{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:22:52Z","timestamp":1725988972360},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030002435"},{"type":"electronic","value":"9783030002442"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00244-2_12","type":"book-chapter","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T04:12:38Z","timestamp":1535602358000},"page":"181-188","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Predicate Abstraction and Such..."],"prefix":"10.1007","author":[{"given":"Bernhard","family":"Steffen","sequence":"first","affiliation":[]},{"given":"Tiziana","family":"Margaria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,30]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75(2), 87\u2013106 (1987)","journal-title":"Inf. Comput."},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-39910-0_4","volume-title":"Verification: Theory and Practice","author":"S Bensalem","year":"2003","unstructured":"Bensalem, S., Graf, S., Lakhnech, Y.: Abstraction as the key for invariant verification. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol. 2772, pp. 67\u201399. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39910-0_4"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/3-540-45657-0_26","volume-title":"Computer Aided Verification","author":"M Bozga","year":"2002","unstructured":"Bozga, M., Graf, S., Mounier, L.: IF-2.0: a validation environment for component-based real-time systems. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 343\u2013348. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45657-0_26"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BFb0084787","volume-title":"CONCUR 1992","author":"O Burkart","year":"1992","unstructured":"Burkart, O., Steffen, B.: Model checking for context-free processes. In: Cleaveland, W.R. (ed.) CONCUR 1992. LNCS, vol. 630, pp. 123\u2013137. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/BFb0084787"},{"issue":"5","key":"12_CR5","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1145\/876638.876643","volume":"50","author":"EM Clarke","year":"2003","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5), 752\u2013794 (2003)","journal-title":"J. ACM"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Long, D.E., McMillan, K.L.: Compositional model checking. In: Proceedings of Fourth Annual Symposium on Logic in Computer Science (LICS), pp. 353\u2013362 (1989)","DOI":"10.1109\/LICS.1989.39190"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Cleaveland, R., Parrow, J., Steffen, B.: The concurrency workbench: a semantics-based tool for the verification of concurrent systems. ACM Trans. Program. Lang. Syst. 15(1), 36\u201372 (1993). http:\/\/doi.acm.org\/10.1145\/151646.151648","DOI":"10.1145\/151646.151648"},{"key":"12_CR8","unstructured":"Dmitriev, S.: Language oriented programming: the next programming paradigm. JetBrains onBoard Online Mag. 1 (2004). http:\/\/www.onboard.jetbrains.com\/is1\/articles\/04\/10\/lop\/"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/978-3-030-00244-2_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"H Garavel","year":"2018","unstructured":"Garavel, H., Lang, F., Mounier, L.: Compositional verification in action. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 189\u2013210. Springer, Cham (2018)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-030-00244-2_16","volume-title":"Formal Methods for Industrial Critical Systems","author":"L Gelle","year":"2018","unstructured":"Gelle, L., Saidi, H., Gehani, A.: Wholly!: a build system for the modern software stack. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 242\u2013257. Springer, Cham (2018)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-52148-8_23","volume-title":"Automatic Verification Methods for Finite State Systems","author":"S Graf","year":"1990","unstructured":"Graf, S., Richier, J.-L., Rodr\u00edguez, C., Voiron, J.: What are the limits of model checking methods for the verification of real life protocols? In: Sifakis, J. (ed.) CAV 1989. LNCS, vol. 407, pp. 275\u2013285. Springer, Heidelberg (1990). https:\/\/doi.org\/10.1007\/3-540-52148-8_23"},{"key":"12_CR12","series-title":"Embedded Systems","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-1-4614-3879-3_8","volume-title":"Embedded Systems Development","author":"S Graf","year":"2014","unstructured":"Graf, S., Passerone, R., Quinton, S.: Contract-based reasoning for component systems with rich interactions. In: Sangiovanni-Vincentelli, A., Zeng, H., Di Natale, M., Marwedel, P. (eds.) Embedded Systems Development. Embedded Systems, vol. 20, pp. 139\u2013154. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4614-3879-3_8"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-030-00244-2_2","volume-title":"Formal Methods for Industrial Critical Systems","author":"S Graf","year":"2018","unstructured":"Graf, S., Quinton, S., Girault, A., G\u00f6ssler, G.: Building correct cyber-physical systems: why we need a multiview contract theory? In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 19\u201331. Springer, Cham (2018)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/3-540-63166-6_10","volume-title":"Computer Aided Verification","author":"S Graf","year":"1997","unstructured":"Graf, S., Saidi, H.: Construction of abstract state graphs with PVS. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 72\u201383. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-63166-6_10"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-13345-3_20","volume-title":"Automata, Languages and Programming","author":"S Graf","year":"1984","unstructured":"Graf, S., Sifakis, J.: A modal characterization of observational congruence on finite terms of CCS. In: Paredaens, J. (ed.) ICALP 1984. LNCS, vol. 172, pp. 222\u2013234. Springer, Heidelberg (1984). https:\/\/doi.org\/10.1007\/3-540-13345-3_20"},{"issue":"1\u20133","key":"12_CR16","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/S0019-9958(86)80038-9","volume":"68","author":"S Graf","year":"1986","unstructured":"Graf, S., Sifakis, J.: A logic for the description of non-deterministic programs and their properties. Inf. Control 68(1\u20133), 254\u2013270 (1986)","journal-title":"Inf. Control"},{"key":"12_CR17","unstructured":"Graf, S., Steffen, B.: Compositional minimization of finite state systems. In: Proceedings of 2nd International Conference on Computer-Aided Verification (CAV 1990) (1990)"},{"issue":"5","key":"12_CR18","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/BF01211911","volume":"8","author":"S Graf","year":"1996","unstructured":"Graf, S., Steffen, B., L\u00fcttgen, G.: Compositional minimisation of finite state systems using interface specifications. Formal Aspects Comput. 8(5), 607\u2013616 (1996)","journal-title":"Formal Aspects Comput."},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-540-69507-3_24","volume-title":"SOFSEM 2007: Theory and Practice of Computer Science","author":"G G\u00f6ssler","year":"2007","unstructured":"G\u00f6ssler, G., Graf, S., Majster-Cederbaum, M., Martens, M., Sifakis, J.: An approach to modelling and verification of component based systems. In: van Leeuwen, J., Italiano, G.F., van der Hoek, W., Meinel, C., Sack, H., Pl\u00e1\u0161il, F. (eds.) SOFSEM 2007. LNCS, vol. 4362, pp. 295\u2013308. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-69507-3_24"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-10003-2_79","volume-title":"Automata, Languages and Programming","author":"M Hennessy","year":"1980","unstructured":"Hennessy, M., Milner, R.: On observing nondeterminism and concurrency. In: de Bakker, J., van Leeuwen, J. (eds.) ICALP 1980. LNCS, vol. 85, pp. 299\u2013309. Springer, Heidelberg (1980). https:\/\/doi.org\/10.1007\/3-540-10003-2_79"},{"issue":"5","key":"12_CR21","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"GJ Holzmann","year":"1997","unstructured":"Holzmann, G.J.: The model checker SPIN. IEEE Trans. Softw. Eng. 23(5), 279\u2013295 (1997)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-642-18275-4_19","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"F Howar","year":"2011","unstructured":"Howar, F., Steffen, B., Merten, M.: Automata learning with automated alphabet abstraction refinement. In: Jhala, R., Schmidt, D. (eds.) VMCAI 2011. LNCS, vol. 6538, pp. 263\u2013277. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18275-4_19"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-38088-4_9","volume-title":"NASA Formal Methods","author":"M Isberner","year":"2013","unstructured":"Isberner, M., Howar, F., Steffen, B.: Inferring automata with state-local alphabet abstractions. In: Brat, G., Rungta, N., Venet, A. (eds.) NFM 2013. LNCS, vol. 7871, pp. 124\u2013138. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38088-4_9"},{"key":"12_CR24","unstructured":"Jonsson, B.: The quest for optimality in stateless model checking of concurrent programs. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. XI\u2013XII. Springer, Cham (2018)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Karusseit, M., Margaria, T.: Feature-based modelling of a complex, online-reconfigurable decision support service. Electron. Notes Theor. Comput. Sci. 157(2), 101\u2013118 (2006). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1571066106002489","DOI":"10.1016\/j.entcs.2005.12.049"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","first-page":"258","volume-title":"Formal Methods for Industrial Critical Systems","author":"A Legay","year":"2018","unstructured":"Legay, A.: A modeling language for security threats of IoT systems. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 258\u2013268. Springer, Cham (2018)"},{"issue":"1","key":"12_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/BF01384313","volume":"6","author":"C Loiseaux","year":"1995","unstructured":"Loiseaux, C., Graf, S., Sifakis, J., Bouajjani, A., Bensalem, S.: Property preserving abstractions for the verification of concurrent systems. Formal Methods Syst. Des. 6(1), 11\u201344 (1995)","journal-title":"Formal Methods Syst. Des."},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-030-00244-2_14","volume-title":"Formal Methods for Industrial Critical Systems","author":"G L\u00fcttgen","year":"2018","unstructured":"L\u00fcttgen, G.: A note on refinement in hierarchical transition systems. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 211\u2013222. Springer, Cham (2018)"},{"key":"12_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-030-00244-2_1","volume-title":"Formal Methods for Industrial Critical Systems","author":"T Margaria","year":"2018","unstructured":"Margaria, T.: Generative model driven design for agile system design and evolution: a tale of two worlds. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 3\u201318. Springer, Cham (2018)"},{"key":"12_CR30","doi-asserted-by":"publisher","unstructured":"Margaria, T., Steffen, B.: Backtracking-free design planning by automatic synthesis in metaframe. In: Astesiano, E. (ed.) FASE 1998. LNCS, vol. 1382, pp. 188\u2013204. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0053591","DOI":"10.1007\/BFb0053591"},{"key":"12_CR31","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s10009-017-0453-6","volume":"20","author":"S Naujokat","year":"2017","unstructured":"Naujokat, S., Lybecait, M., Kopetzki, D., Steffen, B.: CINCO: a simplicity-driven approach to full generation of domain-specific graphical modeling tools. Softw. Tools Technol. Transf. 20, 327\u2013354 (2017)","journal-title":"Softw. Tools Technol. Transf."},{"issue":"4","key":"12_CR32","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1090\/S0002-9939-1958-0135681-9","volume":"9","author":"A Nerode","year":"1958","unstructured":"Nerode, A.: Linear automaton transformations. Proc. Am. Math. Soc. 9(4), 541\u2013544 (1958)","journal-title":"Proc. Am. Math. Soc."},{"key":"12_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/978-3-030-00244-2_18","volume-title":"Formal Methods for Industrial Critical Systems","author":"I Ober","year":"2018","unstructured":"Ober, I.: Revisiting bounded reachability analysis of timed automata based on MILP. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 269\u2013283. Springer, Cham (2018)"},{"key":"12_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-11494-7_22","volume-title":"International Symposium on Programming","author":"JP Queille","year":"1982","unstructured":"Queille, J.P., Sifakis, J.: Specification and verification of concurrent systems in CESAR. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) Programming 1982. LNCS, vol. 137, pp. 337\u2013351. Springer, Heidelberg (1982). https:\/\/doi.org\/10.1007\/3-540-11494-7_22"},{"key":"12_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1007\/978-3-030-00244-2_19","volume-title":"Formal Methods for Industrial Critical Systems","author":"S Quinton","year":"2018","unstructured":"Quinton, S.: Evaluation and comparison of real-time systems analysis methods and tools. