{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:08:46Z","timestamp":1725901726517},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319614663"},{"type":"electronic","value":"9783319614670"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61467-0_1","type":"book-chapter","created":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T04:33:58Z","timestamp":1497674038000},"page":"3-20","source":"Crossref","is-referenced-by-count":2,"title":["Abstraction Refinement for the Analysis of Software Product Lines"],"prefix":"10.1007","author":[{"given":"Ferruccio","family":"Damiani","sequence":"first","affiliation":[]},{"given":"Reiner","family":"H\u00e4hnle","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Lienhardt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,18]]},"reference":[{"key":"1_CR1","series-title":"Programming and Software Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49812-6","volume-title":"Deductive Software Verification\u2014The KeY Book: From Theory to Practice","year":"2016","unstructured":"Ahrendt, W., Beckert, B., Bubel, R., H\u00e4hnle, R., Schmitt, P., Ulbrich, M. (eds.): Deductive Software Verification\u2014The KeY Book: From Theory to Practice. Programming and Software Engineering, vol. 10001. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-49812-6"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1007\/978-3-642-54862-8_46","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E Albert","year":"2014","unstructured":"Albert, E., Arenas, P., Flores-Montoya, A., Genaim, S., G\u00f3mez-Zamalloa, M., Martin-Martin, E., Puebla, G., Rom\u00e1n-D\u00edez, G.: SACO: static analyzer for concurrent objects. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 562\u2013567. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-54862-8_46"},{"issue":"4","key":"1_CR3","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1007\/s10270-015-0476-y","volume":"15","author":"E Albert","year":"2016","unstructured":"Albert, E., Bubel, R., Genaim, S., H\u00e4hnle, R., D\u00edez, G.R.: A formal verification framework for static analysis \u2013 as well as its instantiation to the resource analyzer COSTA and formal verification tool KeY. Softw. Syst. Model. 15(4), 987\u20131012 (2016)","journal-title":"Softw. Syst. Model."},{"issue":"2","key":"1_CR4","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/2824255","volume":"17","author":"E Albert","year":"2016","unstructured":"Albert, E., Flores-Montoya, A., Genaim, S., Martin-Martin, E.: May-happen-in-parallel analysis for actor-based concurrency. ACM Trans. Comput. Log. 17(2), 11:1\u201311:39 (2016)","journal-title":"ACM Trans. Comput. Log."},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-33693-0_26","volume-title":"Integrated Formal Methods","author":"E Albert","year":"2016","unstructured":"Albert, E., G\u00f3mez-Zamalloa, M., Isabel, M.: Combining static analysis and testing for deadlock detection. In: \u00c1brah\u00e1m, E., Huisman, M. (eds.) IFM 2016. LNCS, vol. 9681, pp. 409\u2013424. Springer, Cham (2016). doi: 10.1007\/978-3-319-33693-0_26"},{"key":"1_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-37521-7","volume-title":"Feature-Oriented Software Product Lines: Concepts and Implementation","author":"S Apel","year":"2013","unstructured":"Apel, S., Batory, D.S., K\u00e4stner, C., Saake, G.: Feature-Oriented Software Product Lines: Concepts and Implementation. Springer, Heidelberg (2013)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Apel, S., Speidel, H., Wendler, P., von Rhein, A., Beyer, D.: Detection of feature interactions using feature-aware verification. In: Alexander, P., Pasareanu, C.S., Hosking, J.G. (eds.) 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Lawrence, KS, USA, pp. 372\u2013375. IEEE Computer Society (2011)","DOI":"10.1109\/ASE.2011.6100075"},{"key":"1_CR8","unstructured":"Bak, K.: Modeling and analysis of software product line variability in clafer. Ph.D. thesis, University of Waterloo (2013)"},{"issue":"3","key":"1_CR9","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1007\/s10270-014-0441-1","volume":"15","author":"K Bak","year":"2016","unstructured":"Bak, K., Diskin, Z., Antkiewicz, M., Czarnecki, K., Wasowski, A.: Clafer: unifying class and feature modeling. Softw. Syst. Model. 15(3), 811\u2013845 (2016)","journal-title":"Softw. Syst. Model."