{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:08:39Z","timestamp":1725516519729},"publisher-location":"Berlin, Heidelberg","reference-count":71,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691471"},{"type":"electronic","value":"9783540691495"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69149-5_35","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"325-336","source":"Crossref","is-referenced-by-count":0,"title":["Linking the Meaning of Programs to What the Compiler Can Verify"],"prefix":"10.1007","author":[{"given":"Egon","family":"B\u00f6rger","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-540-45236-2_5","volume-title":"FME 2003: Formal Methods","author":"J.-R. Abrial","year":"2003","unstructured":"Abrial, J.-R.: Event based sequential program development: application to constructing a pointer program. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol.\u00a02805, pp. 51\u201374. Springer, Heidelberg (2003)"},{"key":"35_CR2","unstructured":"Abrial, J.-R.: Event driven distributed program construction. Version 6 (August 2004)"},{"key":"35_CR3","unstructured":"Abrial, J.-R.: On constructing large computerized systems (a position paper). In: Proc. VSTTE, ETH Z\u00fcrich (October 2005)"},{"key":"35_CR4","unstructured":"Anlauff, M., Kutter, P.: Xasm Open Source (2001), http:\/\/www.xasm.org\/"},{"key":"35_CR5","unstructured":"Betarte, G., Gimenez, E., Loiseaux, C., Chetali, B.: Formavie: Formal modelling and verification of the java card 2.1.1 security architecture. In: Proc. eSmart (2002)"},{"key":"35_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-52753-2_31","volume-title":"CSL \u201989","author":"E. B\u00f6rger","year":"1990","unstructured":"B\u00f6rger, E.: A logical operational semantics for full Prolog. In: B\u00f6rger, E., Kleine B\u00fcning, H., Richter, M.M. (eds.) CSL 1989. LNCS, vol.\u00a0440, pp. 36\u201364. Springer, Heidelberg (1990)"},{"key":"35_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0029592","volume-title":"Mathematical Foundations of Computer Science 1990","author":"E. B\u00f6rger","year":"1990","unstructured":"B\u00f6rger, E.: A logical operational semantics of full Prolog. In: Rovan, B. (ed.) MFCS 1990. LNCS, vol.\u00a0452, pp. 1\u201314. Springer, Heidelberg (1990)"},{"key":"35_CR8","series-title":"Logic From Computer Science","first-page":"17","volume-title":"Part III: Built-in predicates for files, terms, arithmetic and input-output","author":"E. B\u00f6rger","year":"1992","unstructured":"B\u00f6rger, E.: A logical operational semantics for full Prolog. In: Moschovakis, Y.N. (ed.) Part III: Built-in predicates for files, terms, arithmetic and input-output, Berkeley Mathematical Sciences Research Institute Publications. Logic From Computer Science, vol.\u00a021, pp. 17\u201350. Springer, Heidelberg (1992)"},{"key":"35_CR9","series-title":"Technology\/Foundations","first-page":"391","volume-title":"IFIP 13th World Computer Congress","author":"E. B\u00f6rger","year":"1994","unstructured":"B\u00f6rger, E.: Logic programming: The Evolving Algebra approach. In: Pehrson, B., Simon, I. (eds.) IFIP 13th World Computer Congress. Technology\/Foundations, vol.\u00a0I, pp. 391\u2013395. Elsevier, Amsterdam (1994)"},{"issue":"1","key":"35_CR10","first-page":"2","volume":"8","author":"E. B\u00f6rger","year":"2002","unstructured":"B\u00f6rger, E.: The origins and the development of the ASM method for high-level system design and analysis. J.\u00a0Universal Computer Science\u00a08(1), 2\u201374 (2002)","journal-title":"J.\u00a0Universal Computer Science"},{"key":"35_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-39910-0_6","volume-title":"Verification: Theory and Practice","author":"E. B\u00f6rger","year":"2004","unstructured":"B\u00f6rger, E.: The ASM ground model method as a foundation of requirements engineering. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol.\u00a02772, pp. 145\u2013160. Springer, Heidelberg (2004)"},{"key":"35_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s00165-003-0012-7","volume":"15","author":"E. B\u00f6rger","year":"2003","unstructured":"B\u00f6rger, E.: The ASM refinement method. Formal Aspects of Computing\u00a015, 237\u2013257 (2003)","journal-title":"Formal Aspects of Computing"},{"key":"35_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","DOI":"10.1007\/11559306_15","volume-title":"Frontiers of Combining Systems","author":"E. B\u00f6rger","year":"2005","unstructured":"B\u00f6rger, E.: The ASM method for system design and analysis. In: Gramlich, B. (ed.) FroCos 2005. LNCS (LNAI), vol.\u00a03717, Springer, Heidelberg (2005)"},{"key":"35_CR14","unstructured":"B\u00f6rger, E.: From Finite State Machines to Virtual Machines (Illustrating design patterns and event-B models). In: Cohors-Fresenborg, E., Schwank, I. (eds.) Pr\u00e4zisionswerkzeug Logik\u2013Gedenkschrift zu Ehren von Dieter R\u00f6dding, Forschungsinstitut f\u00fcr Mathematikdidaktik Osnabr(\u03082006) ISBN 3-925386-56-4"},{"key":"35_CR15","unstructured":"B\u00f6rger, E., D\u00e4ssler, K.: Prolog: DIN papers for discussion. ISO\/IEC JTCI SC22 WG17 Prolog Standardization Document 58, National Physical Laboratory, Middlesex, England, (1990)"},{"issue":"1","key":"35_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1093\/comjnl\/39.1.52","volume":"39","author":"E. B\u00f6rger","year":"1996","unstructured":"B\u00f6rger, E., Durdanovi\u0107, I.: Correctness of compiling Occam to Transputer code. Computer Journal\u00a039(1), 52\u201392 (1996)","journal-title":"Computer Journal"},{"issue":"2\u20133","key":"35_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.tcs.2004.11.008","volume":"336","author":"E. B\u00f6rger","year":"2005","unstructured":"B\u00f6rger, E., Fruja, G., Gervasi, V., St\u00e4rk, R.: A high-level modular definition of the semantics of C#. Theoretical Computer Science\u00a0336(2\u20133), 235\u2013284 (2005)","journal-title":"Theoretical Computer Science"},{"key":"35_CR18","first-page":"500","volume-title":"EURO-DAC 1994. European Design Automation Conference with EURO-VHDL 1994","author":"E. B\u00f6rger","year":"1994","unstructured":"B\u00f6rger, E., Gl\u00e4sser, U., M\u00fcller, W.: The semantics of behavioral VHDL 1993 descriptions. In: EURO-DAC 1994. European Design Automation Conference with EURO-VHDL 1994, pp. 500\u2013505. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"35_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-44518-8_20","volume-title":"Abstract State Machines - Theory and Applications","author":"E. B\u00f6rger","year":"2000","unstructured":"B\u00f6rger, E., P\u00e4ppinghaus, P., Schmid, J.: Report on a practical application of ASMs in software design. In: Gurevich, Y., Kutter, P.W., Odersky, M., Thiele, L. (eds.) ASM 2000. LNCS, vol.\u00a01912, pp. 361\u2013366. Springer, Heidelberg (2000)"},{"key":"35_CR20","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/0167-6423(95)00006-E","volume":"24","author":"E. B\u00f6rger","year":"1995","unstructured":"B\u00f6rger, E., Rosenzweig, D.: A mathematical definition of full Prolog. Science of Computer Programming\u00a024, 249\u2013286 (1995)","journal-title":"Science of Computer Programming"},{"key":"35_CR21","series-title":"Studies in Computer Science and Artificial Intelligence","first-page":"20","volume-title":"Logic Programming: Formal Methods and Practical Applications","author":"E. B\u00f6rger","year":"1995","unstructured":"B\u00f6rger, E., Rosenzweig, D.: The WAM \u2013 definition and compiler correctness. In: Beierle, C., Pl\u00fcmer, L. (eds.) Logic Programming: Formal Methods and Practical Applications. Studies in Computer Science and Artificial Intelligence, vol.