{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:42:58Z","timestamp":1743111778915,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031156281"},{"type":"electronic","value":"9783031156298"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15629-8_28","type":"book-chapter","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T16:26:53Z","timestamp":1664036813000},"page":"524-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Integration of Testing and Program Verification"],"prefix":"10.1007","author":[{"given":"Petra","family":"van den Bos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4467-072X","authenticated-orcid":false,"given":"Marieke","family":"Huisman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"28_CR1","unstructured":"Aarts, F., Kuppens, H., Tretmans, J., Vaandrager, F., Verwer, S.: Learning and testing the bounded retransmission protocol. In: Heinz, J., Higuera, C., Oates, T. (eds.) Proceedings of the Eleventh International Conference on Grammatical Inference, vol. 21. Proceedings of Machine Learning Research. University of Maryland, College Park, pp. 4\u201318. PMLR (2012). https:\/\/proceedings.mlr.press\/v21\/aarts12a.html"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-030-72013-1_13","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R Abbasi","year":"2021","unstructured":"Abbasi, R., Schiffl, J., Darulova, E., Ulbrich, M., Ahrendt, W.: Deductive verification of floating-point Java programs in KeY. In: TACAS 2021. LNCS, vol. 12652, pp. 242\u2013261. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72013-1_13"},{"key":"28_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49812-6","volume-title":"Deductive Software Verification the KeY Book","author":"W Ahrendt","year":"2016","unstructured":"Ahrendt, W., Beckert, B., Bubel, R., H\u00e4hnle, R., Schmitt, P.H., Ulbrich, M.: Deductive Software Verification the KeY Book, vol. 10001. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49812-6"},{"issue":"1","key":"28_CR4","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s10703-017-0274-y","volume":"51","author":"W Ahrendt","year":"2017","unstructured":"Ahrendt, W., Chimento, J.M., Pace, G.J., Schneider, G.: Verifying data- and control-oriented properties combining static and runtime verification: theory and tools. Formal Methods Syst. Des. 51(1), 200\u2013265 (2017). https:\/\/doi.org\/10.1007\/s10703-017-0274-y","journal-title":"Formal Methods Syst. Des."},{"key":"28_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273","volume-title":"Introduction to Software Testing","author":"P Ammann","year":"2016","unstructured":"Ammann, P., Outt, J.: Introduction to Software Testing. Cambridge University Press, Cambridge (2016)"},{"key":"28_CR6","unstructured":"Baudin, P., et al.: ACSL: ANSI\/ISO C Specification Language, Version 1.14 (2018)"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-66845-1_7","volume-title":"Integrated Formal Methods","author":"S Blom","year":"2017","unstructured":"Blom, S., Darabi, S., Huisman, M., Oortwijn, W.: The VerCors tool set: verification of parallel and concurrent software. In: Polikarpova, N., Schneider, S. (eds.) IFM 2017. LNCS, vol. 10510, pp. 102\u2013110. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66845-1_7"},{"key":"28_CR8","unstructured":"van den Bos, P., Jongmans, S.: VeyMont: parallelising verified programs instead of verifying parallel programs. Manuscript"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-31157-5_5","volume-title":"Tests and Proofs","author":"P van den Bos","year":"2019","unstructured":"van den Bos, P., Tretmans, J.: Coverage-based testing with symbolic transition systems. In: Beyer, D., Keller, C. (eds.) TAP 2019. LNCS, vol. 11823, pp. 64\u201382. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31157-5_5"},{"key":"28_CR10","doi-asserted-by":"publisher","unstructured":"van den Bos, P., Vaandrager, F.W.: State identification for labeled transition systems with inputs and outputs. Sci. Comput. Program. 209, 102678 (2021). https:\/\/doi.org\/10.1016\/j.scico.2021.102678. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S016764232100071X. ISSN 0167-6423","DOI":"10.1016\/j.scico.2021.102678"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b137241","volume-title":"Model-Based Testing of Reactive Systems","year":"2005","unstructured":"Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A. (eds.): Model-Based Testing of Reactive Systems. LNCS, vol. 3472. