Line 17: | Line 17: | ||
* ''CiClass_xCjClass_y'', ''Ci_Class_xClass_y'': These classes participate in multiple inheritance relationships combining different refinements from the alternative abstraction criteria classes (''C1Class3_C2Class2'' and ''C1_Class1Class2'' in the Figure above). | * ''CiClass_xCjClass_y'', ''Ci_Class_xClass_y'': These classes participate in multiple inheritance relationships combining different refinements from the alternative abstraction criteria classes (''C1Class3_C2Class2'' and ''C1_Class1Class2'' in the Figure above). | ||
− | }} | + | }} |
{{Architectural OP Example Template | {{Architectural OP Example Template | ||
− | |Problem= | + | |Problem= |
+ | {{Include Image | ||
+ | |ImageName=Fig_avizienis_fault_5a.jpg | ||
+ | }} | ||
+ | Matrix representation of Fault in Avizienis et al. [1] used in the ReSIST KB ontology. | ||
+ | |||
+ | [1] Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 01(1) (2004) 11--33 | ||
}} | }} | ||
+ | |||
{{Architectural OP Reference Template}} | {{Architectural OP Reference Template}} | ||
{{Scenarios about me}} | {{Scenarios about me}} | ||
{{Reviews about me}} | {{Reviews about me}} |
Name | View Inheritance |
---|---|
Also known as | |
Author(s) | Benedicto Rodriguez-Castro, Hugh Glaser |
Domain (if applicable) | |
Submitted by | BenedictoRodriguezCastro, Hugh Glaser |
Problem description | There are ontology domain concepts that are difficult to represent due to the complexities in their definition and the presence of multiple alternative criteria to classify their abstractions. |
---|---|
Solution description | Introduce the following types of classes:
|
Implementation workflow | |
Reusable component |
Problem example |
Matrix representation of Fault in Avizienis et al. [1] used in the ReSIST KB ontology. [1] Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 01(1) (2004) 11--33 |
---|---|
Solution example | |
Consequences |
Origin | |
---|---|
Known use | |
Reference | |
Related ODP |
No scenario is added to this Content OP.
This revision (revision ID 5639) takes in account the reviews: none
Other info at evaluation tab