\u00a011, ch.\u00a02, pp. 20\u201390. North-Holland, Amsterdam (1995)"},{"key":"35_CR22","volume-title":"A Method for High-Level System Design and Analysis","author":"E. B\u00f6rger","year":"2003","unstructured":"B\u00f6rger, E., St\u00e4rk, R.F.: Abstract State Machines. In: A Method for High-Level System Design and Analysis, Springer, Heidelberg (2003)"},{"issue":"4","key":"35_CR23","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MC.1987.1663532","volume":"20","author":"F.P.J. Brooks","year":"1987","unstructured":"Brooks, F.P.J.: No silver bullet. Computer\u00a020(4), 10\u201319 (1987)","journal-title":"Computer"},{"key":"35_CR24","unstructured":"Carnap, R.: The methodological character of theoretical concepts. In: Feigl, H., Scriven, M. (eds.) Minnesota Studies in the Philosophy of Science, vol.\u00a02, pp. 33\u201376. University of Minnesota Press (1956)"},{"key":"35_CR25","doi-asserted-by":"crossref","unstructured":"Del Castillo, G.: The ASM Workbench. A Tool Environment for Computer-Aided Analysis and Validation of Abstract State Machine Models. PhD thesis, Universit\u00e4t Paderborn, Germany (2001)","DOI":"10.1007\/3-540-45319-9_40"},{"key":"35_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-46419-0_23","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Del Castillo","year":"2000","unstructured":"Del Castillo, G., Winter, K.: Model checking support for the ASM high-level language. In: Schwartzbach, M.I., Graf, S. (eds.) ETAPS 2000 and TACAS 2000. LNCS, vol.\u00a01785, pp. 331\u2013346. Springer, Heidelberg (2000)"},{"key":"35_CR27","first-page":"1","volume-title":"Structured Programming","author":"E.W. Dijkstra","year":"1972","unstructured":"Dijkstra, E.W.: Notes on structured programming. In: Dahl, O.-J., Dijkstra, E.W., Hoare, C.A.R. (eds.) Structured Programming, pp. 1\u201382. Academic Press, London (1972)"},{"key":"35_CR28","unstructured":"Dold, A.: A formal representation of Abstract State Machines using PVS. Verifix Technical Report Ulm\/6.2, Universit\u00e4t Ulm, Germany (July 1998)"},{"key":"35_CR29","unstructured":"Dold, A., Gaul, T., Vialard, V., Zimmermann, W.: ASM-based mechanized verification of compiler back-ends. In: Gl\u00e4sser, U., Schmitt, P. (eds.) Proc. 5th Int. Workshop on ASMs, Magdeburg University, pp. 50\u201367 (1998)"},{"key":"35_CR30","unstructured":"Farahbod, R., et\u00a0al.: The CoreASM Project, http:\/\/www.coreasm.org"},{"key":"35_CR31","unstructured":"Farahbod, R., Gervasi, V., Gl\u00e4sser, U.: CoreASM: An Extensible ASM Execution Engine. Fundamenta Informaticae XXI (2006)"},{"key":"35_CR32","unstructured":"Foundations of Software Engineering Group, Microsoft Research. AsmL (2001), http:\/\/research.microsoft.com\/foundations\/AsmL\/"},{"issue":"9","key":"35_CR33","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5381\/jot.2004.3.9.a2","volume":"3","author":"N.G. Fruja","year":"2004","unstructured":"Fruja, N.G.: The Correctness of the Definite Assignment Analysis in C#. J. Object Technology\u00a03(9), 29\u201352 (2004)","journal-title":"J. Object Technology"},{"key":"35_CR34","unstructured":"Fruja, N.G.: A Modular Design for the.NET CLR Architecture. In: Beauquier, A.S.D., B\u00f6rger, E. (eds.) 12th International Workshop on Abstract State Machines, ASM 2005, Paris, France, pp. 175\u2013199 (March 2005)"},{"key":"35_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/11693024_22","volume-title":"Programming Languages and Systems","author":"N.G. Fruja","year":"2006","unstructured":"Fruja, N.G.: Type Safety of Generics for the.NET Common Language Runtime. In: Sestoft, P. (ed.) ESOP 2006 and ETAPS 2006. LNCS, vol.