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Batory, D.S.: A theory of modularity for automated software development. In: France, R.B., Ghosh, S., Leavens, G.T. (eds.) Companion Proceedings of 14th International Conference on Modularity, Fort Collins, CO, USA, pp. 1\u201310. ACM (2015)","DOI":"10.1145\/2735386.2735843"},{"issue":"6","key":"1_CR11","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/TSE.2004.23","volume":"30","author":"DS Batory","year":"2004","unstructured":"Batory, D.S., Sarvela, J.N., Rauschmayer, A.: Scaling step-wise refinement. IEEE Trans. Softw. Eng. 30(6), 355\u2013371 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"1_CR12","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIS.2014.3","volume":"29","author":"B Beckert","year":"2014","unstructured":"Beckert, B., H\u00e4hnle, R.: Reasoning and verification. IEEE Intell. Syst. 29(1), 20\u201329 (2014)","journal-title":"IEEE Intell. Syst."},{"issue":"2","key":"1_CR13","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s00236-012-0173-z","volume":"50","author":"L Bettini","year":"2013","unstructured":"Bettini, L., Damiani, F., Schaefer, I.: Compositional type checking of delta-oriented software product lines. Acta Inform. 50(2), 77\u2013122 (2013)","journal-title":"Acta Inform."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Beyer, D., Dangl, M., Dietsch, D., Heizmann, M.: Correctness witnesses: exchanging verification results between verifiers. In: Zimmermann, T., Cleland-Huang, J., Su, Z. (eds.) Proceedings of 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE, Seattle, WA, USA, pp. 326\u2013337. ACM (2016)","DOI":"10.1145\/2950290.2950351"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-22110-1_16","volume-title":"Computer Aided Verification","author":"D Beyer","year":"2011","unstructured":"Beyer, D., Keremoglu, M.E.: CPAchecker: a tool for configurable software verification. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 184\u2013190. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22110-1_16"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-47166-2_14","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"D Beyer","year":"2016","unstructured":"Beyer, D., Lemberger, T.: Symbolic execution with CEGAR. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 195\u2013211. Springer, Cham (2016). doi: 10.1007\/978-3-319-47166-2_14"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Bodden, E., Tol\u00eado, T., Ribeiro, M., Brabrand, C., Borba, P., Mezini, M.: Spl $$^{\\text{lift}}$$ : statically analyzing software product lines in minutes instead of years. In: Boehm, H., Flanagan, C. (eds.) ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI, Seattle, WA, USA, pp. 355\u2013364. ACM (2013)","DOI":"10.1145\/2499370.2491976"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-319-46508-1_8","volume-title":"Transactions on Foundations for Mastering Change I","author":"R Bubel","year":"2016","unstructured":"Bubel, R., Damiani, F., H\u00e4hnle, R., Johnsen, E.B., Owe, O., Schaefer, I., Yu, I.C.: Proof repositories for compositional verification of evolving software systems. In: Steffen, B. (ed.) Transactions on Foundations for Mastering Change I. LNCS, vol. 9960, pp. 130\u2013156. Springer, Cham (2016). doi: 10.1007\/978-3-319-46508-1_8"},{"key":"1_CR19","unstructured":"Bubel, R., Din, C., H\u00e4hnle, R.: Verification of variable software: an experience report. In: Beckert, B., March\u00e9, C. (eds.) Pre-Proceedings International Conference on Formal Verification of Object-Oriented Software (FoVeOOS), Paris, France (2010)"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-23820-3_21","volume-title":"Runtime Verification","author":"JM Chimento","year":"2015","unstructured":"Chimento, J.M., Ahrendt, W., Pace, G.J., Schneider, G.: StaRVOOrS : a tool for combined static and runtime verification of Java. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 297\u2013305. Springer, Cham (2015). doi: 10.1007\/978-3-319-23820-3_21"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-21455-4_13","volume-title":"Formal Methods for Eternal Networked Software Systems","author":"D Clarke","year":"2011","unstructured":"Clarke, D., Diakov, N., H\u00e4hnle, R., Johnsen, E.B., Schaefer, I., Sch\u00e4fer, J., Schlatte, R., Wong, P.Y.H.: Modeling spatial and temporal variability with the HATS abstract behavioral modeling language. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol. 6659, pp. 417\u2013457. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21455-4_13"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E Clarke","year":"2000","unstructured":"Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol. 1855, pp. 154\u2013169. Springer, Heidelberg (2000). doi: 10.1007\/10722167_15"},{"key":"1_CR23","volume-title":"Software Product Lines: Practices and Patterns","author":"P Clements","year":"2001","unstructured":"Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. Addison Wesley Longman, Boston (2001)"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-33693-0_4","volume-title":"Integrated Formal Methods","author":"F Damiani","year":"2016","unstructured":"Damiani, F., Lienhardt, M.: On type checking delta-oriented product lines. In: \u00c1brah\u00e1m, E., Huisman, M. (eds.) IFM 2016. LNCS, vol. 9681, pp. 47\u201362. Springer, Cham (2016). doi: 10.1007\/978-3-319-33693-0_4"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Damiani, F., Owe, O., Dovland, J., Schaefer, I., Johnsen, E.B., Yu, I.C.: A transformational proof system for delta-oriented programming. In: SPLC (2), pp. 53\u201360 (2012)","DOI":"10.1145\/2364412.2364422"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-34026-0_15","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change","author":"F Damiani","year":"2012","unstructured":"Damiani, F., Schaefer, I.: Family-based analysis of type safety for delta-oriented software product lines. In: Margaria, T., Steffen, B. (eds.) ISoLA 2012. LNCS, vol. 7609, pp. 193\u2013207. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34026-0_15"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-32004-3_20","volume-title":"Security in Pervasive Computing","author":"\u00c1 Darvas","year":"2005","unstructured":"Darvas, \u00c1., H\u00e4hnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 193\u2013209. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-32004-3_20"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-662-54494-5_24","volume-title":"Fundamental Approaches to Software Engineering","author":"AS Dimovski","year":"2017","unstructured":"Dimovski, A.S., W\u0105sowski, A.: Variability-specific abstraction refinement for family-based model checking. In: Huisman, M., Rubin, J. (eds.) FASE 2017. LNCS, vol. 10202, pp. 406\u2013423. Springer, Heidelberg (2017). doi: 10.1007\/978-3-662-54494-5_24"},{"key":"1_CR29","unstructured":"Dziobek, C., Weiland, J.: Variantenmodellierung und -konfiguration eingebetteter automotive Software mit Simulink. In: Giese, H., Huhn, M., Nickel, U., Sch\u00e4tz, B. (eds.) Dagstuhl-Workshop MBEES: Modellbasierte Entwicklung eingebetteter Systeme V. Schloss Dagstuhl, Germany. Informatik-Bericht, vol. 2009-01, pp. 36\u201345. TU Braunschweig, Institut f\u00fcr Software Systems Engineering (2009)"},{"issue":"4","key":"1_CR30","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1007\/s10270-014-0444-y","volume":"15","author":"E Giachino","year":"2016","unstructured":"Giachino, E., Laneve, C., Lienhardt, M.: A framework for deadlock detection in core ABS. Softw. Syst. Model. 15(4), 1013\u20131048 (2016)","journal-title":"Softw. Syst. Model."},{"key":"1_CR31","unstructured":"Gr\u00f6nniger, H., Hartmann, J., Krahn, H., Kriebel, S., Rothhardt, L., Rumpe, B.: View-centric modeling of automotive logical architectures. In: Giese, H., Huhn, M., Nickel, U., Sch\u00e4tz, B. (eds.) Dagstuhl-Workshop MBEES: Modellbasierte Entwicklung eingebetteter Systeme IV, Schloss Dagstuhl, Germany. Informatik-Bericht, vol. 2008-2, pp. 3\u201312. TU Braunschweig, Institut f\u00fcr Software Systems Engineering (2008)"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-642-34026-0_4","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change","author":"R H\u00e4hnle","year":"2012","unstructured":"H\u00e4hnle, R., Schaefer, I.: A Liskov principle for delta-oriented programming. In: Margaria, T., Steffen, B. (eds.) ISoLA 2012. LNCS, vol. 7609, pp. 32\u201346. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34026-0_4"},{"key":"1_CR33","unstructured":"Hammer, C., Krinke, J., Snelting, G.: Information flow control for Java based on path conditions in dependence graphs. In: IEEE International Symposium on Secure Software Engineering (ISSSE), pp. 87\u201396. IEEE, March 2006"},{"issue":"10","key":"1_CR34","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/32.729683","volume":"24","author":"M Jackson","year":"1998","unstructured":"Jackson, M., Zave, P.: Distributed feature composition: a virtual architecture for telecommunications services. IEEE Trans. Softw. Eng. 24(10), 831\u2013847 (1998)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-25271-6_8","volume-title":"Formal Methods for Components and Objects","author":"EB Johnsen","year":"2011","unstructured":"Johnsen, E.B., H\u00e4hnle, R., Sch\u00e4fer, J., Schlatte, R., Steffen, M.: ABS: a core language for abstract behavioral specification. In: Aichernig, B.K., Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2010. LNCS, vol. 6957, pp. 142\u2013164. