{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:06:25Z","timestamp":1746245185486,"version":"3.40.4"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319064093"},{"type":"electronic","value":"9783319064109"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06410-9_17","type":"book-chapter","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T21:03:01Z","timestamp":1397854981000},"page":"230-246","source":"Crossref","is-referenced-by-count":16,"title":["Contracts in Practice"],"prefix":"10.1007","author":[{"given":"H. -Christian","family":"Estler","sequence":"first","affiliation":[]},{"given":"Carlo A.","family":"Furia","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Nordio","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Piccioni","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"17_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1953122.1953145","volume":"54","author":"M. Barnett","year":"2011","unstructured":"Barnett, M., F\u00e4hndrich, M., Leino, K.R.M., M\u00fcller, P., Schulte, W., Venter, H.: Specification and verification: the Spec# experience. Comm. ACM\u00a054(6), 81\u201391 (2011)","journal-title":"Comm. ACM"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/11916246_5","volume-title":"Fault-Tolerant Systems","author":"P. Chalin","year":"2006","unstructured":"Chalin, P.: Are practitioners writing contracts? In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol.\u00a04157, pp. 100\u2013113. Springer, Heidelberg (2006)"},{"key":"17_CR3","unstructured":"http:\/\/se.inf.ethz.ch\/data\/coat\/"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Dietl, W., Dietzel, S., Ernst, M.D., Muslu, K., Schiller, T.W.: Building and using pluggable type-checkers. In: ICSE, pp. 681\u2013690. ACM (2011)","DOI":"10.1145\/1985793.1985889"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-3-540-70592-5_18","volume-title":"ECOOP 2008 \u2013 Object-Oriented Programming","author":"S. Drossopoulou","year":"2008","unstructured":"Drossopoulou, S., Francalanza, A., M\u00fcller, P., Summers, A.J.: A unified framework for verification techniques for object invariants. In: Vitek, J. (ed.) ECOOP 2008. LNCS, vol.\u00a05142, pp. 412\u2013437. Springer, Heidelberg (2008)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"M.D. Ernst","year":"2007","unstructured":"Ernst, M.D., Perkins, J.H., Guo, P.J., McCamant, S., Pacheco, C., Tschantz, M.S., Xiao, C.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program.\u00a069, 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"key":"17_CR7","unstructured":"Estler, H.C., Furia, C.A., Nordio, M., Piccioni, M., Meyer, B.: Contracts in practice (2013), extended version with appendix http:\/\/arxiv.org\/abs\/1211.4775"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"F\u00e4hndrich, M., Barnett, M., Logozzo, F.: Embedded contract languages. In: SAC, pp. 2103\u20132110. ACM (2010)","DOI":"10.1145\/1774088.1774531"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Fluri, B., W\u00fcrsch, M., Gall, H.: Do code and comments co-evolve? on the relation between source code and comment changes. In: WCRE, pp. 70\u201379. IEEE (2007)","DOI":"10.1109\/WCRE.2007.21"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s00766-009-0074-z","volume":"14","author":"J. Garc\u00eda-Duque","year":"2009","unstructured":"Garc\u00eda-Duque, J., Pazos-Arias, J., L\u00f3pez-Nores, M., Blanco-Fern\u00e1ndez, Y., Fern\u00e1ndez-Vilas, A., D\u00edaz-Redondo, R., Ramos-Cabrer, M., Gil-Solla, A.: Methodologies to evolve formal specifications through refinement and retrenchment in an analysis-revision cycle. Requirements Engineering\u00a014, 129\u2013153 (2009)","journal-title":"Requirements Engineering"},{"issue":"8","key":"17_CR11","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1109\/TSE.2007.70705","volume":"33","author":"J. Henkel","year":"2007","unstructured":"Henkel, J., Reichenbach, C., Diwan, A.: Discovering documentation for Java container classes. IEEE Trans. Software Eng.\u00a033(8), 526\u2013543 (2007)","journal-title":"IEEE Trans. Software Eng."},{"key":"17_CR12","unstructured":"Hindle, A., Bird, C., Zimmermann, T., Nagappan, N.: Relating requirements to implementation via topic analysis. In: ICSM (2012)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kim, M., Cai, D., Kim, S.: An empirical investigation into the role of API-level refactorings during software evolution. In: ICSE, pp. 151\u2013160. ACM (2011)","DOI":"10.1145\/1985793.1985815"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-68237-0_16","volume-title":"FM 2008: Formal Methods","author":"J.R. Kiniry","year":"2008","unstructured":"Kiniry, J.R., Zimmerman, D.M.: Secret ninja formal methods. In: Cuellar, J., Sere, K. (eds.) FM 2008. LNCS, vol.