', ''Ci_Class_xClass_y'': These classes participate in multiple inheritance relationships combining different refinements from the alternative abstraction criteria classes (''C1Class3_C2Class2'' and ''C1_Class1Class2'' in the Figure above). | * ''CiClass_xCjClass_y'', ''Ci_Class_xClass_y'': These classes participate in multiple inheritance relationships combining different refinements from the alternative abstraction criteria classes (''C1Class3_C2Class2'' and ''C1_Class1Class2'' in the Figure above). | ||
| − | }} | + | }} |
{{Architectural OP Example Template | {{Architectural OP Example Template | ||
| − | |Problem= | + | |Problem= |
| + | {{Include Image | ||
| + | |ImageName=Fig_avizienis_fault_5a.jpg | ||
| + | }} | ||
| + | Matrix representation of Fault in Avizienis et al. [1] used in the ReSIST KB ontology. | ||
| + | |||
| + | [1] Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 01(1) (2004) 11--33 | ||
}} | }} | ||
| + | |||
{{Architectural OP Reference Template}} | {{Architectural OP Reference Template}} | ||
{{Scenarios about me}} | {{Scenarios about me}} | ||
{{Reviews about me}} | {{Reviews about me}} | ||
| Name | View Inheritance |
|---|---|
| Also known as | |
| Author(s) | Benedicto Rodriguez-Castro, Hugh Glaser |
| Domain (if applicable) | |
| Submitted by | BenedictoRodriguezCastro, Hugh Glaser |
| Problem description | There are ontology domain concepts that are difficult to represent due to the complexities in their definition and the presence of multiple alternative criteria to classify their abstractions. |
|---|---|
| Solution description | Introduce the following types of classes:
|
| Implementation workflow | |
| Reusable component |
| Problem example |
Matrix representation of Fault in Avizienis et al. [1] used in the ReSIST KB ontology. [1] Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 01(1) (2004) 11--33 |
|---|---|
| Solution example | |
| Consequences |
| Origin | |
|---|---|
| Known use | |
| Reference | |
| Related ODP |
No scenario is added to this Content OP.
This revision (revision ID 5639) takes in account the reviews: none
Other info at evaluation tab