{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:04:56Z","timestamp":1725624296712},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642245589"},{"type":"electronic","value":"9783642245596"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24559-6_6","type":"book-chapter","created":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T11:13:17Z","timestamp":1319195597000},"page":"49-65","source":"Crossref","is-referenced-by-count":4,"title":["The Safety-Critical Java Mission Model: A Formal Account"],"prefix":"10.1007","author":[{"given":"Frank","family":"Zeyda","sequence":"first","affiliation":[]},{"given":"Ana","family":"Cavalcanti","sequence":"additional","affiliation":[]},{"given":"Andy","family":"Wellings","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Verification of Object-Oriented Software. The KeY Approach","year":"2007","unstructured":"Beckert, B., H\u00e4hnle, R., Schmitt, P.H. (eds.): Verification of Object-Oriented Software. LNCS (LNAI), vol.\u00a04334. Springer, Heidelberg (2007)"},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s00165-007-0033-8","volume":"19","author":"P. Brooke","year":"2007","unstructured":"Brooke, P., Paige, R., Jacob, J.: A CSP model of Eiffel\u2019s SCOOP. Formal Aspects of Computing\u00a019(4), 487\u2013512 (2007)","journal-title":"Formal Aspects of Computing"},{"issue":"3","key":"6_CR3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/s10009-004-0167-4","volume":"7","author":"L. Burdy","year":"2005","unstructured":"Burdy, L., Cheon, Y., Cok, D.R., Ernst, M.D., Kiniry, J.R., Leavens, G.T., Leino, K.R.M., Poll, E.: An overview of JML tools and applications. Software Tools for Technology Transfer\u00a07(3), 212\u2013232 (2005)","journal-title":"Software Tools for Technology Transfer"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/340396.340450","volume":"XIX","author":"A. Burns","year":"1999","unstructured":"Burns, A.: The Ravenscar Profile. ACM SIGAda Ada Letters\u00a0XIX, 49\u201352 (1999)","journal-title":"ACM SIGAda Ada Letters"},{"issue":"2-3","key":"6_CR5","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/s00165-003-0006-5","volume":"15","author":"A. Cavalcanti","year":"2003","unstructured":"Cavalcanti, A., Sampaio, A., Woodcock, J.: A Refinement Strategy for Circus. Formal Aspects of Computing\u00a015(2-3), 146\u2013181 (2003)","journal-title":"Formal Aspects of Computing"},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10270-005-0085-2","volume":"4","author":"A. Cavalcanti","year":"2005","unstructured":"Cavalcanti, A., Sampaio, A., Woodcock, J.: Unifying classes and processes. Software Systems and Modeling\u00a04(3), 277\u2013296 (2005)","journal-title":"Software Systems and Modeling"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-21437-0_20","volume-title":"FM 2011: Formal Methods","author":"A. Cavalcanti","year":"2011","unstructured":"Cavalcanti, A., Wellings, A., Woodcock, J.: The Safety-Critical Java Memory Model: A Formal Account. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol.\u00a06664, pp. 246\u2013261. Springer, Heidelberg (2011)"},{"key":"6_CR8","unstructured":"The\u00a0Open Group. Safety Critical Java Technology Specification. Technical Report JSR-302, Java Community Process (January 2011)"},{"key":"6_CR9","volume-title":"JTRES","author":"G. Haddad","year":"2010","unstructured":"Haddad, G., Hussain, F., Leavens, G.T.: The Design of SafeJML, A Specification Language for SCJ with Support for WCET Specification. In: JTRES. ACM, New York (2010)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-85762-4_10","volume-title":"Theoretical Aspects of Computing - ICTAC 2008","author":"W. Harwood","year":"2008","unstructured":"Harwood, W., Cavalcanti, A., Woodcock, J.: A Theory of Pointers for the UTP. In: Fitzgerald, J.S., Haxthausen, A.E., Yenigun, H. (eds.) ICTAC 2008. LNCS, vol.\u00a05160, pp. 141\u2013155. Springer, Heidelberg (2008)"},{"key":"6_CR11","unstructured":"Henties, T., Hunt, J., Locke, D., Nilsen, K., Schoeberl, M., Vitek, J.: Java for Safety-Critical Applications. In: SafeCert (2009)"},{"key":"6_CR12","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)"},{"key":"6_CR13","volume-title":"Unifying Theories of Programming","author":"C.A.R. Hoare","year":"1998","unstructured":"Hoare, C.A.R., Jifeng, H.: Unifying Theories of Programming. Prentice-Hall, Englewood Cliffs (1998)"},{"key":"6_CR14","doi-asserted-by":"crossref","DOI":"10.1145\/1850771","volume-title":"JTRES","author":"T. Kalibera","year":"2010","unstructured":"Kalibera, T., Parizek, P., Malohlava, M.: Exhaustive Testing of Safety Critical Java. In: JTRES. ACM, New York (2010)"},{"key":"6_CR15","volume-title":"Programming from Specifications","author":"C.C. Morgan","year":"1994","unstructured":"Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Englewood Cliffs (1994)","edition":"2"},{"issue":"1-2","key":"6_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00165-007-0052-5","volume":"21","author":"M. Oliveira","year":"2009","unstructured":"Oliveira, M., Cavalcanti, A., Woodcock, J.: A UTP Semantics for Circus. Formal Aspects of Computing\u00a021(1-2), 3\u201332 (2009)","journal-title":"Formal Aspects of Computing"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11768173_2","volume-title":"Unifying Theories of Programming","author":"T. Santos","year":"2006","unstructured":"Santos, T., Cavalcanti, A., Sampaio, A.: Object-Orientation in the UTP. In: Dunne, S., Stoddart, B. (eds.) UTP 2006. LNCS, vol.\u00a04010, pp. 18\u201337. Springer, Heidelberg (2006)"},{"issue":"2","key":"6_CR18","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s00165-009-0119-6","volume":"22","author":"A. Sherif","year":"2009","unstructured":"Sherif, A., Cavalcanti, A., Jifeng, H., Sampaio, A.: A process algebraic framework for specification and validation of real-time systems. Formal Aspects of Computing\u00a022(2), 153\u2013191 (2009)","journal-title":"Formal Aspects of Computing"},{"key":"6_CR19","volume-title":"The Z Notation: A Reference Manual","author":"J. Spivey","year":"1992","unstructured":"Spivey, J.: The Z Notation: A Reference Manual. Prentice-Hall, Englewood Cliffs (1992)"},{"key":"6_CR20","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1145\/1850771.1850792","volume-title":"JTRES","author":"D. Tang","year":"2010","unstructured":"Tang, D., Plsek, A., Vitek, J.: Static Checking of Safety Critical Java Annotations. In: JTRES, pp. 148\u2013154. ACM, New York (2010)"},{"key":"6_CR21","volume-title":"Concurrent and Real-Time Programming in Java","author":"A. Wellings","year":"2004","unstructured":"Wellings, A.: Concurrent and Real-Time Programming in Java. Wiley, Chichester (2004)"},{"key":"6_CR22","volume-title":"JTRES","author":"A. Wellings","year":"2010","unstructured":"Wellings, A., Kim, M.: Asynchronous event handling and safety critical Java. In: JTRES, ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24559-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T13:31:37Z","timestamp":1686403897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24559-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642245589","9783642245596"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24559-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}