{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:36:33Z","timestamp":1725856593628},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319390826"},{"type":"electronic","value":"9783319390833"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39083-3_8","type":"book-chapter","created":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T04:46:57Z","timestamp":1464583617000},"page":"113-128","source":"Crossref","is-referenced-by-count":1,"title":["Lessons Learned in a Journey Toward Correct-by-Construction Model-Based Development"],"prefix":"10.1007","author":[{"given":"Laura","family":"Baracchi","sequence":"first","affiliation":[]},{"given":"Silvia","family":"Mazzini","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Puri","sequence":"additional","affiliation":[]},{"given":"Tullio","family":"Vardanega","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,31]]},"reference":[{"key":"8_CR1","unstructured":"Amey, P.: Correctness by Construction, Praxis High Integrity Systems Ltd., 05 December 2006. https:\/\/buildsecurityin.us-cert.gov\/articles\/knowledge\/sdlc-process\/correctness-by-construction . Accessed 22 Jan 2016"},{"key":"8_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-27919-5","volume-title":"The Correctness-by-Construction Approach to Programming","author":"DG Kourie","year":"2012","unstructured":"Kourie, D.G., Watson, B.W.: The Correctness-by-Construction Approach to Programming. Springer, Heidelberg (2012)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/11516798_13","volume-title":"Principles of Distributed Systems","author":"J Sifakis","year":"2005","unstructured":"Sifakis, J.: Embedded systems - challenges and work directions. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol. 3544, pp. 184\u2013185. Springer, Heidelberg (2005)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/978-3-540-73230-3_9","volume-title":"Reliable Software Technologies - Ada-Europe 2007","author":"M Bordin","year":"2007","unstructured":"Bordin, M., Vardanega, T.: Correctness by construction for high-integrity real-time systems: a metamodel-driven approach. In: Abdennadher, N., Kordon, F. (eds.) Ada-Europe 2007. LNCS, vol. 4498, pp. 114\u2013127. Springer, Heidelberg (2007)"},{"key":"8_CR5","unstructured":"Cancila, D., Passerone, R., Vardanega, T.: Composability for high-integrity real-time embedded systems. In. Proceedings of the First Workshop on Compositional Theory and Technology for Real-Time Embedded Systems (CRTS 2008), Barcelona, Spain. ACM\/IEEE, 30 November 2008"},{"key":"8_CR6","unstructured":"Mazzini S., Puri S., Veran G., Vardanega T., Panunzio M., Santamaria C., Zovi A.: Model-driven and component-based engineering with the CHESS methodology. In: Proceedings of DASIA Conference, Malta, May 2011"},{"key":"8_CR7","volume-title":"Industry and Research Perspectives on Embedded System Design","author":"L Baracchi","year":"2014","unstructured":"Baracchi, L., Cimatti, A., Garcia, G., Mazzini, S., Puri, S., Tonetta, S.: Requirements refinement and component reuse: the FoReVer contract-based approach. In: Bagnato, A., Quadri, I.R., Rossi, M., Indrusiak, L.S. (eds.) Industry and Research Perspectives on Embedded System Design. IGI Global, Hershey (2014)"},{"key":"8_CR8","unstructured":"Benveniste, A., Caillaud, B., Nickovic, D., Passerone, R., Raclet, J.B., Reinkemeier, P., Sangiovanni-Vincentelli, A., Damm, W., Henzinger, T., Larsen, K.: Contracts for Systems Design"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Chapman, R.: Correctness by construction: a manifesto for high integrity software. In: Proceedings of the 10th Australian Workshop on Safety Critical Systems and Software, vol. 55, Sydney, Australia","DOI":"10.1145\/1315580.1315605"},{"key":"8_CR10","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jss.2014.05.076","volume":"96","author":"M Panunzio","year":"2014","unstructured":"Panunzio, M., Vardanega, T.: A component-based process with separation of concerns for the development of embedded real-time software systems. J. Syst. Softw. 96, 105\u2013121 (2014)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"8_CR11","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MC.2006.58","volume":"39","author":"D Schmidt","year":"2006","unstructured":"Schmidt, D.: Guest editor\u2019s introduction: model-driven engineering. Computer 39(2), 25\u201331 (2006)","journal-title":"Computer"},{"key":"8_CR12","series-title":"Texts and Monographs in Computer Science","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-1-4612-5695-3_12","volume-title":"Selected Writings on Computing: A personal Perspective","author":"E Dijkstra","year":"1982","unstructured":"Dijkstra, E.: On the role of scientific thought. In: Dijkstra, E. (ed.) Selected Writings on Computing: A personal Perspective. Texts and Monographs in Computer Science, pp. 60\u201366. Springer, New York (1982)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-30598-6_1","volume-title":"Reliable Software Technologies \u2013 Ada-Europe 2012","author":"M Panunzio","year":"2012","unstructured":"Panunzio, M., Vardanega, T.: Ada ravenscar code archetypes for component-based development. In: Brorsson, M., Pinho, L.M. (eds.) Ada-Europe 2012. LNCS, vol. 7308, pp. 1\u201317. Springer, Heidelberg (2012)"},{"key":"8_CR14","unstructured":"The Object Management Group: UML Profile for MARTE: Modeling and analysis of real-time embedded systems (2011). http:\/\/www.omg.org\/spec\/MARTE\/1.1\/ . Accessed 22 Jan 2016"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Estivill-Castro, V., Hexel R.: Correctness by construction with logic-labeled finite-state machines \u2013 comparison with event-B. In: 2014 23rd Australian Software Engineering Conference (ASWEC), pp. 38\u201347, 7\u201310 April 2014","DOI":"10.1109\/ASWEC.2014.20"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-540-70930-5_4","volume-title":"Model-Driven Development of Reliable Automotive Services","author":"M Anand","year":"2008","unstructured":"Anand, M., Fischmeister, S., Kim, J., Lee, I.: Generating sound and resource-aware code from hybrid systems models. In: Broy, M., Kr\u00fcger, I.H., Meisinger, M. (eds.) ASWSD 2006. LNCS, vol. 4922, pp. 48\u201366. Springer, Heidelberg (2008)"},{"key":"8_CR17","unstructured":"CONCERTO Project: Guaranteed component assembly with round trip analysis for energy efficient high-integrity multi-core systems. Artemis Call 2012 333053. http:\/\/www.concerto-project.org\/ . Accessed 22 Jan 2016"},{"key":"8_CR18","unstructured":"CHESS Project: Composition with guarantees for high-integrity embedded software components assembly. http:\/\/www.chess-project.org\/ . Accessed 5 May 2015"},{"key":"8_CR19","unstructured":"SafeCer Project: Safety certification of software-intensive systems with reusable components. http:\/\/safecer.eu\/ . Accessed 22 Jan 2016"},{"key":"8_CR20","unstructured":"OCRA: A command-line tool for the verification of logic-based contract refinement for embedded systems. https:\/\/es-static.fbk.eu\/tools\/ocra\/ . 22 Jan 2016"},{"key":"8_CR21","unstructured":"MAST: Modeling and analysis suite for real-time applications. http:\/\/mast.unican.es\/ . Accessed 22 Jan 2016"},{"issue":"3","key":"8_CR22","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.entcs.2005.02.051","volume":"141","author":"M Wallace","year":"2005","unstructured":"Wallace, M.: Modular architectural representation and analysis of fault propagation and transformation. Electron. Notes Theoret. Comput. Sci. (ENTCS) 141(3), 53\u201371 (2005)","journal-title":"Electron. Notes Theoret. Comput. Sci. (ENTCS)"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-319-14130-5_18","volume-title":"Software Reuse for Dynamic Systems in the Cloud and Beyond","author":"I Sljivo","year":"2014","unstructured":"Sljivo, I., Gallina, B., Carlson, J., Hansson, H., Puri, S.: A method to generate reusable safety case fragments from compositional safety analysis. In: Schaefer, I., Stamelos, I. (eds.) ICSR 2015. LNCS, vol. 8919, pp. 253\u2013268. Springer, Heidelberg (2014)"},{"key":"8_CR24","unstructured":"AUTOSAR: Software architecture specification. http:\/\/www.autosar.org . Accessed 22 Jan 2016"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Crnkovic, I.: Component-based software engineering for embedded systems. In: ICSE 2005, pp. 712\u2013713 (2005)","DOI":"10.1145\/1062455.1062631"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Cicchetti, A., Ciccozzi, F., Mazzini, S., Puri, S., Panunzio, M., Zovi, A., Vardanega, T.: CHESS: a model-driven engineering tool environment for aiding the development of complex industrial systems. In: ASE 2012, pp. 362\u2013365 (2012)","DOI":"10.1145\/2351676.2351748"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-13550-7_1","volume-title":"Reliable Software Technologiey \u2013 Ada-Europe 2010","author":"TP Baker","year":"2010","unstructured":"Baker, T.P.: What to make of multicore processors for reliable real-time systems? In: Real, J., Vardanega, T. (eds.) Ada-Europe 2010. LNCS, vol. 6106, pp. 1\u201318. Springer, Heidelberg (2010)"},{"issue":"6","key":"8_CR28","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/2.294849","volume":"27","author":"M Srinivas","year":"1994","unstructured":"Srinivas, M., Patnaik, L.M.: Genetic algorithms: a survey. Computer 27(6), 17\u201326 (1994). doi: 10.1109\/2.294849","journal-title":"Computer"},{"key":"8_CR29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33170-1","volume-title":"Industrial Deployment of System Engineering Methods","author":"A Romanovsky","year":"2013","unstructured":"Romanovsky, A., Thomas, M.: Industrial Deployment of System Engineering Methods. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-33170-1"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies \u2013 Ada-Europe 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39083-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T21:22:23Z","timestamp":1567977743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39083-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319390826","9783319390833"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39083-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}