{"id":483,"date":"2024-12-09T15:22:20","date_gmt":"2024-12-09T18:22:20","guid":{"rendered":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/?p=483"},"modified":"2024-12-09T15:23:06","modified_gmt":"2024-12-09T18:23:06","slug":"reflexiones-sobre-la-ensenanza-de-confiabilidad-y-seguridad-del-software-en-bioingenieria-con-programacion-basada-en-contratos","status":"publish","type":"post","link":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/2024\/12\/09\/reflexiones-sobre-la-ensenanza-de-confiabilidad-y-seguridad-del-software-en-bioingenieria-con-programacion-basada-en-contratos\/","title":{"rendered":"Reflexiones sobre la Ense\u00f1anza de Confiabilidad y Seguridad del Software en Bioingenier\u00eda con Programaci\u00f3n Basada en Contratos"},"content":{"rendered":"\n<h4 class=\"wp-block-heading has-ast-global-color-8-color has-text-color has-link-color wp-elements-c691047b9104e143d44f18bdb00e2c2e\">Abstract<\/h4>\n\n\n\n<p>Este trabajo examina c\u00f3mo la metodolog\u00eda de programaci\u00f3n basada en contratos puede mejorar la ense\u00f1anza de las caracter\u00edsticas de confiabilidad y seguridad del software en bioingenier\u00eda. A trav\u00e9s de ejemplos, se explora c\u00f3mo esta puede transformar la experiencia did\u00e1ctica del dise\u00f1o y desarrollo de software biom\u00e9dico cr\u00edtico. Desde una mirada docente, se analiza c\u00f3mo la especificaci\u00f3n de contratos podr\u00eda influir en la construcci\u00f3n de software robusto. Los casos expuestos permiten reflexionar sobre los posibles desaf\u00edos y oportunidades al aplicar esta metodolog\u00eda en la ense\u00f1anza del dise\u00f1o de software para dispositivos biom\u00e9dicos. Adem\u00e1s, se muestra c\u00f3mo la programaci\u00f3n basada en contratos podr\u00eda aportar a mejorar el desarrollo de software biom\u00e9dico al expresar los requerimientos como parte del c\u00f3digo fuente y posibles estrategias de incorporaci\u00f3n a la ense\u00f1anza de programaci\u00f3n en el \u00e1rea. En efecto, al establecer condiciones precisas para las entradas y salidas de funciones cr\u00edticas, fortalece la comprensi\u00f3n de la relaci\u00f3n entre el software y su entorno m\u00e9dico, resaltando el potencial de la metodolog\u00eda de programaci\u00f3n basada en contratos para mejorar la confiabilidad y seguridad del software en bioingenier\u00eda. Aunque los ejemplos analizados no buscan aplicaciones pr\u00e1cticas concretas y reales, act\u00faan como lentes para explorar conceptos fundamentales. Estas reflexiones buscan iniciar un di\u00e1logo sobre c\u00f3mo se podr\u00eda incorporar la programaci\u00f3n basada en contratos en la formaci\u00f3n de futuros profesionales en bioingenier\u00eda, centrando la atenci\u00f3n en c\u00f3mo esta metodolog\u00eda puede transformar la construcci\u00f3n de software en el \u00e1mbito biom\u00e9dico. Palabras claves: Programaci\u00f3n por contratos, sistemas cr\u00edticos, bioingenier\u00eda.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.researchgate.net\/publication\/383823284_Reflexiones_sobre_la_Ensenanza_de_Confiabilidad_y_Seguridad_del_Software_en_Bioingenieria_con_Programacion_Basada_en_Contratos\">Ver Publicaci\u00f3n<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract Este trabajo examina c\u00f3mo la metodolog\u00eda de programaci\u00f3n basada en contratos puede mejorar la ense\u00f1anza de las caracter\u00edsticas de confiabilidad y seguridad del software en bioingenier\u00eda. A trav\u00e9s de ejemplos, se explora c\u00f3mo esta puede transformar la experiencia did\u00e1ctica del dise\u00f1o y desarrollo de software biom\u00e9dico cr\u00edtico. Desde una mirada docente, se analiza c\u00f3mo [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[],"class_list":["post-483","post","type-post","status-publish","format-standard","hentry","category-publicaciones"],"_links":{"self":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":2,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/483\/revisions"}],"predecessor-version":[{"id":485,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/483\/revisions\/485"}],"wp:attachment":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/media?parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/categories?post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/tags?post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}