{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:41:45Z","timestamp":1725748905101},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642410093"},{"type":"electronic","value":"9783642410109"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41010-9_3","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T05:31:39Z","timestamp":1379309499000},"page":"32-47","source":"Crossref","is-referenced-by-count":0,"title":["An Outline Workflow for Practical Formal Verification from Software Requirements to Object Code"],"prefix":"10.1007","author":[{"given":"Darren","family":"Sexton","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-69149-5_39","volume-title":"Verified Software: Theories, Tools, Experiments","author":"A. Galloway","year":"2008","unstructured":"Galloway, A., Iwu, F., McDermid, J.A., Toyn, I.: On the formal development of safety-critical software. In: Meyer, B., Woodcock, J. (eds.) VSTTE 2005. LNCS, vol.\u00a04171, pp. 362\u2013373. Springer, Heidelberg (2008)"},{"unstructured":"K\u00e4stner, D., Brockmeyer, U., Pister, M., Nenova, S., Bienm\u00fcller, T., Dereani, A., Ferdinand, C.: Leveraging from the combination of model-based analysis and testing. In: EmbeddedWorld (2013)","key":"3_CR2"},{"unstructured":"ISO 26262 compliant verification of functional requirements in the model-based software development process, BTC Embedded Systems (2011)","key":"3_CR3"},{"unstructured":"Astr\u00e9e, \n                  \n                    http:\/\/www.absint.com\/astree\/index.htm","key":"3_CR4"},{"unstructured":"Polyspace, \n                  \n                    http:\/\/www.mathworks.co.uk\/products\/polyspaceserverc\/","key":"3_CR5"},{"unstructured":"MBAT project, \n                  \n                    https:\/\/www.mbat-artemis.eu\/home\/","key":"3_CR6"},{"unstructured":"CESAR deliverable D_SP2_R2.3_M3, On the formal development of safety-critical software","key":"3_CR7"},{"unstructured":"ISO 26262, Road vehicles \u2013 Functional safety, part 6: Product development at the software level","key":"3_CR8"},{"unstructured":"ISO 26262, Road vehicles \u2013 Functional safety, part 8: Supporting processes","key":"3_CR9"},{"unstructured":"ISO 26262, Road vehicles \u2013 Functional safety, part 1: Vocabulary","key":"3_CR10"},{"unstructured":"Oxford Dictionaries, \n                  \n                    http:\/\/oxforddictionaries.com","key":"3_CR11"},{"unstructured":"Collins Dictionary, \n                  \n                    http:\/\/collinsdictionary.com","key":"3_CR12"},{"unstructured":"Model-based software development for safety-critical systems TargetLink reference workflow, dSPACE (2009)","key":"3_CR13"},{"unstructured":"Software considerations in airborne, systems and equipment certification, DO-178C \/ ED-12C","key":"3_CR14"},{"unstructured":"Formal methods supplement to ED-12C and ED-109A","key":"3_CR15"},{"unstructured":"Functional safety of electrical \/ electronic\/ programmable electronic safety-related systems, IEC 61508, part 7","key":"3_CR16"},{"unstructured":"Addendum to TargetLink reference workflow overview and variations, dSPACE and BTC-Embedded Systems (2012)","key":"3_CR17"},{"unstructured":"Simulink Design Verifier, \n                  \n                    http:\/\/www.mathworks.co.uk\/products\/sldesignverifier\/","key":"3_CR18"},{"unstructured":"Embedded Validator, \n                  \n                    http:\/\/www.btc-es.de\/index.php?lang=2andidcatside=5","key":"3_CR19"},{"unstructured":"Advanced validation techniques meet complexity, OFFIS and I-Logix","key":"3_CR20"},{"unstructured":"EmbeddedSpecifier, \n                  \n                    http:\/\/www.btc-es.de\/index.php?lang=2andidcatside=52","key":"3_CR21"},{"unstructured":"EmbeddedTester, \n                  \n                    http:\/\/www.btc-es.de\/index.php?lang=2andidcatside=2","key":"3_CR22"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41010-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T07:11:42Z","timestamp":1558077102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41010-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642410093","9783642410109"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41010-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}