{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:42:30Z","timestamp":1773247350800,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030582975","type":"print"},{"value":"9783030582982","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58298-2_1","type":"book-chapter","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T18:04:52Z","timestamp":1598637892000},"page":"3-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["The 2020 Expert Survey on Formal Methods"],"prefix":"10.1007","author":[{"given":"Hubert","family":"Garavel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2930-6367","authenticated-orcid":false,"given":"Maurice H.","family":"ter Beek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4305-0625","authenticated-orcid":false,"given":"Jaco","family":"van de Pol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,29]]},"reference":[{"key":"1_CR1","unstructured":"AbsInt: Astr\u00e9e software (2020). http:\/\/www.absint.com\/astree"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-17502-3_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E Bartocci","year":"2019","unstructured":"Bartocci, E., et al.: TOOLympics 2019: an overview of competitions in formal methods. In: Beyer, D., Huisman, M., Kordon, F., Steffen, B. (eds.) TACAS 2019. LNCS, vol. 11429, pp. 3\u201324. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17502-3_1"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-98938-9_2","volume-title":"Integrated Formal Methods","author":"D Basile","year":"2018","unstructured":"Basile, D., et al.: On the industrial uptake of formal methods in the railway domain: a survey with stakeholders. In: Furia, C.A., Winter, K. (eds.) IFM 2018. LNCS, vol. 11023, pp. 20\u201329. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98938-9_2"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1007\/978-3-030-30942-8_46","volume-title":"Formal Methods \u2013 The Next 30 Years","author":"MH ter Beek","year":"2019","unstructured":"ter Beek, M.H., et al.: Adopting formal methods in an industrial setting: the railways case. In: ter Beek, M.H., McIver, A., Oliveira, J.N. (eds.) FM 2019. LNCS, vol. 11800, pp. 762\u2013772. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30942-8_46"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-06410-9_4","volume-title":"FM 2014: Formal Methods","author":"D Bj\u00f8rner","year":"2014","unstructured":"Bj\u00f8rner, D., Havelund, K.: 40 years of formal methods: some obstacles and some possibilities? In: Jones, C., Pihlajasaari, P., Sun, J. (eds.) FM 2014. LNCS, vol. 8442, pp. 42\u201361. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06410-9_4"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/2.375178","volume":"28","author":"JP Bowen","year":"1995","unstructured":"Bowen, J.P., Hinchey, M.G.: Ten commandments of formal methods. IEEE Comput. 28(4), 56\u201363 (1995). https:\/\/doi.org\/10.1109\/2.375178","journal-title":"IEEE Comput."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Cerone, A., et al.: Rooting formal methods within higher education curricula for computer science and software engineering: a white paper. In: Cerone, A., Roggenbach, M. (eds.) FMFun 2019. CCIS, vol. 1301. Springer (2020)","DOI":"10.1007\/978-3-030-71374-4_1"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/242223.242257","volume":"28","author":"EM Clarke","year":"1996","unstructured":"Clarke, E.M., Wing, J.M.: Formal methods: state of the art and future directions. ACM Comput. Surv. 28(4), 626\u2013643 (1996). https:\/\/doi.org\/10.1145\/242223.242257","journal-title":"ACM Comput. Surv."},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-41010-9_5","volume-title":"Formal Methods for Industrial Critical Systems","author":"JA Davis","year":"2013","unstructured":"Davis, J.A., et al.: Study on the barriers to the industrial adoption of formal methods. In: Pecheur, C., Dierkes, M. (eds.) FMICS 2013. LNCS, vol. 8187, pp. 63\u201377. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41010-9_5"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Ferrari, A., Mazzanti, F., Basile, D., ter Beek, M.H., Fantechi, A.: Comparing formal tools for system design: a judgment study. In: Proceedings of the 42nd International Conference on Software Engineering (ICSE), pp. 62\u201374. ACM (2020). https:\/\/doi.org\/10.1145\/3377811.3380373","DOI":"10.1145\/3377811.3380373"},{"key":"1_CR11","unstructured":"Garavel, H., Graf, S.: Formal methods for safe and secure computer systems. BSI Study 875, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2013). https:\/\/www.bsi.bund.de\/DE\/Publikationen\/Studien\/Formal_Methods_Study_875\/study_875.html"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-030-22348-9_12","volume-title":"Models, Mindsets, Meta: The What, the How, and the Why Not?","author":"H Garavel","year":"2019","unstructured":"Garavel, H., Mateescu, R.: Reflections on Bernhard Steffen\u2019s physics of software tools. In: Margaria, T., Graf, S., Larsen, K.G. (eds.) Models, Mindsets, Meta: The What, the How, and the Why Not?. LNCS, vol. 11200, pp. 186\u2013207. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22348-9_12"},{"key":"1_CR13","unstructured":"Gates, B.: Trustworthy computing, January 2002. https:\/\/www.wired.com\/2002\/01\/bill-gates-trustworthy-computing. e-mail memo to Microsoft employees"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Gnesi, S., Margaria, T. (eds.): Formal Methods for Industrial Critical Systems: A Survey of Applications. Wiley (2013). https:\/\/doi.org\/10.1002\/9781118459898","DOI":"10.1002\/9781118459898"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/52.57887","volume":"7","author":"A Hall","year":"1990","unstructured":"Hall, A.: Seven myths of formal methods. IEEE Softw. 7(5), 11\u201319 (1990). https:\/\/doi.org\/10.1109\/52.57887","journal-title":"IEEE Softw."},{"key":"1_CR16","unstructured":"Huisman, M., Gurov, D., Malkis, A.: Formal methods: from academia to industrial practice. A travel guide. CoRR abs\/2002.07279 (2020). https:\/\/arxiv.org\/abs\/2002.07279"},{"key":"1_CR17","unstructured":"Jones, C.B., Thomas, M.: The development and deployment of formal methods in the UK. CoRR abs\/2006.06327 (2020). https:\/\/arxiv.org\/abs\/2006.06327. Submitted to IEEE Ann. Hist. Comput."},{"key":"1_CR18","unstructured":"Miller, S.P.: Lessons from twenty years of industrial formal methods. In: Proceedings of the 20th High Confidence Software and Systems Conference (HCSS 2012) (2012). http:\/\/cps-vo.org\/node\/3434"},{"key":"1_CR19","unstructured":"Rushby, J.: Formal methods and the certification of critical systems. Technical report SRI-CSL-93-7, Computer Science Laboratory, SRI International, December 1993. http:\/\/www.csl.sri.com\/papers\/csl-93-7\/. Also issued under the title \u201cFormal Methods and Digital Systems Validation for Airborne Systems\u201d as NASA Contractor Report 4551, December 1993"},{"issue":"1","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10009-016-0446-x","volume":"19","author":"B Steffen","year":"2017","unstructured":"Steffen, B.: The physics of software tools: SWOT analysis and vision. Int. J. Softw. Tools Technol. Transfer. 19(1), 1\u20137 (2017). https:\/\/doi.org\/10.1007\/s10009-016-0446-x","journal-title":"Int. J. Softw. Tools Technol. Transfer."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Wilhelm, R.: Real time spent on real time. Commun. ACM (2020, to appear)","DOI":"10.1109\/RTSS49844.2020.00011"},{"issue":"9","key":"1_CR22","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/2.58215","volume":"23","author":"JM Wing","year":"1990","unstructured":"Wing, J.M.: A specifier\u2019s introduction to formal methods. IEEE Comput. 23(9), 8\u201322 (1990). https:\/\/doi.org\/10.1109\/2.58215","journal-title":"IEEE Comput."},{"issue":"4","key":"1_CR23","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/1592434.1592436","volume":"41","author":"J Woodcock","year":"2009","unstructured":"Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal methods: practice and experience. ACM Comput. Surv. 41(4), 19:1\u201319:36 (2009). https:\/\/doi.org\/10.1145\/1592434.1592436","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"1_CR24","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/3226588","volume":"62","author":"P Zave","year":"2019","unstructured":"Zave, P., Rexford, J.: The compositional architecture of the Internet. Commun. ACM 62(3), 78\u201387 (2019). https:\/\/doi.org\/10.1145\/3226588","journal-title":"Commun. ACM"}],"updated-by":[{"DOI":"10.1007\/978-3-030-58298-2_14","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T00:00:00Z","timestamp":1707523200000}}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58298-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T06:02:35Z","timestamp":1707458555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58298-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582975","9783030582982"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58298-2_1","relation":{"correction":[{"id-type":"doi","id":"10.1007\/978-3-030-58298-2_14","asserted-by":"object"}]},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"10 February 2024","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FMICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Methods for Industrial Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fmics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fmics20.ait.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}