{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:14:31Z","timestamp":1773375271273,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642410093","type":"print"},{"value":"9783642410109","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41010-9_5","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T05:31:39Z","timestamp":1379309499000},"page":"63-77","source":"Crossref","is-referenced-by-count":44,"title":["Study on the Barriers to the Industrial Adoption of Formal Methods"],"prefix":"10.1007","author":[{"given":"Jennifer A.","family":"Davis","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Darren","family":"Cofer","sequence":"additional","affiliation":[]},{"given":"Aaron","family":"Fifarek","sequence":"additional","affiliation":[]},{"given":"Jacob","family":"Hinchman","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Hoffman","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Hulbert","sequence":"additional","affiliation":[]},{"given":"Steven P.","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Hardin, D.S.: Design and Verification of Microprocessor Systems for High- Assurance Applications. Springer (2010)","DOI":"10.1007\/978-1-4419-1539-9"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/11757283_8","volume-title":"Formal Methods for Hardware Verification","author":"J. Harrison","year":"2006","unstructured":"Harrison, J.: Floating-Point Verification Using Theorem Proving. In: Bernardo, M., Cimatti, A. (eds.) SFM 2006. LNCS, vol.\u00a03965, pp. 211\u2013242. Springer, Heidelberg (2006)"},{"key":"5_CR3","unstructured":"Austin, S., Parkin, G.: Formal Methods: A survey, National Physical Laboratory, Teddington, Middlesex, UK (1993)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Craigen, D., Gerhart, S., Ralston, T.: An International Survey of Industrial Applications of Formal Methods (2 volumes), U.S. National Institute of Standards and Technology, Computer Systems Laboratory (1993)","DOI":"10.1016\/B978-0-8155-1362-9.50005-6"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/242223.242257","volume":"28","author":"E.M. Clarke","year":"1996","unstructured":"Clarke, E.M., Wing, J.M.: Formal Methods: State of the Art and Future Directions. ACM Computing Surveys\u00a028, 626\u2013643 (1996)","journal-title":"ACM Computing Surveys"},{"key":"5_CR6","unstructured":"Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: The Industrial Application of Formal Methods: an International Survey, \n                  \n                    http:\/\/fmsurvey.org\/\n                  \n                  \n                 (accessed June 2012)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1007\/978-3-642-05089-3_52","volume-title":"FM 2009: Formal Methods","author":"J.C. Bicarregui","year":"2009","unstructured":"Bicarregui, J.C., Fitzgerald, J.S., Larsen, P.G., Woodcock, J.C.P.: Industrial Practice in Formal Methods: A Review. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol.\u00a05850, pp. 810\u2013813. Springer, Heidelberg (2009)"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592434.1592436","volume":"41","author":"J. Woodcock","year":"2009","unstructured":"Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal Methods: Practice and experience. ACM Computing Surveys\u00a041(4), 1\u201340 (2009)","journal-title":"ACM Computing Surveys"},{"key":"5_CR9","unstructured":"Krieker, J., Tarlecki, A., Vardi, M.Y., Wilhelm, R.: Modeling, Analysis, and Verification - The Formal Methods Manifesto 2010. In: Dagstuhl Manifestos 1. Schloss Dagstuhl, Germany (2011)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-16164-3_6","volume-title":"Model Checking Software","author":"D. Cofer","year":"2010","unstructured":"Cofer, D.: Model Checking: Cleared for Take Off. In: van de Pol, J., Weber, M. (eds.) SPIN 2010. LNCS, vol.\u00a06349, pp. 76\u201387. Springer, Heidelberg (2010)"},{"key":"5_CR11","unstructured":"Holloway, C.M.: Issues in Software Safety: Polly Ann Smith Co. v. Ned I. Ludd. In: Proceedings of the 20th International System Safety Conference, August 5-9. Denver, Colorado (2002)"},{"key":"5_CR12","unstructured":"Miller, S.P.: Lessons from Twenty Years of Industrial Formal Methods. In: Proceedings of HCSS (2012), \n                  \n                    http:\/\/cps-vo.org\/node\/3434"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41010-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T06:17:44Z","timestamp":1558073864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41010-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642410093","9783642410109"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41010-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}