{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:10:10Z","timestamp":1745964610247,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642370564"},{"type":"electronic","value":"9783642370571"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37057-1_13","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T19:37:04Z","timestamp":1361216224000},"page":"179-193","source":"Crossref","is-referenced-by-count":1,"title":["Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification"],"prefix":"10.1007","author":[{"given":"Lan","family":"Lin","sequence":"first","affiliation":[]},{"given":"Jesse H.","family":"Poore","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Eschbach","sequence":"additional","affiliation":[]},{"given":"Robert M.","family":"Hierons","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Robinson-Mallett","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Bartussek, W., Parnas, D.L.: Using assertions about traces to write abstract specifications for software modules. In: Proceedings of the 2nd Conference of the European Cooperation on Informatics, Venice, Italy, pp. 211\u2013236 (1978)","DOI":"10.1007\/3-540-08934-9_80"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Bauer, T., Beletski, T., Boehr, F., Eschbach, R., Landmann, D., Poore, J.: From requirements to statistical testing of embedded systems. In: Proceedings of the 4th International Workshop on Software Engineering for Automotive Systems, Minneapolis, MN, pp. 3\u20139 (2007)","DOI":"10.1109\/SEAS.2007.5"},{"key":"13_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9771-7","volume-title":"String-Rewriting Systems","author":"R.V. Book","year":"1993","unstructured":"Book, R.V., Otto, F.: String-Rewriting Systems. Springer, Berlin (1993)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Broadfoot, G.H., Broadfoot, P.J.: Academia and industry meet: Some experiences of formal methods in practice. In: Proceedings of the 10th Asia-Pacific Software Engineering Conference, Chiang Mai, Thailand, pp. 49\u201359 (2003)","DOI":"10.1109\/APSEC.2003.1254357"},{"issue":"4","key":"13_CR5","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1145\/321239.321249","volume":"11","author":"J. Brzozowski","year":"1964","unstructured":"Brzozowski, J.: Derivatives of regular expressions. Journal of the ACM\u00a011(4), 481\u2013494 (1964)","journal-title":"Journal of the ACM"},{"key":"13_CR6","unstructured":"Brzozowski, J., J\u00fcrgensen, H.: Theory of deterministic trace-assertion specifications. Technical report CS-2004-30, University of Waterloo (2004)"},{"issue":"5","key":"13_CR7","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1142\/S0129054105003327","volume":"16","author":"J. Brzozowski","year":"2005","unstructured":"Brzozowski, J., J\u00fcrgensen, H.: Representation of semiautomata by canonical words and equivalences. International Journal of Foundations of Computer Science\u00a016(5), 831\u2013850 (2005)","journal-title":"International Journal of Foundations of Computer Science"},{"key":"13_CR8","unstructured":"Eschbach, R., Lin, L., Poore, J.H.: Applying string-rewriting to sequence-based specification. Technical report ut-cs-12-692, University of Tennessee, Knoxville (2012), http:\/\/web.eecs.utk.edu\/~library\/TechReports\/2012\/ut-cs-12-692.pdf"},{"key":"13_CR9","volume-title":"Introduction to the Theory of Finite-State Machines","author":"A. Gill","year":"1962","unstructured":"Gill, A.: Introduction to the Theory of Finite-State Machines. McGraw-Hill, New York (1962)"},{"issue":"6","key":"13_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.entcs.2005.04.008","volume":"128","author":"P.J. Hopcroft","year":"2005","unstructured":"Hopcroft, P.J., Broadfoot, G.H.: Combining the box structure development method and CSP for software development. Electronic Notes in Theoretical Computer Science\u00a0128(6), 127\u2013144 (2005)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"volume-title":"Real-Time Systems: Specification, Verification and Analysis","year":"1996","key":"13_CR11","unstructured":"Joseph, M. (ed.): Real-Time Systems: Specification, Verification and Analysis. Prentice Hall International, London (1996)"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.tcs.2009.06.041","volume":"411","author":"L. Lin","year":"2010","unstructured":"Lin, L., Prowell, S.J., Poore, J.H.: An axiom system for sequence-based specification. Theoretical Computer Science\u00a0411(2), 360\u2013376 (2010)","journal-title":"Theoretical Computer Science"},{"key":"13_CR13","volume-title":"Structured Programming: Theory and Practice","author":"R.C. Linger","year":"1979","unstructured":"Linger, R.C., Mills, H.D., Witt, B.I.: Structured Programming: Theory and Practice. Addison-Wesley, Boston (1979)"},{"issue":"6","key":"13_CR14","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/2.948","volume":"21","author":"H.D. Mills","year":"1988","unstructured":"Mills, H.D.: Stepwise refinement and verification in box-structured systems. IEEE Computer\u00a021(6), 23\u201336 (1988)","journal-title":"IEEE Computer"},{"issue":"1","key":"13_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/360569.360659","volume":"18","author":"H.D. Mills","year":"1975","unstructured":"Mills, H.D.: The new math of computer programming. Communications of the ACM\u00a018(1), 43\u201348 (1975)","journal-title":"Communications of the ACM"},{"key":"13_CR16","unstructured":"MPCS: Mine pump controller software enumeration (2012), http:\/\/sqrl.eecs.utk.edu\/btw\/files\/MPCS_sr.html"},{"key":"13_CR17","unstructured":"Parnas, D.L., Wang, Y.: The trace assertion method of module interface specification. Technical report 89-261, Queens University (1989)"},{"key":"13_CR18","unstructured":"Proto_Seq: ESP project (2012), http:\/\/sqrl.eecs.utk.edu\/esp\/index.html"},{"issue":"3","key":"13_CR19","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1002\/(SICI)1097-024X(199803)28:3<329::AID-SPE157>3.0.CO;2-H","volume":"28","author":"S.J. Prowell","year":"1998","unstructured":"Prowell, S.J., Poore, J.H.: Sequence-based software specification of deterministic systems. Software: Practice and Experience\u00a028(3), 329\u2013344 (1998)","journal-title":"Software: Practice and Experience"},{"issue":"5","key":"13_CR20","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TSE.2003.1199071","volume":"29","author":"S.J. Prowell","year":"2003","unstructured":"Prowell, S.J., Poore, J.H.: Foundations of sequence-based software specification. IEEE Transactions on Software Engineering\u00a029(5), 417\u2013429 (2003)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"13_CR21","volume-title":"Cleanroom Software Engineering: Technology and Process","author":"S.J. Prowell","year":"1999","unstructured":"Prowell, S.J., Trammell, C.J., Linger, R.C., Poore, J.H.: Cleanroom Software Engineering: Technology and Process. Addison-Wesley, Reading (1999)"},{"key":"13_CR22","unstructured":"SOS: Satellite operations software enumeration (2012), http:\/\/sqrl.eecs.utk.edu\/btw\/files\/SOS_sr.html"},{"issue":"10","key":"13_CR23","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1109\/32.328996","volume":"20","author":"Y. Wang","year":"1994","unstructured":"Wang, Y., Parnas, D.L.: Simulating the behavior of software modules by trace rewriting. IEEE Transactions on Software Engineering\u00a020(10), 750\u2013759 (1994)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Wang, Y., Parnas, D.L.: Simulating the behavior of software modules by trace rewriting. In: Proceedings of the 15th International Conference on Software Engineering, Baltimore, MD, pp. 14\u201323 (1993)","DOI":"10.1109\/ICSE.1993.346059"},{"key":"13_CR25","unstructured":"Weigh-In-Motion: Weigh-In-Motion, Cube Management, and Marking User Manual, Oak Ridge National Laboratory, Oak Ridge, TN, Version 0.8.2. (2006)"},{"key":"13_CR26","unstructured":"WIMDAP: Weigh-in-motion data acquisition processor enumeration (2012), http:\/\/sqrl.eecs.utk.edu\/btw\/files\/WIMDAP_sr.html"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37057-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T21:32:43Z","timestamp":1745962363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37057-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642370564","9783642370571"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37057-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}