{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T09:16:46Z","timestamp":1672651006319},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1977,1,1]],"date-time":"1977-01-01T00:00:00Z","timestamp":220924800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Acta Informatica"],"published-print":{"date-parts":[[1977]]},"DOI":"10.1007\/bf00289246","type":"journal-article","created":{"date-parts":[[2004,10,5]],"date-time":"2004-10-05T03:37:55Z","timestamp":1096947475000},"page":"145-152","source":"Crossref","is-referenced-by-count":5,"title":["Rules of inference for procedure calls"],"prefix":"10.1007","volume":"8","author":[{"given":"George W.","family":"Ernst","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C.A.R. Hoare","year":"1969","unstructured":"Hoare, C.A.R.: An axiomatic basis for computer programming. Comm. ACM 12, 576?581 (1969)","journal-title":"Comm. ACM"},{"key":"CR2","series-title":"Lecture Notes in Mathematics, Vol. 188","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/BFb0059696","volume-title":"Symposium on semantics of algorithmic languages","author":"C.A.R. Hoare","year":"1971","unstructured":"Hoare, C.A.R.: Procedures and parameters: An axiomatic approach. In: Symposium on semantics of algorithmic languages (E. Engler, ed.), Lecture Notes in Mathematics, Vol. 188, pp. 102?116. Berlin-Heidelberg-New York: Springer 1971"},{"key":"CR3","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1145\/800191.805651","volume-title":"ACM '76: Proceedings of the annual conference","author":"R.J. Hookway","year":"1976","unstructured":"Hookway, R.J., Ernst, G.W.: A program verification system. ACM '76: Proceedings of the annual conference, pp. 504?508. New York: Association for Computing Machinery 1976"},{"key":"CR4","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/BF00288746","volume":"4","author":"S. Igarashi","year":"1975","unstructured":"Igarashi, S., London, R.L., Luckham, D.C.: Automatic program verification. I. A logical basis and its implementation. Acta Informatica 4, 145?182 (1975)","journal-title":"Acta Informatica"},{"key":"CR5","volume-title":"Lecture Notes in Computer Science, Vol. 18","author":"K. Jensen","year":"1975","unstructured":"Jensen, K., With, N.: PASCAL user manual and report, 2nd ed. Lecture Notes in Computer Science, Vol. 18. Berlin-Heidelberg-New York: Springer 1975","edition":"2nd ed."}],"container-title":["Acta Informatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00289246.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00289246\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00289246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T21:14:45Z","timestamp":1554758085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00289246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1977]]},"references-count":5,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1977]]}},"alternative-id":["BF00289246"],"URL":"https:\/\/doi.org\/10.1007\/bf00289246","relation":{},"ISSN":["0001-5903","1432-0525"],"issn-type":[{"value":"0001-5903","type":"print"},{"value":"1432-0525","type":"electronic"}],"subject":[],"published":{"date-parts":[[1977]]}}}