\u00a03924, pp. 325\u2013341. Springer, Heidelberg (2006)"},{"key":"35_CR36","unstructured":"Fruja, N.G., B\u00f6rger, E.: Analysis of the.NET CLR Exception Handling. In: Skala, V., Nienaltowski, P. (eds.) 3rd International Conference on .NET Technologies, NET 2005, Pilsen, Czech Republic, pp. 65\u201375 (May\u2013June 2005)"},{"issue":"3","key":"35_CR37","doi-asserted-by":"publisher","first-page":"5","DOI":"10.5381\/jot.2006.5.3.a1","volume":"5","author":"N.G. Fruja","year":"2006","unstructured":"Fruja, N.G., B\u00f6rger, E.: Modeling the.NET CLR Exception Handling Mechanism for a Mathematical Analysis. Journal of Object Technology\u00a05(3), 5\u201334 (2006)","journal-title":"Journal of Object Technology"},{"key":"35_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-44518-8_17","volume-title":"Abstract State Machines - Theory and Applications","author":"A. Gargantini","year":"2000","unstructured":"Gargantini, A., Riccobene, E.: Encoding Abstract State Machines in PVS. In: Gurevich, Y., Kutter, P.W., Odersky, M., Thiele, L. (eds.) ASM 2000. LNCS, vol.\u00a01912, pp. 303\u2013322. Springer, Heidelberg (2000)"},{"key":"35_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36498-6_16","volume-title":"Abstract State Machines 2003. Advances in Theory and Practice","author":"A. Gawanmeh","year":"2003","unstructured":"Gawanmeh, A., Tahar, S., Winter, K.: Interfacing ASMs with the MDG tool. In: B\u00f6rger, E., Gargantini, A., Riccobene, E. (eds.) ASM 2003. LNCS, vol.\u00a02589, pp. 278\u2013292. Springer, Heidelberg (2003)"},{"issue":"3","key":"35_CR40","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/S1389-1286(03)00247-0","volume":"42","author":"U. Gl\u00e4sser","year":"2003","unstructured":"Gl\u00e4sser, U., Gotzhein, R., Prinz, A.: Formal semantics of sdl-2000: Status and perspectives. Computer Networks\u00a042(3), 343\u2013358 (2003)","journal-title":"Computer Networks"},{"key":"#cr-split#-35_CR41.1","unstructured":"Goerigk, W., Dold, A., Gaul, T., Goos, G., Heberle, A., von Henke, F.W., Hoffmann, U., Langmaack, H., Pfeifer, H., Ruess, H., Zimmermann, W.: Compiler correctness and implementation verification: The verifix approach. In: Fritzson, P. (ed.) Int. Conf. on Compiler Construction, Proc. Poster Session of CC 1996, Link\u00f6ping, Sweden (1996);"},{"key":"#cr-split#-35_CR41.2","unstructured":"IDA Technical Report LiTH-IDA-R-96-12"},{"key":"35_CR42","unstructured":"Habibi, A.: Framework for System Level Verification: The SystemC Case. PhD thesis, Concordia University, Montreal (July 2005)"},{"key":"35_CR43","unstructured":"Haeberer, A.M., Maibaum, T.S.E.: Scientific rigour, an answer to a pragmatic question: a linguistic framework for software engineering. In: International Conference on Software Engineering, Toronto, vol. 23 (2001)"},{"key":"35_CR44","unstructured":"Haeberer, A.M., Maibaum, T.S.E., Cengarle, M.V.: Knowing what requirements specifications specify (typoscript 2001)"},{"key":"35_CR45","unstructured":"Heimdahl, M.P.E.: Let\u2019s not forget validation. In: Meyer, B., Woodcock, J.C.P. (eds.) Verified Software: Theories, Tools, and Experiments (VSTTE 2005). LNCS, vol. 4171. Springer, Heidelberg (2008) (this volume)"},{"issue":"1","key":"35_CR46","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/602382.602403","volume":"50","author":"C.A.R. Hoare","year":"2003","unstructured":"Hoare, C.A.R.: The verifying compiler: A grand challenge for computing research. J. ACM\u00a050(1), 63\u201369 (2003)","journal-title":"J. ACM"},{"key":"35_CR47","doi-asserted-by":"crossref","unstructured":"Jones, C.B.: What can we