{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:22:31Z","timestamp":1743042151061,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319121536"},{"type":"electronic","value":"9783319121543"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12154-3_5","type":"book-chapter","created":{"date-parts":[[2014,10,13]],"date-time":"2014-10-13T08:20:23Z","timestamp":1413188423000},"page":"72-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Verification Condition Visualizer"],"prefix":"10.1007","author":[{"given":"Madiha","family":"Jami","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Ireland","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,14]]},"reference":[{"key":"5_CR1","volume-title":"High Integrity Software: The SPARK Approach to Safety and Security","author":"J Barnes","year":"2003","unstructured":"Barnes, J.: High Integrity Software: The SPARK Approach to Safety and Security. Addison-Wesley, Reading (2003)"},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/2363.2366","volume":"7","author":"J-F Bergeretti","year":"1985","unstructured":"Bergeretti, J.-F., Carr\u00e9, B.A.: Information-flow and data-flow analysis of while-programs. ACM Trans. Program. Lang. Syst. (TOPLAS) 7(1), 37\u201361 (1985)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"5_CR3","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press, Cambridge (2009)","edition":"3"},{"key":"5_CR4","series-title":"International Series in Computer Science","volume-title":"Programming Language Theory and its Implementation","author":"MJ Gordon","year":"1988","unstructured":"Gordon, M.J.: Programming Language Theory and its Implementation. International Series in Computer Science. Prentice-Hall, Upper Saddle River (1988)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-642-24690-6_28","volume-title":"Software Engineering and Formal Methods","author":"C Le Goues","year":"2011","unstructured":"Le Goues, C., Leino, K.R.M., Moskal, M.: The boogie verification debugger (Tool Paper). In: Barthe, G., Pardo, A., Schneider, G. (eds.) SEFM 2011. LNCS, vol. 7041, pp. 407\u2013414. Springer, Heidelberg (2011)"},{"key":"5_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5983-1","volume-title":"The Science of Programming","author":"D Gries","year":"1981","unstructured":"Gries, D.: The Science of Programming. Springer, New York (1981)"},{"key":"5_CR7","series-title":"Sun Microsystems Press Java series","volume-title":"Java 2D API graphics","author":"VJ Hardy","year":"2000","unstructured":"Hardy, V.J.: Java 2D API graphics. Sun Microsystems Press Java series. Sun Microsystems Press, Palo Alto (2000)"},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/362452.362489","volume":"14","author":"CAR Hoare","year":"1971","unstructured":"Hoare, C.A.R.: Proof of a program: find. CACM 14(1), 39\u201345 (1971)","journal-title":"CACM"},{"issue":"4","key":"5_CR9","first-page":"1","volume":"41","author":"CAR Hoare","year":"2009","unstructured":"Hoare, C.A.R., Misra, J., Leavens, G.T., Shankar, N.: The verified software initiative: a manifesto. ACM Comput. Surv. 41(4), 1\u20138 (2009)","journal-title":"ACM Comput. Surv."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Maclean, E., Ireland, A., Grov, G.; The core system: animation and functional correctness of pointer programs. In: Proceedings of the 16th IEEE Conference on Automated Software Engineering (ASE 2011): Tool Demonstration Paper, Lawrence, Kansas. IEEE (2011)","DOI":"10.1109\/ASE.2011.6100132"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44802-0_1","volume-title":"Computer Science Logic","author":"PW O\u2019Hearn","year":"2001","unstructured":"O\u2019Hearn, P.W., Reynolds, J.C., Yang, H.: Local reasoning about programs that alter data structures. In: Fribourg, L. (ed.) CSL 2001. LNCS, vol. 2142, pp. 1\u201319. Springer, Heidelberg (2001)"},{"key":"5_CR12","volume-title":"The Craft of Programming","author":"JC Reynolds","year":"1981","unstructured":"Reynolds, J.C.: The Craft of Programming. Prentice-Hall, Englewood Cliffs (1981)"},{"key":"5_CR13","volume-title":"Algorithms + Data Structures = Programs","author":"N Wirth","year":"1976","unstructured":"Wirth, N.: Algorithms + Data Structures = Programs. Prentice-Hall, Engelwood Cliffs (1976)"}],"container-title":["Lecture Notes in Computer Science","Verified Software: Theories, Tools and Experiments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12154-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T02:47:11Z","timestamp":1674269231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12154-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319121536","9783319121543"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12154-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"14 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}