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25271-6_8"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Beckert, B., Bruns, D., Kirsten, M., Mohr, M.: A hybrid approach for proving noninterference of Java programs. In: Fournet, C., Hicks, M.W., Vigan\u00f2, L. (eds.) IEEE 28th Computer Security Foundations Symposium, CSF, Verona, Italy, pp. 305\u2013319. IEEE Computer Society (2015)","DOI":"10.1109\/CSF.2015.28"},{"issue":"1","key":"1_CR37","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-15579-6_6","volume-title":"Software Product Lines: Going Beyond","author":"I Schaefer","year":"2010","unstructured":"Schaefer, I., Bettini, L., Bono, V., Damiani, F., Tanzarella, N.: Delta-oriented programming of software product lines. In: Bosch, J., Lee, J. (eds.) SPLC 2010. LNCS, vol. 6287, pp. 77\u201391. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15579-6_6"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Schaefer, I., Damiani, F.: Pure delta-oriented programming. In: Apel, S., Batory, D., Czarnecki, K., Heidenreich, F., K\u00e4stner, C., Nierstrasz, O. (eds.) Proceedings of 2nd International Workshop on Feature-Oriented Software Development (FOSD 2010), Eindhoven, The Netherlands, pp. 49\u201356. ACM Press (2010)","DOI":"10.1145\/1868688.1868696"},{"issue":"5","key":"1_CR40","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/s10009-012-0253-y","volume":"14","author":"I Schaefer","year":"2012","unstructured":"Schaefer, I., Rabiser, R., Clarke, D., Bettini, L., Benavides, D., Botterweck, G., Pathak, A., Trujillo, S., Villela, K.: Software diversity: state of the art and perspectives. Int. J. Softw. Tools Technol. Transf. 14(5), 477\u2013495 (2012)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Scheben, C., Greiner, S.: Information flow analysis. In: Ahrendt et al. [1], chap. 13, pp. 453\u2013472 (2016)","DOI":"10.1007\/978-3-319-49812-6_13"},{"issue":"1","key":"1_CR42","doi-asserted-by":"crossref","first-page":"6:1","DOI":"10.1145\/2580950","volume":"47","author":"T Th\u00fcm","year":"2014","unstructured":"Th\u00fcm, T., Apel, S., K\u00e4stner, C., Schaefer, I., Saake, G.: A classification and survey of analysis strategies for software product lines. ACM Comput. Surv. 47(1), 6:1\u20136:45 (2014)","journal-title":"ACM Comput. Surv."},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Th\u00fcm, T., Schaefer, I., Hentschel, M., Apel, S.: Family-based deductive verification of software product lines. In: Ostermann, K., Binder, W. (eds.) Generative Programming and Component Engineering, GPCE 2012, Dresden, Germany, pp. 11\u201320. ACM (2012)","DOI":"10.1145\/2371401.2371404"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Th\u00fcm, T., Schaefer, I., Kuhlemann, M., Apel, S.: Proof composition for deductive verification of software product lines. In: Proceedings of International Workshop Variability-Intensive Systems Testing, Validation and Verification (VAST), pp. 270\u2013277. IEEE Computer Society (2011)","DOI":"10.1109\/ICSTW.2011.48"},{"issue":"1","key":"1_CR45","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jlamp.2015.06.007","volume":"85","author":"A Rhein von","year":"2016","unstructured":"von Rhein, A., Th\u00fcm, T., Schaefer, I., Liebig, J., Apel, S.: Variability encoding: from compile-time to load-time variability. J. Log. Algebr. Methods Program. 85(1), 125\u2013145 (2016)","journal-title":"J. Log. Algebr. Methods Program."},{"key":"1_CR46","unstructured":"Wasser, N., Bubel, R., H\u00e4hnle, R.: Abstract interpretation. In: Ahrendt et al. [1], chap. 6, pp. 167\u2013189 (2016)"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61467-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T09:37:04Z","timestamp":1602322624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61467-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319614663","9783319614670"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61467-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}