do (technically) to get the right specification. In: Meyer, B., Woodcock, J.C.P. (eds.) Verified Software: Theories, Tools, and Experiments (VSTTE 2005). LNCS, vol. 4171, pp. 64\u201369. Springer, Heidelberg (2008) (this volume)","DOI":"10.1007\/978-3-540-69149-5_8"},{"key":"#cr-split#-35_CR48.1","unstructured":"Jula, H.V., Fruja, N.G.: An Executable Specification of C#. In: Beauquier, A.S.D., B\u00f6rger, E. (eds.) 12th International Workshop on Abstract State Machines, ASM 2005, Paris, France, pp. 275\u2013287 (March 2005);"},{"key":"#cr-split#-35_CR48.2","unstructured":"University Paris 12"},{"key":"35_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-36498-6_29","volume-title":"Abstract State Machines 2003. Advances in Theory and Practice","author":"A. Kalinov","year":"2003","unstructured":"Kalinov, A., Kossatchev, A., Petrenko, A., Posypkin, M., Shishkov, V.: Using ASM specifications for compiler testing. In: B\u00f6rger, E., Gargantini, A., Riccobene, E. (eds.) ASM 2003. LNCS, vol.\u00a02589, p. 415. Springer, Heidelberg (2003)"},{"key":"35_CR50","doi-asserted-by":"crossref","unstructured":"Klein, G., Nipkow, T.: A machine-checked model for a Java-like language, virtual machine and compiler. ACM Trans. Prog. Lang. Syst. (2006)","DOI":"10.1145\/1146809.1146811"},{"key":"35_CR51","doi-asserted-by":"crossref","unstructured":"Nanchen, S., St\u00e4rk, R.F.: A security logic for Abstract State Machines. TR 423 CS Dept., ETH Z\u00fcrich (2003)","DOI":"10.1007\/978-3-540-24773-9_13"},{"key":"35_CR52","doi-asserted-by":"crossref","unstructured":"Popper, K.: Logik der Forschung. Zur Erkenntnishtoeire der modernen Naturwissenschaft. Wien (1935)","DOI":"10.1007\/978-3-7091-4177-9"},{"key":"35_CR53","volume-title":"Facts and Fallacies of Software Engineering","author":"R.L. Glass","year":"2003","unstructured":"Glass, R.L.: Facts and Fallacies of Software Engineering. Addison-Wesley, Reading (2003)"},{"key":"35_CR54","unstructured":"Schellhorn, G.: Verifikation abstrakter Zustandsmaschinen. PhD thesis, Universit\u00e4t Ulm, Germany (1999)"},{"issue":"11","key":"35_CR55","first-page":"952","volume":"7","author":"G. Schellhorn","year":"2001","unstructured":"Schellhorn, G.: Verification of ASM refinements using generalized forward simulation. J.\u00a0Universal Computer Science\u00a07(11), 952\u2013979 (2001)","journal-title":"J.\u00a0Universal Computer Science"},{"issue":"2-3","key":"35_CR56","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.tcs.2004.11.013","volume":"336","author":"G. Schellhorn","year":"2005","unstructured":"Schellhorn, G.: ASM refinement and generalizations of forward simulation in data refinement: A comparison. Theoretical Computer Science\u00a0336(2-3), 403\u2013436 (2005)","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"35_CR57","first-page":"377","volume":"3","author":"G. Schellhorn","year":"1997","unstructured":"Schellhorn, G., Ahrendt, W.: Reasoning about Abstract State Machines: The WAM case study. J.\u00a0Universal Computer Science\u00a03(4), 377\u2013413 (1997)","journal-title":"J.\u00a0Universal Computer Science"},{"key":"35_CR58","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-94-017-0437-3_7","volume-title":"Automated Deduction \u2013 A Basis for Applications, volume III: Applications","author":"G. Schellhorn","year":"1998","unstructured":"Schellhorn, G., Ahrendt, W.: The WAM case study: Verifying compiler correctness for Prolog with KIV. In: Bibel, W., Schmitt, P. (eds.) Automated Deduction \u2013 A Basis for Applications, volume III: Applications, pp. 165\u2013194. Kluwer Academic Publishers, Dordrecht (1998)"},{"key":"35_CR59","unstructured":"Schmid, J.: Executing ASM specifications with AsmGofer, http:\/\/www.tydo.de\/AsmGofer"},{"issue":"11","key":"35_CR60","first-page":"1069","volume":"7","author":"J. Schmid","year":"2001","unstructured":"Schmid, J.: Compiling Abstract State Machines to C++. J.