{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:28:50Z","timestamp":1743136130386,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642880513"},{"type":"electronic","value":"9783642880490"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/978-3-642-88049-0_9","type":"book-chapter","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T16:35:39Z","timestamp":1386606939000},"page":"161-185","source":"Crossref","is-referenced-by-count":0,"title":["Safety Licensing and Formal Correctness of High Integrity Embedded Systems"],"prefix":"10.1007","author":[{"given":"John","family":"Cullyer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"British Computer Society Monograph on the Specification, Design and Verification of Safety- Critical Software,edited by B.A. Wichmann, 1991."},{"key":"9_CR2","volume-title":"B.k","author":"JY Bromell","year":"1987","unstructured":"Bromell, J.Y., Sadler, S.J., A Strategy for the Development of Safety-critical Software, in: Achieving Safety and Reliability with Computer Systems, ed. B.K. Daniels, Elsevier Applied Science, 1987."},{"key":"9_CR3","volume-title":"Reliable Programming in Standard Languages in High Integrity Software","author":"BA Carr\u00e9","year":"1989","unstructured":"Carr\u00e9, B.A., Reliable Programming in Standard Languages in High Integrity Software, edited by C. Sennett, Pitman Publishing, 1989."},{"key":"9_CR4","volume-title":"Spark - The Spade Ada Kernel","author":"BA Carr\u00e9","year":"1989","unstructured":"Carr\u00e9, B.A., SPARK - The SPADE Ada Kernel, Program Validation Limited, Southampton, UK, 1989."},{"key":"9_CR5","volume-title":"Addison-wesley Publishing Company","author":"B Cohen","year":"1989","unstructured":"Cohen, B., Harwood, W.T., Jackson, M.I., The Specification of Complex Systems, Addison-Wesley Publishing Company 1989."},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1049\/sej.1991.0007","volume":"6","author":"WJ Cullyer","year":"1991","unstructured":"Cullyer, W.J., Goodenough, S.J., Wichmann B A, The Choice of Computer Languages for Use in Safety-Critical Systems, Software Engineering Journal, Vol 6, No 2, 1991, 51\u201358.","journal-title":"Software Engineering Journal"},{"issue":"5","key":"9_CR7","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1049\/cce:19910055","volume":"2","author":"W Cullyer","year":"1991","unstructured":"Cullyer, W. J., Safety-Critical Control Systems, Computer and Control Engineering Journal, Vol. 2, No. 5, September 1991, 202\u2013210.","journal-title":"Computer and Control Engineering Journal"},{"key":"9_CR8","volume-title":"Application of Formal Methods to Highly Reliable Software for Spacecraft and for the Dsn","author":"WJ Cullyer","year":"1992","unstructured":"Cullyer, W.J., Application of Formal Methods to Highly Reliable Software for Spacecraft and for the DSN, NASA Jet Propulsion Laboratory Report, May 1992."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Fagan, M., Design and Code Inspections to Reduce Errors in Code Development, IBM Systems Journal, Vol. 15, No 3, 1976.","DOI":"10.1147\/sj.153.0182"},{"key":"9_CR10","first-page":"109","volume":"4","author":"Goodall","year":"1985","unstructured":"Goodall, R.M., High Speed Digital Controllers Using an 8 Bit Microprocessor Software and Microsystems, Vol. 4, 1985, 109\u2013116.","journal-title":"Vol"},{"key":"9_CR11","volume-title":"Kluwer Academic Publishers","author":"M Gordon","year":"1987","unstructured":"Gordon, M. J., A Proof Generating System for Higher-Order Logic, Kluwer Academic Publishers, 1987."},{"key":"9_CR12","unstructured":"Hale, R.S., Programming in Temporal Logic, Computer Laboratory, University of Cambridge, Report No. 173, July 1989."},{"key":"9_CR13","unstructured":"Jones, C.B., Systematic Software Development Using VDM, Prentice Hall International, 1986."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Leveson, N.G., Harvey, P.R., Analyzing Software Safety, IEEE Transactions on Software Engineering SE-9, No. 9, 1983.","DOI":"10.1109\/TSE.1983.235116"},{"key":"9_CR15","volume-title":"Pitman Publishing","author":"McDermid","year":"1989","unstructured":"McDermid, J., Assurance in High-Integrity Software, in: High Integrity Software, edited by C. Sennett, Pitman Publishing 1989."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Parnas, D.L., van Schouwen, J., Kwan, S.P., Evaluation of Safety-Critical Software, Communications of the ACM, Vol. 3, June 1990.","DOI":"10.1145\/78973.78974"},{"key":"9_CR17","volume-title":"Prentice Hall International","author":"Spivey","year":"1988","unstructured":"Spivey, J.M., The Z Notation, Prentice Hall International, 1988."},{"key":"9_CR18","unstructured":"A Guide to the Methods and Software Tools for the Construction of Large Real Time Systems,STARTS Guide, 2nd edition, Vol. 1\u20132, UK National Computing Centre, Manchester, UK, 1987."},{"key":"9_CR19","volume-title":"Applications of Formal Methods in Engineering, Ph.D. thesis","author":"SC Tran","year":"1992","unstructured":"Tran, S.C., Applications of Formal Methods in Engineering, Ph.D. thesis, Department of Engineering, University of Warwick, UK, May 1992."},{"key":"9_CR20","unstructured":"Wichmann, B.A., Insecurities in the Ada Language, National Physical Laboratory, Teddington UK, report DITC 137 \/89, 1989."},{"key":"9_CR21","volume-title":"Pitman Publishing","author":"J Woodcock","year":"1988","unstructured":"Woodcock, J., Loomes, M., Software Engineering Mathematics, Pitman Publishing, 1988."},{"key":"9_CR22","volume-title":"Application of Higher Order Logic to Railway Signalling and Interlocking, Ph.D. thesis","author":"W Wong","year":"1992","unstructured":"Wong, W., Application of Higher Order Logic to Railway Signalling and Interlocking, Ph.D. thesis, Department of Engineering, University of Warwick, UK, March 1992."}],"container-title":["NATO ASI Series","Real Time Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-88049-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T10:53:01Z","timestamp":1676371981000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-88049-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783642880513","9783642880490"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-88049-0_9","relation":{},"ISSN":["0258-1248"],"issn-type":[{"type":"print","value":"0258-1248"}],"subject":[],"published":{"date-parts":[[1994]]}}}