{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:24:47Z","timestamp":1726410287761},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642169007"},{"type":"electronic","value":"9783642169014"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16901-4_14","type":"book-chapter","created":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T12:40:06Z","timestamp":1289220006000},"page":"188-203","source":"Crossref","is-referenced-by-count":0,"title":["API Conformance Verification for Java Programs"],"prefix":"10.1007","author":[{"given":"Xin","family":"Li","sequence":"first","affiliation":[]},{"given":"H. James","family":"Hoover","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Rudnicki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Java 2 platform api specification, http:\/\/download-llnw.oracle.com\/javase\/1.5.0\/docs\/api\/index.html ."},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10515-007-0008-2","volume":"14","author":"A. Betin-Can","year":"2007","unstructured":"Betin-Can, A., Bultan, T., Lindvall, M., Lux, B., Topp, S.: Eliminating synchronization faults in air traffic control software via design for verification with concurrency controllers. Automated Software Engg.\u00a014(2), 129\u2013178 (2007)","journal-title":"Automated Software Engg."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Bierhoff, K.: Api protocol compliance in object-oriented software, PhD Thesis, Carnegie Mellon University, School of Computer Science (2009)","DOI":"10.1145\/1449814.1449906"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-03013-0_10","volume-title":"ECOOP 2009 \u2013 Object-Oriented Programming","author":"K. Bierhoff","year":"2009","unstructured":"Bierhoff, K., Beckman, N.E., Aldrich, J.: Practical api protocol checking with access permissions. In: Drossopoulou, S. (ed.) ECOOP 2009 \u2013 Object-Oriented Programming. LNCS, vol.\u00a05653, pp. 195\u2013219. Springer, Heidelberg (2009)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-540-24851-4_21","volume-title":"ECOOP 2004 \u2013 Object-Oriented Programming","author":"R. DeLine","year":"2004","unstructured":"DeLine, R., F\u00e4hndrich, M.: Typestates for objects. In: Odersky, M. (ed.) ECOOP 2004. LNCS, vol.\u00a03086, pp. 465\u2013490. Springer, Heidelberg (2004)"},{"key":"14_CR6","unstructured":"Dennis, G.: Tsafe: Building a trusted computing base for air traffic control software, Master\u2019s Thesis, MIT (2003)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Fink, S., Yahav, E., Dor, N., Ramalingam, G., Geay, E.: Effective typestate verification in the presence of aliasing. In: ISSTA (2006)","DOI":"10.1145\/1146238.1146254"},{"key":"14_CR8","unstructured":"Li, X.: Fex: A model checking framework for event sequences, Technical report TR08-14, University of Alberta (2008)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Li, X., James Hoover, H., Rudnicki, P.: Towards automatic exception safety verification. In: FM, pp. 396\u2013411 (2006)","DOI":"10.1007\/11813040_27"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11334-005-0007-z","volume":"1","author":"M. Lindvall","year":"2005","unstructured":"Lindvall, M., Rus, I., Shull, F., Zelkowitz, M.V., Donzelli, P., Memon, A.M., Basili, V.R., Costa, P., Tvedt, R.T., Hochstein, L., Asgari, S., Ackermann, C., Pech, D.: An evolutionary testbed for software technology evaluation. NASA Journal of Innovations in Systems and Software Engineering\u00a01(1), 3\u201311 (2005)","journal-title":"NASA Journal of Innovations in Systems and Software Engineering"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Ramalingam, G., Warshavsky, A., Field, J., Goyal, D., Sagiv, M.: Deriving specialized program analyses for certifying component-client conformance. In: PLDI, pp. 83\u201394 (2002)","DOI":"10.1145\/512529.512540"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Reiss, S.P.: Specifying and checking component usage. In: AADEBUG, pp. 13\u201322 (2005)","DOI":"10.1145\/1085130.1085133"},{"issue":"2","key":"14_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/941566.941569","volume":"12","author":"M.P. Robillard","year":"2003","unstructured":"Robillard, M.P., Murphy, G.C.: Static analysis to support the evolution of exception structure in object-oriented systems. ACM Trans. Softw. Eng. Methodol.\u00a012(2), 191\u2013221 (2003)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TSE.1986.6312929","volume":"12","author":"R.E. Strom","year":"1986","unstructured":"Strom, R.E., Yemini, S.: Typestate: A programming language concept for enhancing software reliability. IEEE Trans. Softw. Eng.\u00a012(1), 157\u2013171 (1986)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"14_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1022920129859","volume":"10","author":"W. Visser","year":"2003","unstructured":"Visser, W., Havelund, K., Brat, G., Park, S., Lerda, F.: Model checking programs. Automated Software Engg.\u00a010(2), 203\u2013232 (2003)","journal-title":"Automated Software Engg."},{"issue":"4","key":"14_CR16","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M. Weiser","year":"1984","unstructured":"Weiser, M.: Program slicing. IEEE Trans. Software Eng.\u00a010(4), 352\u2013357 (1984)","journal-title":"IEEE Trans. Software Eng."}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16901-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:27:13Z","timestamp":1685838433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16901-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642169007","9783642169014"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16901-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}