\u00a0Universal Computer Science\u00a07(11), 1069\u20131088 (2001)","journal-title":"J.\u00a0Universal Computer Science"},{"key":"35_CR61","unstructured":"Schmid, J.: Refinement and Implementation Techniques for Abstract State Machines. PhD thesis, University of Ulm, Germany (2002)"},{"key":"35_CR62","series-title":"Lecture Notes in Computer Science","volume-title":"Abstract State Machines 2004. Advances in Theory and Practice","author":"R.F. St\u00e4rk","year":"2004","unstructured":"St\u00e4rk, R.F., B\u00f6rger, E.: An ASM specification of C# threads and the.NET memory model. In: Zimmermann, W., Thalheim, B. (eds.) ASM 2004. LNCS, vol.\u00a03052, Springer, Heidelberg (2004)"},{"issue":"11","key":"35_CR63","first-page":"981","volume":"7","author":"R.F. St\u00e4rk","year":"2001","unstructured":"St\u00e4rk, R.F., Nanchen, S.: A logic for Abstract State Machines. J.\u00a0Universal Computer Science\u00a07(11), 981\u20131006 (2001)","journal-title":"J.\u00a0Universal Computer Science"},{"key":"35_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59495-3","volume-title":"Java and the Java Virtual Machine: Definition, Verification, Validation","author":"R.F. St\u00e4rk","year":"2001","unstructured":"St\u00e4rk, R.F., Schmid, J., B\u00f6rger, E.: Java and the Java Virtual Machine: Definition, Verification, Validation. Springer, Heidelberg (2001)"},{"key":"35_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/3-540-44518-8_15","volume-title":"Abstract State Machines - Theory and Applications","author":"J. Teich","year":"2000","unstructured":"Teich, J., Kutter, P., Weper, R.: Description and simulation of microprocessor instruction sets using ASMs. In: Gurevich, Y., Kutter, P.W., Odersky, M., Thiele, L. (eds.) ASM 2000. LNCS, vol.\u00a01912, pp. 266\u2013286. Springer, Heidelberg (2000)"},{"key":"35_CR66","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/354880.354885","volume-title":"Proc. Int. Conf. on Compilers, Architectures and Synthesis for Embedded Systems (CASES 2000)","author":"J. Teich","year":"2000","unstructured":"Teich, J., Weper, R., Fischer, D., Trinkert, S.: A joint architecture\/compiler design environment for ASIPs. In: Proc. Int. Conf. on Compilers, Architectures and Synthesis for Embedded Systems (CASES 2000), November 2000, pp. 26\u201333. ACM Press, San Jose (2000)"},{"key":"35_CR67","unstructured":"Vajihollahi, M.: High level specification and validation of the business process execution language for web services. Master\u2019s thesis, School of Computing Science at Simon Fraser University (March 2004)"},{"issue":"5","key":"35_CR68","first-page":"689","volume":"3","author":"K. Winter","year":"1997","unstructured":"Winter, K.: Model checking for Abstract State Machines. J.\u00a0Universal Computer Science\u00a03(5), 689\u2013701 (1997)","journal-title":"J.\u00a0Universal Computer Science"},{"key":"35_CR69","doi-asserted-by":"crossref","unstructured":"Wirth, N.: Program development by stepwise refinement. Commun. ACM\u00a014(4) (1971)","DOI":"10.1145\/362575.362577"}],"container-title":["Lecture Notes in Computer Science","Verified Software: Theories, Tools, Experiments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69149-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T17:51:21Z","timestamp":1631641881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69149-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540691471","9783540691495"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69149-5_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}