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/b137241"},{"key":"28_CR12","doi-asserted-by":"publisher","unstructured":"Cok, D.R.: OpenJML: software verification for Java 7 using JML, Open-JDK, and Eclipse. In: Dubois, C., Giannakopoulou, D., M\u00e9ry, D. (eds.) 1st Workshop on Formal Integrated Development Environment (F-IDE). EPTCS, vol. 149, pp. 79\u201392 (2014). https:\/\/doi.org\/10.4204\/EPTCS.149.8. https:\/\/dx.doi.org\/10.4204\/EPTCS.149.8","DOI":"10.4204\/EPTCS.149.8"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-642-20398-5_35","volume-title":"NASA Formal Methods","author":"DR Cok","year":"2011","unstructured":"Cok, D.R.: OpenJML: JML for Java 7 by extending OpenJDK. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 472\u2013479. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_35"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-319-96142-2_7","volume-title":"Computer Aided Verification","author":"J Dohrau","year":"2018","unstructured":"Dohrau, J., Summers, A.J., Urban, C., M\u00fcnger, S., M\u00fcller, P.: Permission inference for array programs. In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10982, pp. 55\u201374. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96142-2_7"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-72308-2_7","volume-title":"Verified Software. Theories, Tools, and Experiments","author":"C Fumex","year":"2017","unstructured":"Fumex, C., March\u00e9, C., Moy, Y.: Automating the verification of floating-point programs. In: Paskevich, A., Wies, T. (eds.) VSTTE 2017. LNCS, vol. 10712, pp. 102\u2013119. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72308-2_7"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1109\/TSE.2015.2431688","volume":"41","author":"J Galeotti","year":"2015","unstructured":"Galeotti, J., Furia, C., May, E., Fraser, G., Zeller, A.: Inferring loop invariants by mutation, dynamic analysis, and static checking. IEEE Trans. Softw. Eng. 41, 1019\u20131037 (2015)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-319-91908-9_18","volume-title":"Computing and Software Science","author":"R H\u00e4hnle","year":"2019","unstructured":"H\u00e4hnle, R., Huisman, M.: Deductive software verification: from pen-and-paper proofs to industrial tools. In: Steffen, B., Woeginger, G. (eds.) Computing and Software Science. LNCS, vol. 10000, pp. 345\u2013373. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-91908-9_18"},{"issue":"10","key":"28_CR18","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C Hoare","year":"1969","unstructured":"Hoare, C.: An axiomatic basis for computer programming. Commun. ACM 12(10), 576\u2013580 (1969). ISSN 0001-0782","journal-title":"Commun. ACM"},{"key":"28_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-19835-9_7","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K Hoder","year":"2011","unstructured":"Hoder, K., Kov\u00e1cs, L., Voronkov, A.: Invariant generation in vampire. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 60\u201364. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19835-9_7"},{"key":"28_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-030-11890-7_22","volume-title":"Information Technology and Systems","author":"T Huertas","year":"2019","unstructured":"Huertas, T., Quesada-L\u00f3pez, C., Mart\u00ednez, A.: Using model-based testing to reduce test automation technical debt: an industrial experience report. In: Rocha, \u00c1., Ferr\u00e1s, C., Paredes, M. (eds.) ICITS 2019. AISC, vol. 918, pp. 220\u2013229. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11890-7_22"},{"issue":"6","key":"28_CR21","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s10009-014-0310-9","volume":"17","author":"B Jacobs","year":"2014","unstructured":"Jacobs, B., Smans, J., Piessens, F.: Solving the VerifyThis 2012 challenges with VeriFast. Int. J. Softw. Tools Technol. Transfer 17(6), 659\u2013676 (2014). https:\/\/doi.org\/10.1007\/s10009-014-0310-9","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"28_CR22","unstructured":"Janota, M.: Assertion-based loop invariant generation. In: 1st International Workshop on Invariant Generation (WING) (2007)"},{"key":"28_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99336-8_19","volume-title":"Programming Languages and Systems","author":"SS Jongmans","year":"2022","unstructured":"Jongmans, S.S., van den Bos, P.: A predicate transformer for choreographies. In: Sergey, I. (ed.) ESOP 2022. LNCS, vol. 13240. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99336-8_19"},{"key":"28_CR24","doi-asserted-by":"publisher","unstructured":"Karlsson, S., \u010cau\u0161evi\u0107, A., Sundmark, D., Larsson, M.: Model-based automated testing of mobile applications: an industrial case study. In: 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 130\u2013137 (2021). https:\/\/doi.org\/10.1109\/ICSTW52544.2021.00033","DOI":"10.1109\/ICSTW52544.2021.00033"},{"key":"28_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-319-47166-2_32","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"N Kosmatov","year":"2016","unstructured":"Kosmatov, N., March\u00e9, C., Moy, Y., Signoles, J.: Static versus dynamic verification in Why3, Frama-C and SPARK 2014. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 461\u2013478. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47166-2_32"},{"issue":"3","key":"28_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127878.1127884","volume":"31","author":"GT Leavens","year":"2006","unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: Preliminary design of JML: a behavioral interface specification language for Java. ACM SIGSOFT Softw. Eng. Notes 31(3), 1\u201338 (2006)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"28_CR27","unstructured":"Leavens, G., et al.: JML reference manual. Department of Computer Science, Iowa State University, February 2007. https:\/\/www.jmlspecs.org"},{"issue":"8","key":"28_CR28","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D Lee","year":"1996","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines-a survey. Proc. IEEE 84(8), 1090\u20131123 (1996). https:\/\/doi.org\/10.1109\/5.533956","journal-title":"Proc. IEEE"},{"key":"28_CR29","doi-asserted-by":"publisher","unstructured":"Mattsen, S., Cuoq, P., Schupp, S.: Driving a sound static software analyzer with branch-and-bound. In: 13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, 22\u201323 September 2013, pp. 63\u201368. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/SCAM.2013.6648185","DOI":"10.1109\/SCAM.2013.6648185"},{"key":"28_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-662-49122-5_2","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"P M\u00fcller","year":"2016","unstructured":"M\u00fcller, P., Schwerhoff, M., Summers, A.J.: Viper: a verification infrastructure for permission-based reasoning. In: Jobstmann, B., Leino, K.R.M. (eds.) VMCAI 2016. LNCS, vol. 9583, pp. 41\u201362. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49122-5_2"},{"key":"28_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-030-45190-5_14","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"W Oortwijn","year":"2020","unstructured":"Oortwijn, W., Huisman, M., Joosten, S.J.C., van de Pol, J.: Automated verification of parallel nested DFS. In: TACAS 2020. LNCS, vol. 12078, pp. 247\u2013265. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45190-5_14"},{"key":"28_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-17601-3_1","volume-title":"Engineering Trustworthy Software Systems","author":"DJ Pearce","year":"2019","unstructured":"Pearce, D.J., Utting, M., Groves, L.: An introduction to software verification with Whiley. In: Bowen, J.P., Liu, Z., Zhang, Z. (eds.) SETSS 2018. LNCS, vol. 11430, pp. 1\u201337. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17601-3_1"},{"key":"28_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-030-85248-1_5","volume-title":"Formal Methods for Industrial Critical Systems","author":"R Rubbens","year":"2021","unstructured":"Rubbens, R., Lathouwers, S., Huisman, M.: Modular transformation of Java exceptions modulo errors. In: Lluch Lafuente, A., Mavridou, A. (eds.) FMICS 2021. LNCS, vol. 12863, pp. 67\u201384. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85248-1_5"},{"key":"28_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-319-21690-4_16","volume-title":"Computer Aided Verification","author":"S de Gouw","year":"2015","unstructured":"de Gouw, S., Rot, J., de Boer, F.S., Bubel, R., H\u00e4hnle, R.: OpenJDK\u2019s Java.utils.Collection.sort() is broken: the good, the bad and the worst case. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 273\u2013289. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21690-4_16"},{"key":"28_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-55754-6_10","volume-title":"NASA Formal Methods","author":"M Safari","year":"2020","unstructured":"Safari, M., Oortwijn, W., Joosten, S., Huisman, M.: Formal verification of parallel prefix sum. In: Lee, R., Jha, S., Mavridou, A., Giannakopoulou, D. (eds.) NFM 2020. LNCS, vol. 12229, pp. 170\u2013186. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55754-6_10"},{"key":"28_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-030-99527-0_18","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"\u00d6 \u015fakar","year":"2022","unstructured":"\u015fakar, \u00d6., Safari, M., Huisman, M., Wijs, A.: Alpinist: an annotation-aware GPU program optimizer. In: Fisman, D., Rosu, G. (eds.) TACAS 2022. LNCS, vol. 13244, pp. 332\u2013352. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99527-0_18"},{"key":"28_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/978-3-642-22110-1_57","volume-title":"Computer Aided Verification","author":"R Sharma","year":"2011","unstructured":"Sharma, R., Dillig, I., Dillig, T., Aiken, A.: Simplifying loop invariant generation using splitter predicates. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 703\u2013719. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_57"},{"key":"28_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-78917-8_1","volume-title":"Formal Methods and Testing","author":"J Tretmans","year":"2008","unstructured":"Tretmans, J.: Model based testing with labelled transition systems. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) Formal Methods and Testing. LNCS, vol. 4949, pp. 1\u201338. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78917-8_1"},{"key":"28_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-68270-9_5","volume-title":"ModelEd, TestEd, TrustEd","author":"J Tretmans","year":"2017","unstructured":"Tretmans, J.: On the existence of practical testers. In: Katoen, J.-P., Langerak, R., Rensink, A. (eds.) ModelEd, TestEd, TrustEd. LNCS, vol. 10500, pp. 87\u2013106. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68270-9_5"},{"key":"28_CR40","first-page":"61","volume":"1","author":"RG de Vries","year":"2001","unstructured":"de Vries, R.G., Tretmans, J.: Towards formal test purposes. Formal Approaches Test. Softw. FATES 1, 61\u201376 (2001)","journal-title":"Formal Approaches Test. Softw. FATES"},{"key":"28_CR41","doi-asserted-by":"publisher","unstructured":"Zafar, M.N., Afzal, W., Enoiu, E., Stratis, A., Arrieta, A., Sagardui, G.: Model-based testing in practice: an industrial case study using graphwalker. In: 14th Innovations in Software Engineering Conference (Formerly Known as India Software Engineering Conference), ISEC 2021, Bhubaneswar, Odisha, India. Association for Computing Machinery (2021). https:\/\/doi.org\/10.1145\/3452383.3452388. ISBN 9781450390460","DOI":"10.1145\/3452383.3452388"},{"key":"28_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-18070-5_13","volume-title":"Formal Verification of Object-Oriented Software","author":"DM Zimmerman","year":"2011","unstructured":"Zimmerman, D.M., Nagmoti, R.: JMLUnit: the next generation. In: Beckert, B., March\u00e9, C. (eds.) FoVeOOS 2010. LNCS, vol. 6528, pp. 183\u2013197. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18070-5_13"}],"container-title":["Lecture Notes in Computer Science","A Journey from Process Algebra via Timed Automata to Model Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15629-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T16:32:13Z","timestamp":1664037133000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15629-8_28"}},"subtitle":["A Position Paper"],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031156281","9783031156298"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15629-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}