{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:50:03Z","timestamp":1725486603726},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729198"},{"type":"electronic","value":"9783540729525"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72952-5_3","type":"book-chapter","created":{"date-parts":[[2007,6,26]],"date-time":"2007-06-26T08:10:08Z","timestamp":1182845408000},"page":"44-58","source":"Crossref","is-referenced-by-count":2,"title":["Verifying Distributed, Event-Based Middleware Applications Using Domain-Specific Software Model Checking"],"prefix":"10.1007","author":[{"given":"L. Ruhai","family":"Cai","sequence":"first","affiliation":[]},{"given":"Jeremy S.","family":"Bradbury","sequence":"additional","affiliation":[]},{"given":"Juergen","family":"Dingel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Bradbury, J.S., Dingel, J.: Evaluating and improving the automatic analysis of implicit invocation systems. In: Proc. of ESEC\/FSE 2003, September 2003, pp. 78\u201387 (2003)","DOI":"10.1145\/940071.940083"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Campbell, C., Grieskamp, W., Nachmanson, L., Schulte, W., Tillmann, N., Veanes, M.: Model-based testing of object-oriented reactive systems with Spec Explorer. Technical report, Microsoft Research (2005)","DOI":"10.1007\/11526841_38"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Caporuscio, M., Inverardi, P., Pelliccione, P.: Compositional verification of middleware-based software architecture descriptions. In: Proc. of ICSE 2004, pp. 221\u2013230 (2004)","DOI":"10.1109\/ICSE.2004.1317444"},{"key":"3_CR4","unstructured":"Carzaniga, A.: Personal e-mail correspondance with J. Dingel (February 9, 2005)"},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/380749.380767","volume":"19","author":"A. Carzaniga","year":"2001","unstructured":"Carzaniga, A., Rosenblum, D.S., Wolf, A.L.: Design and evaluation of a wide-area event notification service. ACM Trans. on Comp. Sys.\u00a019(3), 332\u2013383 (2001)","journal-title":"ACM Trans. on Comp. Sys."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Cassidy, T., Cordy, J., Dean, T., Dingel, J.: Source transformation for concurrency analysis. In: Proc. of the Int. Work. on Language Descriptions, Tools and Applications (LDTA 2005) (April 2005)","DOI":"10.1016\/j.entcs.2005.05.012"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Corbett, J.C., Dwyer, M.B., Hatcliff, J., et al.: Bandera: extracting finite-state models from java source code. In: Proc. of ICSE \u201900, pp. 439\u2013448 (2000)","DOI":"10.1145\/337180.337234"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Tkachuk, R.O., Visser, W.: Analyzing interaction orderings with model checking. In: Proc. of ASE 2004, pp. 154\u2013163 (2004)","DOI":"10.1109\/ASE.2004.1342733"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27813-9_19","volume-title":"Computer Aided Verification","author":"C. Fournet","year":"2004","unstructured":"Fournet, C., Hoare, C., Rajamani, S., Rehof, J.: Stuck-free conformance. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol.\u00a03114, Springer, Heidelberg (2004)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44829-2_11","volume-title":"Model Checking Software","author":"D. Garlan","year":"2003","unstructured":"Garlan, D., Khersonsky, S., Kim, J.: Model checking publish-subscribe systems. In: Ball, T., Rajamani, S.K. (eds.) Model Checking Software. LNCS, vol.\u00a02648, Springer, Heidelberg (2003)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Haahr, M., Meier, R., Nixon, P., Cahill, V., Jul, E.: Filtering and scalability in the ECO distributed event model. In: PDSE \u201900. Proc. of the Int. Symp. on Soft. Eng. for Parallel and Distributed Systems, p. 83 (2000)","DOI":"10.1109\/PDSE.2000.847853"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Hatcliff, J., Deng, X., Dwyer, M.B., Jung, G., Ranganath, V.P.: Cadena: an integrated development, analysis, and verification environment for component-based systems. In: Proc. of ICSE 2003, pp. 160\u2013173 (May 2003)","DOI":"10.1109\/ICSE.2003.1201197"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","first-page":"176","volume-title":"Selected Areas in Cryptography","author":"D. Heimbigner","year":"2001","unstructured":"Heimbigner, D.: Adapting publish\/subscribe middleware to achieve Gnutella-like functionality. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 176\u2013181. Springer, Heidelberg (2001)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Inverardi, P., Muccini, H., Pelliccione, P.: Charmy: an extensible tool for architectural analysis. In: Proc. of ESEC\/FSE-13, pp. 111\u2013114 (2005)","DOI":"10.1145\/1081706.1081726"},{"issue":"5","key":"3_CR15","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxh120","volume":"48","author":"R. Meier","year":"2005","unstructured":"Meier, R., Cahill, V.: Taxonomy of distributed event-based programming systems. The Computer Journal\u00a048(5), 602\u2013626 (2005)","journal-title":"The Computer Journal"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Robby, Dwyer, M., Hatcliff, J.: Bogor: an extensible and highly-modular software model checking framework. In: Proc. of ESEC\/FSE-11, pp. 267\u2013276, (September 2003)","DOI":"10.1145\/940071.940107"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-30080-9_6","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"B. Selic","year":"2004","unstructured":"Selic, B.: On the semantic foundations of standard uml 2. In: Bernardo, M., Corradini, F. (eds.) Formal Methods for the Design of Real-Time Systems. LNCS, vol.\u00a03185, pp. 181\u2013199. Springer, Heidelberg (2004)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45139-0_12","volume-title":"Model Checking Software","author":"S.D. Stoller","year":"2001","unstructured":"Stoller, S.D., Liu, Y.A.: Transformations for model checking distributed Java programs. In: Dwyer, M.B. (ed.) Model Checking Software. LNCS, vol.\u00a02057, Springer, Heidelberg (2001)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Uchitel, S., Yankelevich, D.: Enhancing architectural mismatch detection with assumptions. In: Proc. of the Int. Conf. and Work. on the Engineering of Computer Based Systems, pp. 138\u2013146 (April 2000)","DOI":"10.1109\/ECBS.2000.839871"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, B., Ding, K., Li, J.: An XML-message based architecture description language and architectural mismatch checking. In: Proc. of Comp. Soft. and Applications Conf. (COMPSAC 2001), pp. 561\u2013566 (October 2001)","DOI":"10.1109\/CMPSAC.2001.960668"},{"issue":"3","key":"3_CR21","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.scico.2006.04.008","volume":"62","author":"H. Zhang","year":"2006","unstructured":"Zhang, H., Bradbury, J.S., Cordy, J.R., Dingel, J.: Using source transformation to test and model check implicit-invocation systems. Special Issue on Source Code Analysis and Manipulation. Science of Computer Programming\u00a062(3), 209\u2013227 (2006)","journal-title":"Science of Computer Programming"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Open Object-Based Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72952-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T20:20:35Z","timestamp":1556569235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72952-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540729198","9783540729525"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72952-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}