{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:58:16Z","timestamp":1725569896661},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642169007"},{"type":"electronic","value":"9783642169014"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16901-4_29","type":"book-chapter","created":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T12:40:06Z","timestamp":1289220006000},"page":"436-451","source":"Crossref","is-referenced-by-count":9,"title":["Reasoning about Safety and Progress Using Contracts"],"prefix":"10.1007","author":[{"given":"Imene","family":"Ben-Hafaiedh","sequence":"first","affiliation":[]},{"given":"Susanne","family":"Graf","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Quinton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"29_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201ddesign by contract\u201d. IEEE Computer\u00a025(10), 40\u201351 (1992)","journal-title":"IEEE Computer"},{"key":"29_CR2","first-page":"377","volume-title":"Proc. of SEFM 2008","author":"S. Quinton","year":"2008","unstructured":"Quinton, S., Graf, S.: Contract-based verification of hierarchical systems of components. In: Proc. of SEFM 2008, pp. 377\u2013381. IEEE Computer Society, Los Alamitos (2008)"},{"key":"29_CR3","series-title":"Specification","volume-title":"The temporal logic of reactive and concurrent systems","author":"Z. Manna","year":"1991","unstructured":"Manna, Z., Pnueli, A.: The temporal logic of reactive and concurrent systems. Specification, vol.\u00a01. Springer, Heidelberg (1991)"},{"key":"29_CR4","first-page":"293","volume-title":"Proc. of SEFM 2005","author":"J. Sifakis","year":"2005","unstructured":"Sifakis, J.: A framework for component-based construction. In: Proc. of SEFM 2005, pp. 293\u2013300. IEEE Computer Society, Los Alamitos (2005)"},{"key":"29_CR5","first-page":"109","volume-title":"Proc. of ESEC\/SIGSOFT FSE 2001","author":"L. Alfaro de","year":"2001","unstructured":"de Alfaro, L., Henzinger, T.A.: Interface automata. In: Proc. of ESEC\/SIGSOFT FSE 2001, pp. 109\u2013120. ACM Press, New York (2001)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-39958-2_8","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"P. Bidinger","year":"2003","unstructured":"Bidinger, P., Stefani, J.B.: The Kell calculus: operational semantics and type systems. In: Najm, E., Nestmann, U., Stevens, P. (eds.) FMOODS 2003. LNCS, vol.\u00a02884, pp. 109\u2013123. Springer, Heidelberg (2003)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Arbab, F.: Reo: a channel-based coordination model for component composition. Mathematical Strucutres in Computer Science\u00a014(3) (2004)","DOI":"10.1017\/S0960129504004153"},{"key":"29_CR8","first-page":"3","volume-title":"Proc. of SEFM 2006","author":"A. Basu","year":"2006","unstructured":"Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: Proc. of SEFM 2006, pp. 3\u201312. IEEE Computer Society, Los Alamitos (2006)"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-92188-2_9","volume-title":"Formal Methods for Components and Objects","author":"A. Benveniste","year":"2008","unstructured":"Benveniste, A., Caillaud, B., Ferrari, A., Mangeruca, L., Passerone, R., Sofronis, C.: Multiple viewpoint contract-based specification and design. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2007. LNCS, vol.\u00a05382, pp. 200\u2013225. Springer, Heidelberg (2008)"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Ben-Hafaiedh, I., Graf, S., Quinton, S.: A contract framework for reasoning about safety and progress. Technical Report TR-2010-11, Verimag (2010)","DOI":"10.1007\/978-3-642-16901-4_29"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/3-540-52148-8_6","volume-title":"Automatic Verification Methods for Finite State Systems","author":"Z. Stadler","year":"1990","unstructured":"Stadler, Z., Grumberg, O.: Network grammars, communication behaviours and automatic verification. In: Sifakis, J. (ed.) CAV 1989. LNCS, vol.\u00a0407, pp. 68\u201380. Springer, Heidelberg (1990)"},{"key":"29_CR12","first-page":"11","volume-title":"Proc. of EMSOFT 2007","author":"S. Bliudze","year":"2007","unstructured":"Bliudze, S., Sifakis, J.: The algebra of connectors: structuring interaction in BIP. In: Proc. of EMSOFT 2007, pp. 11\u201320. ACM Press, New York (2007)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Bozga, M., Jaber, M., Sifakis, J.: Source-to-source architecture transformation for performance optimization in BIP. In: Proc. of SIES 2009, pp. 152\u2013160 (2009)","DOI":"10.1109\/SIES.2009.5196211"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Datta, A.K., Devismes, S., Horn, F., Larmore, L.L.: Self-stabilizing k-out-of-l exclusion on tree network. CoRR abs\/0812.1093 (2008)","DOI":"10.1109\/IPDPS.2009.5160875"},{"key":"29_CR15","volume-title":"Concurrency Verification: Introduction to Compositional and Noncompositional Methods","author":"W.P. Roever de","year":"2001","unstructured":"de Roever, W.P., de Boer, F., Hannemann, U., Hooman, J., Lakhnech, Y., Poel, M., Zwiers, J.: Concurrency Verification: Introduction to Compositional and Noncompositional Methods, vol.\u00a054. Cambridge University Press, Cambridge (2001)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16901-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T00:12:34Z","timestamp":1559779954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16901-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642169007","9783642169014"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16901-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}