{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:26:20Z","timestamp":1742912780370,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642034282"},{"type":"electronic","value":"9783642034299"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03429-9_1","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T12:12:52Z","timestamp":1251461572000},"page":"1-17","source":"Crossref","is-referenced-by-count":3,"title":["Concurrent Abstract State Machines and \u2009+\u2009 CAL Programs"],"prefix":"10.1007","author":[{"given":"Michael","family":"Altenhofen","sequence":"first","affiliation":[]},{"given":"Egon","family":"B\u00f6rger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162","volume-title":"The B-Book","author":"J.-R. Abrial","year":"1996","unstructured":"Abrial, J.-R.: The B-Book. Cambridge University Press, Cambridge (1996)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-60609-2_12","volume-title":"SOFSEM \u201995: Theory and Practice of Informatics","author":"E. B\u00f6rger","year":"1995","unstructured":"B\u00f6rger, E.: Why use Evolving Algebras for hardware and software engineering? In: Bartosek, M., Staudek, J., Wiedermann, J. (eds.) SOFSEM 1995. LNCS, vol.\u00a01012, pp. 236\u2013271. Springer, Heidelberg (1995)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-48257-1_1","volume-title":"Applied Formal Methods - FM-Trends 98","author":"E. B\u00f6rger","year":"1999","unstructured":"B\u00f6rger, E.: High-level system design and analysis using Abstract State Machines. In: Hutter, D., Stephan, W., Traverso, P., Ullmann, M. (eds.) FM-Trends 1998. LNCS, vol.\u00a01641, pp. 1\u201343. Springer, Heidelberg (1999)"},{"issue":"1","key":"1_CR4","first-page":"2","volume":"8","author":"E. B\u00f6rger","year":"2002","unstructured":"B\u00f6rger, E.: The origins and the development of the ASM method for high-level system design and analysis. J. Universal Computer Science\u00a08(1), 2\u201374 (2002)","journal-title":"J. Universal Computer Science"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s00165-003-0012-7","volume":"15","author":"E. B\u00f6rger","year":"2003","unstructured":"B\u00f6rger, E.: The ASM refinement method. Formal Aspects of Computing\u00a015, 237\u2013257 (2003)","journal-title":"Formal Aspects of Computing"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-44518-8_20","volume-title":"Abstract State Machines - Theory and Applications","author":"E. B\u00f6rger","year":"2000","unstructured":"B\u00f6rger, E., P\u00e4ppinghaus, P., Schmid, J.: Report on a practical application of ASMs in software design. In: Gurevich, Y., Kutter, P.W., Odersky, M., Thiele, L. (eds.) ASM 2000. LNCS, vol.\u00a01912, pp. 361\u2013366. Springer, Heidelberg (2000)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44622-2_3","volume-title":"Computer Science Logic","author":"E. B\u00f6rger","year":"2000","unstructured":"B\u00f6rger, E., Schmid, J.: Composition and submachine concepts for sequential ASMs. In: Clote, P.G., Schwichtenberg, H. (eds.) CSL 2000. LNCS, vol.\u00a01862, pp. 41\u201360. Springer, Heidelberg (2000)"},{"key":"1_CR8","volume-title":"A Method for High-Level System Design and Analysis","author":"E. B\u00f6rger","year":"2003","unstructured":"B\u00f6rger, E., St\u00e4rk, R.F.: Abstract State Machines. In: A Method for High-Level System Design and Analysis. Springer, Heidelberg (2003)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-46419-0_23","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Castillo Del","year":"2000","unstructured":"Del Castillo, G., Winter, K.: Model checking support for the ASM high-level language. In: Schwartzbach, M.I., Graf, S. (eds.) TACAS 2000. LNCS, vol.\u00a01785, pp. 331\u2013346. Springer, Heidelberg (2000)"},{"key":"1_CR10","unstructured":"Farahbod, R., et al.: The CoreASM Project, http:\/\/www.coreasm.org"},{"key":"1_CR11","unstructured":"Farahbod, R., Gervasi, V., Gl\u00e4sser, U.: CoreASM: An Extensible ASM Execution Engine. Fundamenta Informaticae\u00a0XXI (2006)"},{"key":"1_CR12","unstructured":"Foundations of Software Engineering Group, Microsoft Research. AsmL. Web pages (2001), http:\/\/research.microsoft.com\/foundations\/AsmL\/"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-36498-6_14","volume-title":"Abstract State Machines 2003. Advances in Theory and Practice","author":"N.G. Fruja","year":"2003","unstructured":"Fruja, N.G., St\u00e4rk, R.F.: The hidden computation steps of turbo Abstract State Machines. In: B\u00f6rger, E., Gargantini, A., Riccobene, E. (eds.) ASM 2003. LNCS, vol.