{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T11:48:17Z","timestamp":1711972097062},"reference-count":25,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":7303,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1986,11]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The effectiveness of set theoretic concepts for the purpose of software specification is becoming more and more widely recognized. This paper presents an integrated relational methodology for software specification, and shows its effectivness when applied to a practical example.<\/jats:p>","DOI":"10.1002\/spe.4380161105","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T01:48:43Z","timestamp":1163814523000},"page":"1003-1030","source":"Crossref","is-referenced-by-count":13,"title":["Specification methodology: An integrated relational approach"],"prefix":"10.1002","volume":"16","author":[{"given":"Ali","family":"Mili","sequence":"first","affiliation":[]},{"given":"Wang","family":"Xiao\u2010Yang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Qing","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","volume-title":"On the Construction of Programs","author":"Abrial J\u2010R.","year":"1980"},{"key":"e_1_2_1_3_2","volume-title":"The Specification Language Z: Syntax and Semantics","author":"Abrial J\u2010R.","year":"1980"},{"key":"e_1_2_1_4_2","unstructured":"R. G. Babb and A. Mili (eds) Workshop Notes: International Workshop on Models and Languages for Software Specification and Design Orlando FL 1984. Research Report Department of Informatics Laval University Quebec City Canada."},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1080\/01969727408546056"},{"key":"e_1_2_1_6_2","volume-title":"Structured Programming: Theory and Practice","author":"Linger R. C.","year":"1979"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.229776"},{"issue":"4","key":"e_1_2_1_8_2","first-page":"2","article-title":"On oversights in specifications","volume":"2","author":"Meyer B.","year":"1985","journal-title":"IEEE Software"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/360569.360659"},{"key":"e_1_2_1_10_2","doi-asserted-by":"crossref","unstructured":"H. D.Mills V. R.Basili J. D.Gannon R. G.Hamlet Principles of Computer Programming: A Mathematical Approach Allyn and Bacon Boston 1987.","DOI":"10.1145\/322917.322972"},{"key":"e_1_2_1_11_2","volume-title":"An Introduction to Formal Program Verification","author":"Mili A.","year":"1985"},{"key":"e_1_2_1_12_2","unstructured":"A.Mili \u2018Une approche relationnelle \u00e0 la programmation\u2019 Dissertation of Doctoral d'Etat \u00e8s\u2010Sciences University of Grenoble (France) October1985."},{"key":"e_1_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/358161.358168"},{"key":"e_1_2_1_14_2","volume-title":"Lecture Notes in Computer Science","author":"Sanderson G.","year":"1980"},{"key":"e_1_2_1_15_2","volume-title":"Lecture Notes in Computer Science","author":"Sufrin B.","year":"1981"},{"key":"e_1_2_1_16_2","volume-title":"Axiomatic Set Theory","author":"Suppes P.","year":"1972"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.2307\/2268577"},{"key":"e_1_2_1_18_2","volume-title":"Mathematical Theory of Computation","author":"Manna Z.","year":"1974"},{"key":"e_1_2_1_19_2","volume-title":"The Foundations of Program Verification","author":"Loeckx J.","year":"1985"},{"key":"e_1_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.230467"},{"key":"e_1_2_1_21_2","doi-asserted-by":"crossref","unstructured":"R. S.Boyer B.ElspasandK. N.Levitt \u2018SELECT\u2014a formal system for testing and debugging programs by symbolic execution\u2019 Proceedings First Int. Con. on Reliable Software Los Angeles 1975.","DOI":"10.1145\/800027.808445"},{"key":"e_1_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231144"},{"key":"e_1_2_1_23_2","unstructured":"V. R.BasiliandR. W.Selby Comparing the Effectiveness of Software Testing Strategies University of Maryland 1985."},{"key":"e_1_2_1_24_2","volume-title":"Current Trends in Programming Methodology","author":"Goodenough J. B.","year":"1977"},{"key":"e_1_2_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/359588.359602"},{"key":"e_1_2_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01946816"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380161105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380161105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T14:51:17Z","timestamp":1697813477000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380161105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1986,11]]},"references-count":25,"journal-issue":{"issue":"11","published-print":{"date-parts":[[1986,11]]}},"alternative-id":["10.1002\/spe.4380161105"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380161105","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1986,11]]}}}