{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:50:30Z","timestamp":1725663030702},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540114901"},{"type":"electronic","value":"9783540391760"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1982]]},"DOI":"10.1007\/3-540-11490-4_16","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T12:42:16Z","timestamp":1330173736000},"page":"215-254","source":"Crossref","is-referenced-by-count":1,"title":["Robust data types"],"prefix":"10.1007","author":[{"given":"Flaviu","family":"Cristian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,5,28]]},"reference":[{"unstructured":"J.R. Abrial, \"The Specification Language Z \u2014 Syntax and Semantics\", Programming Research Group, Oxford University (1980).","key":"16_CR1"},{"doi-asserted-by":"crossref","unstructured":"E. Best and F. Cristian, \"Systematic Detection of Exception Occurrences\", Science of Computer Programming Vol. 1(1), North Holland Pub. Co. (1981).","key":"16_CR2","DOI":"10.1016\/0167-6423(81)90007-1"},{"doi-asserted-by":"crossref","unstructured":"D. Bjorner, \"Formalisation of Data Base Models\", pp. 144\u2013215 in Abstract Software Specification, ed. D. Bjorner, Springer Verlag Lecture Notes in Comp. Sc. (1979).","key":"16_CR3","DOI":"10.1007\/3-540-10007-5_37"},{"unstructured":"F. Cristian, \"Le Traitement des Exceptions dans les Programmes Modulaires\", Doctoral Thesis, Univ. of Grenoble (1979).","key":"16_CR4"},{"unstructured":"F. Cristian, \"Exception Handling and Software-Fault Tolerance\", Proc. of the 10th Int. Symp. on Fault Tolerant Computing, Kyoto, pp.97\u2013103 (1980).","key":"16_CR5"},{"unstructured":"E.W. Dijkstra, A Discipline of Programming, Prentice-Hall (1976).","key":"16_CR6"},{"unstructured":"S.L. Gerhart et al., \"An Overview of AFFIRM \u2014 a Specification and Verification System\", Proc. of the IFIP80 Congress, Tokyo (1980).","key":"16_CR7"},{"unstructured":"J.A. Goguen, \"Abstract Errors for Abstract Data Types\", pp. 492\u2013525 in Formal Description of Programming Concepts, ed. E.J. Neuhold, North-Holland (1978).","key":"16_CR8"},{"unstructured":"J.A. Goguen, J.W. Thatcher, and E.G. Wagner, \"An Initial Algebra Approach to the Specification, Correctness and Implementation of Abstract Data Types\", pp. 80\u2013149 in Current Trends in Progr. Methodology, ed. R.T. Yeh, Prentice-Hall (1978).","key":"16_CR9"},{"doi-asserted-by":"crossref","unstructured":"J. Guttag and J.J. Horning, \"Formal Specification As a Design Tool\", Proc. of the 7th ACM Symp. on Principles of Progr. Languages, Las Vegas (1980).","key":"16_CR10","DOI":"10.1145\/567446.567471"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/BF00289507","volume":"1","author":"C. A. R. R. Hoare","year":"1972","unstructured":"C.A.R. Hoare, \"Proof of Correctness of Data Representations\", Acta Informatica Vol. 1(4), pp.271\u2013281 (1972).","journal-title":"Acta Informatica"},{"doi-asserted-by":"crossref","unstructured":"J.J. Horning, H.C. Lauer, P.M. Melliar-Smith, and B. Randell, \"A Program Structure for Error Detection and Recovery\", in Lecture Notes in Comp. Sc., Springer Verlag (1974).","key":"16_CR12","DOI":"10.1007\/BFb0029359"},{"doi-asserted-by":"crossref","unstructured":"J. Ichbiah et al., \"Rationale for the Design of the ADA Programming Language\", SIGPLAN Notices Vol. 14(6) (1979).","key":"16_CR13","DOI":"10.1145\/956653.956654"},{"unstructured":"C.B. Jones, Software Development: A Rigorous Aproach, Prentice-Hall (1980).","key":"16_CR14"},{"issue":"6","key":"16_CR15","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TSE.1979.230191","volume":"SE-5","author":"B. H. Liskov","year":"1979","unstructured":"B.H. Liskov and A. Snyder, \"Exception Handling in CLU\", IEEE Trans. on Softw. Eng. Vol. SE-5(6), pp.546\u2013558 (1979).","journal-title":"IEEE Trans. on Softw. Eng."},{"issue":"2","key":"16_CR16","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/357094.357100","volume":"2","author":"D. C. Luckham","year":"1980","unstructured":"D.C. Luckham and W. Polak, \"ADA Exception Handling: An Axiomatic Approach\", ACM Trans. on Progr. Lang. and Systems Vol. 2(2), pp.225\u2013233 (1980).","journal-title":"ACM Trans. on Progr. Lang. and Systems"},{"key":"16_CR17","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/BF00288541","volume":"14","author":"R. Nakajima","year":"1980","unstructured":"R. Nakajima, M. Honda, and H. Nakahara, \"Hierarchical Program Specification and Verification \u2014 A Many-Sorted Approach\", Acta Informatica Vol. 14, pp.135\u2013155 (1980).","journal-title":"Acta Informatica"},{"issue":"2","key":"16_CR18","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1145\/356725.356729","volume":"10","author":"R. Randell","year":"1978","unstructured":"R. Randell, P.A. Lee, and P.C. Treleaven, \"Reliability Issues in Computing Systems Design\", Computing Surveys Vol. 10(2), pp.123\u2013165 (1978).","journal-title":"Computing Surveys"},{"key":"16_CR19","volume-title":"Denotational Semantics: the Scott-Strachey Approach to Programming Language Theory","author":"J. E. Stoy","year":"1977","unstructured":"J.E. Stoy, Denotational Semantics: the Scott-Strachey Approach to Programming Language Theory, MIT Press, Cambridge (1977)."},{"unstructured":"W.A. Wulf, R.L. London, and M. Shaw, \"Abstraction and Verification in ALPHARD: Introduction to language and Methodology\", Comp. Sc. Dept, Carnegie-Mellon Univ. (1976).","key":"16_CR20"},{"doi-asserted-by":"crossref","unstructured":"S.N. Zilles, \"An Introduction to Data Algebras\", pp. 248\u2013272 in Abstract Software Specifications, ed. D. Bjorner, Springer Verlag, Lect. Notes in Comp. Sc. (1979).","key":"16_CR21","DOI":"10.1007\/3-540-10007-5_39"}],"container-title":["Lecture Notes in Computer Science","Program Specification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-11490-4_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:04:46Z","timestamp":1605625486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-11490-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1982]]},"ISBN":["9783540114901","9783540391760"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-11490-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1982]]}}}