\u00a02589, pp. 244\u2013262. Springer, Heidelberg (2003)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-36498-6_15","volume-title":"Abstract State Machines 2003. Advances in Theory and Practice","author":"A. Gargantini","year":"2003","unstructured":"Gargantini, A., Riccobene, E., Rinzivillo, S.: Using Spin to generate tests from ASM specifications. In: B\u00f6rger, E., Gargantini, A., Riccobene, E. (eds.) ASM 2003. LNCS, vol.\u00a02589, pp. 263\u2013277. Springer, Heidelberg (2003)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36498-6_16","volume-title":"Abstract State Machines 2003. Advances in Theory and Practice","author":"A. Gawanmeh","year":"2003","unstructured":"Gawanmeh, A., Tahar, S., Winter, K.: Interfacing ASMs with the MDG tool. In: B\u00f6rger, E., Gargantini, A., Riccobene, E. (eds.) ASM 2003. LNCS, vol.\u00a02589, pp. 278\u2013292. Springer, Heidelberg (2003)"},{"issue":"1-2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.sysarc.2007.03.007","volume":"54","author":"A. Gawanmeh","year":"2008","unstructured":"Gawanmeh, A., Tahar, S., Winter, K.: Formal verification of asms using mdgs. Journal of Systems Architecture\u00a054(1-2), 15\u201334 (2008)","journal-title":"Journal of Systems Architecture"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11760146_37","volume-title":"Intelligence and Security Informatics","author":"U. Gl\u00e4sser","year":"2006","unstructured":"Gl\u00e4sser, U., Rastkar, S., Vajihollahi, M.: Computational Modeling and Experimental Validation of Aviation Security Procedures. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol.\u00a03975, pp. 420\u2013431. Springer, Heidelberg (2006)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Knuth, D.: Structured programming with goto statements. Computing Surveys\u00a06 (December 1974)","DOI":"10.1145\/356635.356640"},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/7351.7352","volume":"5","author":"L. Lamport","year":"1987","unstructured":"Lamport, L.: A fast mutual exclusion algorithm. ACM Transactions of Computer Systems\u00a05(1), 1\u201311 (1987)","journal-title":"ACM Transactions of Computer Systems"},{"key":"1_CR20","unstructured":"Lamport, L.: A +CAL user\u2019s manual.P-syntax version. (June 29, 2007), http:\/\/research.microsoft.com\/users\/lamport\/tla"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Lamport, L.: The +CAL algorithm language. (February 14, 2008), http:\/\/research.microsoft.com\/users\/lamport\/tla\/pluscal.html","DOI":"10.1007\/978-3-642-03466-4_2"},{"key":"1_CR22","unstructured":"Plonka, C.N.: Model checking for the design with Abstract State Machines. Diplom thesis, CS Department of University of Ulm, Germany (January 2000)"},{"issue":"12","key":"1_CR23","first-page":"1984","volume":"14","author":"A. Slissenko","year":"2008","unstructured":"Slissenko, A., Vasilyev, P.: Simulation of timed Abstract State Machines with predicate logic model-checking. J. Universal Computer Science\u00a014(12), 1984\u20132007 (2008)","journal-title":"J. Universal Computer Science"},{"key":"1_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59495-3","volume-title":"Java and the Java Virtual Machine: Definition, Verification, Validation","author":"R.F. St\u00e4rk","year":"2001","unstructured":"St\u00e4rk, R.F., Schmid, J., B\u00f6rger, E.: Java and the Java Virtual Machine: Definition, Verification, Validation. Springer, Heidelberg (2001)"},{"issue":"5","key":"1_CR25","first-page":"689","volume":"3","author":"K. Winter","year":"1997","unstructured":"Winter, K.: Model checking for Abstract State Machines. J. Universal Computer Science\u00a03(5), 689\u2013701 (1997)","journal-title":"J. Universal Computer Science"}],"container-title":["Lecture Notes in Computer Science","Recent Trends in Algebraic Development Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03429-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T22:16:26Z","timestamp":1739312186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03429-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642034282","9783642034299"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03429-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}