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 284\u2013290. Springer, Cham (2018)"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Quinton, S., Graf, S.: Contract-based verification of hierarchical systems of components. In: Proceedings of the 6th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2008), pp. 377\u2013381. IEEE (2008)","DOI":"10.1109\/SEFM.2008.28"},{"key":"12_CR37","unstructured":"Richier, J.L., Rodriguez, C., Sifakis, J., Voiron, J.: Verification in XESAR of the sliding window protocol. In: Protocol Specification, Testing and Verification VII, Proceedings of the IFIP WG6.1 Seventh International Conference on Protocol Specification, Testing and Verification, Zurich, Switzerland, 5\u20138 May 1987 (1987)"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Roy, V., de Simone, R.: Auto\/Autograph. In: Computer-Aided Verification, Proceedings of a DIMACS Workshop 1990, New Brunswick, New Jersey, USA, 18\u201321 June 1990. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 3, pp. 477\u2013492. DIMACS\/AMS (1990)","DOI":"10.1090\/dimacs\/003\/29"},{"issue":"2\/3","key":"12_CR39","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/BF00121126","volume":"1","author":"V Roy","year":"1992","unstructured":"Roy, V., de Simone, R.: Auto\/Autograph. Formal Methods Syst. Des. 1(2\/3), 239\u2013249 (1992)","journal-title":"Formal Methods Syst. Des."},{"key":"12_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/BFb0035794","volume-title":"Automata, Languages and Programming","author":"B Steffen","year":"1989","unstructured":"Steffen, B.: Characteristic formulae. In: Ausiello, G., Dezani-Ciancaglini, M., Della Rocca, S.R. (eds.) ICALP 1989. LNCS, vol. 372, pp. 723\u2013732. Springer, Heidelberg (1989). https:\/\/doi.org\/10.1007\/BFb0035794"},{"key":"12_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0023444","volume-title":"STACS 97","author":"B Steffen","year":"1997","unstructured":"Steffen, B.: Unifying models. In: Reischuk, R., Morvan, M. (eds.) STACS 1997. LNCS, vol. 1200, pp. 1\u201320. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0023444"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Steffen, B., Gossen, F., Naujokat, S., Margaria, T.: Language-driven engineering: from general-purpose to purpose-specific languages. In: Steffen, B., Woeginger, G. (eds.) Computing and Software Science: State of the Art and Perspectives, LNCS, vol. 10000. Springer (2018)","DOI":"10.1007\/978-3-319-91908-9_17"},{"issue":"1","key":"12_CR43","first-page":"13","volume":"17","author":"B Steffen","year":"1996","unstructured":"Steffen, B., Margaria, T., Cla\u00dfen, A.: Heterogeneous analysis and verification for distributed systems. Softw. Concepts Tools 17(1), 13\u201325 (1996)","journal-title":"Softw. Concepts Tools"},{"key":"12_CR44","unstructured":"Steffen, B., Margaria, T., Freitag, B.: Module Configuration by Minimal Model Construction. Technical report, Fakult\u00e4t f\u00fcr Mathematik und Informatik, Universit\u00e4t Passau (1993)"},{"key":"12_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-030-00244-2_15","volume-title":"Formal Methods for Industrial Critical Systems","author":"B Steffen","year":"2018","unstructured":"Steffen, B., Murtovi, A.: M3C: modal meta model checking. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 223\u2013241. Springer, Cham (2018)"},{"key":"12_CR46","doi-asserted-by":"crossref","unstructured":"Valmari, A.: A stubborn attack on state explosion. In: Computer-Aided Verification, Proceedings of a DIMACS Workshop 1990, New Brunswick, New Jersey, USA, 18\u201321 June 1990. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 3, pp. 25\u201342. DIMACS\/AMS (1990)","DOI":"10.1090\/dimacs\/003\/04"},{"issue":"4","key":"12_CR47","first-page":"147","volume":"15","author":"MP Ward","year":"1994","unstructured":"Ward, M.P.: Language oriented programming. Softw. Concepts Tools 15(4), 147\u2013161 (1994)","journal-title":"Softw. Concepts Tools"},{"key":"12_CR48","unstructured":"Yi, W.: The cause-effect latency problem in real-time systems. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, p. XIII. Springer, Cham (2018)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00244-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T06:02:38Z","timestamp":1571810558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00244-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030002435","9783030002442"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00244-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}