\u00a05014, pp. 214\u2013228. Springer, Heidelberg (2008)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Kudrjavets, G., Nagappan, N., Ball, T.: Assessing the relationship between software assertions and faults: An empirical investigation. In: ISSRE, pp. 204\u2013212 (2006)","DOI":"10.1109\/ISSRE.2006.14"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: JML: A notation for detailed design. In: Behavioral Specifications of Businesses and Systems, pp. 175\u2013188. Kluwer Academic Publishers (1999)","DOI":"10.1007\/978-1-4615-5229-1_12"},{"key":"17_CR17","unstructured":"Martin, J.K., Hirschberg, D.S.: Small sample statistics for classification error rates II. Tech. rep., CS Department, UC Irvine (1996), http:\/\/goo.gl\/Ec8oD"},{"key":"17_CR18","unstructured":"Meyer, B.: Object Oriented Software Construction, 2nd edn. Prentice Hall PTR (1997)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Meyer, B., Kogtenkov, A., Stapf, E.: Avoid a Void: the eradication of null dereferencing. In: Reflections on the Work of C.A.R., pp. 189\u2013211. Springer (2010)","DOI":"10.1007\/978-1-84882-912-1_9"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"M\u00fcller, M.M., Typke, R., Hagner, O.: Two controlled experiments concerning the usefulness of assertions as a means for programming. In: ICSM, pp. 84\u201392 (2002)","DOI":"10.1109\/ICSM.2002.1167755"},{"issue":"12","key":"17_CR21","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"D.L. Parnas","year":"1972","unstructured":"Parnas, D.L.: On the criteria to be used in decomposing systems into modules. Commun. ACM\u00a015(12), 1053\u20131058 (1972)","journal-title":"Commun. ACM"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Parnas, D.L.: Precise documentation: The key to better software. In: The Future of Software Engineering, pp. 125\u2013148. Springer (2011)","DOI":"10.1007\/978-3-642-15187-3_8"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Polikarpova, N., Ciupa, I., Meyer, B.: A comparative study of programmer-written and automatically inferred contracts. In: ISSTA, pp. 93\u2013104 (2009)","DOI":"10.1145\/1572272.1572284"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Polikarpova, N., Furia, C.A., Pei, Y., Wei, Y., Meyer, B.: What good are strong specifications? In: ICSE, pp. 257\u2013266. ACM (2013)","DOI":"10.1109\/ICSE.2013.6606572"},{"key":"17_CR25","series-title":"LNCS","first-page":"505","volume-title":"FM 2014","author":"N. Polikarpova","year":"2014","unstructured":"Polikarpova, N., Tschannen, J., Furia, C.A., Meyer, B.: Flexible invariants through semantic collaboration. In: Jones, C., Pihlajasaari, P., Sun, J. (eds.) FM 2014. LNCS, vol.\u00a08442, pp. 505\u2013520. Springer, Heidelberg (2014)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Pradel, M., Gross, T.R.: Automatic testing of sequential and concurrent substitutability. In: ICSE, pp. 282\u2013291. ACM (2013)","DOI":"10.1109\/ICSE.2013.6606574"},{"key":"17_CR27","unstructured":"Schiller, T.W., Donohue, K., Coward, F., Ernst, M.D.: Writing and enforcing contract specifications. In: ICSE. ACM (2014)"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-39038-8_24","volume-title":"ECOOP 2013 \u2013 Object-Oriented Programming","author":"E. Tempero","year":"2013","unstructured":"Tempero, E., Yang, H.Y., Noble, J.: What programmers do with inheritance in Java. In: Castagna, G. (ed.) ECOOP 2013. LNCS, vol.\u00a07920, pp. 577\u2013601. Springer, Heidelberg (2013)"},{"issue":"3-4","key":"17_CR29","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10515-011-0084-1","volume":"18","author":"A. Wasylkowski","year":"2011","unstructured":"Wasylkowski, A., Zeller, A.: Mining temporal specifications from object usage. Autom. Softw. Eng.\u00a018(3-4), 263\u2013292 (2011)","journal-title":"Autom. Softw. Eng."},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Wei, Y., Furia, C.A., Kazmin, N., Meyer, B.: Inferring better contracts. In: ICSE, pp. 191\u2013200 (2011)","DOI":"10.1145\/1985793.1985820"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal methods: Practice and experience. ACM CSUR\u00a041(4) (2009)","DOI":"10.1145\/1592434.1592436"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Zaidman, A., Van\u00a0Rompaey, B., Demeyer, S., van Deursen, A.: Mining software repositories to study co-evolution of production and test code. In: ICST, pp. 220 \u2013229 (2008)","DOI":"10.1109\/ICST.2008.47"}],"container-title":["Lecture Notes in Computer Science","FM 2014: Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06410-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T12:33:55Z","timestamp":1746189235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06410-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319064093","9783319064109"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06410-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}