{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:36:57Z","timestamp":1725856617402},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336923"},{"type":"electronic","value":"9783319336930"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33693-0_1","type":"book-chapter","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T05:35:47Z","timestamp":1464068147000},"page":"3-19","source":"Crossref","is-referenced-by-count":9,"title":["Can Formal Methods Improve the Efficiency of Code Reviews?"],"prefix":"10.1007","author":[{"given":"Martin","family":"Hentschel","sequence":"first","affiliation":[]},{"given":"Reiner","family":"H\u00e4hnle","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Bubel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,24]]},"reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1147\/sj.153.0182","volume":"15","author":"ME Fagan","year":"1976","unstructured":"Fagan, M.E.: Design and code inspections to reduce errors in program development. IBM Syst. J. 15(3), 182\u2013211 (1976)","journal-title":"IBM Syst. J."},{"issue":"7","key":"1_CR2","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TSE.1986.6312976","volume":"12","author":"ME Fagan","year":"1986","unstructured":"Fagan, M.E.: Advances in software inspections. IEEE Trans. Softw. Eng. 12(7), 744\u2013751 (1986)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1_CR3","volume-title":"A Discipline for Software Engineering","author":"WS Humphrey","year":"1995","unstructured":"Humphrey, W.S.: A Discipline for Software Engineering. Addison-Wesley Longman Publishing Co., Inc, Boston (1995)"},{"key":"1_CR4","volume-title":"Introduction to the Personal Software Process","author":"WS Humphrey","year":"1997","unstructured":"Humphrey, W.S.: Introduction to the Personal Software Process. Addison-Wesley Longman Publishing Co., Inc, Boston (1997)"},{"issue":"6","key":"1_CR5","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/390016.808445","volume":"10","author":"RS Boyer","year":"1975","unstructured":"Boyer, R.S., Elspas, B., Levitt, K.N.: SELECT\u2013a formal system for testing and debugging programs by symbolic execution. ACM SIGPLAN Not. 10(6), 234\u2013245 (1975)","journal-title":"ACM SIGPLAN Not."},{"key":"1_CR6","unstructured":"Burstall, R.M.: Program proving as hand simulation with a little induction. In: Information Processing 1974. Elsevier\/North-Holland (1974)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Katz, S., Manna, Z.: Towards automatic debugging of programs. In: Proceedings of the International Conference on Reliable Software, pp. 143\u2013155. ACM Press, Los Angeles (1975)","DOI":"10.1145\/800027.808434"},{"issue":"7","key":"1_CR8","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"key":"1_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B.: Experimentation in Software Engineering. Springer, Heidelberg (2012)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/978-3-319-11164-3_21","volume-title":"Runtime Verification","author":"M Hentschel","year":"2014","unstructured":"Hentschel, M., Bubel, R., H\u00e4hnle, R.: Symbolic execution debugger (SED). In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 255\u2013262. Springer, Heidelberg (2014)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Verification of Object-Oriented Software: The KeY Approach","author":"B Beckert","year":"2007","unstructured":"Beckert, B., H\u00e4hnle, R., Schmitt, P.H.: Verification of Object-Oriented Software: The KeY Approach. LNCS, vol. 4334. Springer, Heidelberg (2007)"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-319-09099-3_7","volume-title":"Tests and Proofs","author":"M Hentschel","year":"2014","unstructured":"Hentschel, M., H\u00e4hnle, R., Bubel, R.: Visualizing unbounded symbolic execution. In: Seidl, M., Tillmann, N. (eds.) TAP 2014. LNCS, vol. 8570, pp. 82\u201398. Springer, Heidelberg (2014)"},{"key":"1_CR13","unstructured":"Leavens, G.T., Poll, E., Clifton, C., Cheon, Y., Ruby, C., Cok, D., M\u00fcller, P., Kiniry, J., Chalin, P., Zimmerman, D.M., Dietl, W.: JML Reference Manual. Draft Revision 2344, 31, May 2013"},{"issue":"2","key":"1_CR14","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1002\/spe.4380220205","volume":"22","author":"EP Doolan","year":"1992","unstructured":"Doolan, E.P.: Experience with Fagan\u2019s inspection method. Softw. Pract. Exper. 22(2), 173\u2013182 (1992)","journal-title":"Softw. Pract. Exper."},{"issue":"1","key":"1_CR15","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/52.62929","volume":"8","author":"GW Russell","year":"1991","unstructured":"Russell, G.W.: Experience with inspection in ultralarge-scale development. IEEE Softw. 8(1), 25\u201331 (1991)","journal-title":"IEEE Softw."},{"issue":"3","key":"1_CR16","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1008760911330","volume":"6","author":"F Macdonald","year":"1999","unstructured":"Macdonald, F., Miller, J.: A comparison of computer support systems for software inspection. Autom. Softw. Eng. 6(3), 291\u2013313 (1999)","journal-title":"Autom. Softw. Eng."},{"issue":"1\u20132","key":"1_CR17","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1023\/A:1013112826330","volume":"3","author":"J Miller","year":"2002","unstructured":"Miller, J., Macdonald, F., Ferguson, J.: Assisting management decisions in the software inspection process. Inf. Technol. Manag. 3(1\u20132), 67\u201383 (2002)","journal-title":"Inf. Technol. Manag."},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/11590019_15","volume-title":"Professional Knowledge Management","author":"M Nick","year":"2005","unstructured":"Nick, M., Denger, C., Willrich, T.: Experience-based support for code inspections. In: Althoff, K.-D., Dengel, A.R., Bergmann, R., Nick, M., Roth-Berghofer, T.R. (eds.) WM 2005. LNCS (LNAI), vol. 3782, pp. 121\u2013126. Springer, Heidelberg (2005)"},{"key":"1_CR19","volume-title":"Code Complete","author":"S McConnell","year":"2004","unstructured":"McConnell, S.: Code Complete, 2nd edn. Microsoft Press, Redmond (2004)","edition":"2"},{"key":"1_CR20","volume-title":"Why Programs Fail\u2013A Guide to Systematic Debugging","author":"A Zeller","year":"2006","unstructured":"Zeller, A.: Why Programs Fail\u2013A Guide to Systematic Debugging, 2nd edn. Elsevier, San Francisco (2006)","edition":"2"},{"key":"1_CR21","volume-title":"Effective Java","author":"J Bloch","year":"2008","unstructured":"Bloch, J.: Effective Java, 2nd edn. Prentice Hall, Upper Saddle River (2008)","edition":"2"},{"issue":"1","key":"1_CR22","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1080\/00031305.1989.10475612","volume":"43","author":"M Frigge","year":"1989","unstructured":"Frigge, M., Hoaglin, D.C., Iglewicz, B.: Some implementations of the boxplot. Am. Stat. 43(1), 50\u201354 (1989)","journal-title":"Am. Stat."}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33693-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T02:18:08Z","timestamp":1718590688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33693-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336923","9783319336930"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33693-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}