{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:27:30Z","timestamp":1725456450062},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540613176"},{"type":"electronic","value":"9783540684572"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/bfb0013484","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T03:54:12Z","timestamp":1132718052000},"page":"135-146","source":"Crossref","is-referenced-by-count":5,"title":["Tasking deadlocks in Ada 95 programs and their detection"],"prefix":"10.1007","author":[{"given":"Jingde","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Ushijima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"issue":"No.6","key":"10_CR1","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/164982.164992","volume":"13","author":"J. Barnes","year":"1993","unstructured":"Barnes, J.: Introducing Ada 9X, ACM Ada Letters, Vol.13, No.6 (1993) 61\u2013132","journal-title":"ACM Ada Letters"},{"key":"10_CR2","unstructured":"Barnes, J.; Programming in Ada 95, Addison-Wesley (1995)"},{"issue":"No.5","key":"10_CR3","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1145\/381837.381846","volume":"10","author":"J. Cheng","year":"1990","unstructured":"Cheng, J.: A Classification of Tasking Deadlocks, ACM Ada Letters, Vol.10, No.5 (1990) 110\u2013127","journal-title":"ACM Ada Letters"},{"issue":"No.l","key":"10_CR4","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/122037.122040","volume":"11","author":"J. Cheng","year":"1991","unstructured":"Cheng, J.: A Survey of Tasking Deadlock Detection Methods, ACM Ada Letters, Vol.11, No.l (1991) 82\u201391","journal-title":"ACM Ada Letters"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, J., Kasahara, Y., Ushijima, K.: A Tasking Deadlock Detector for Ada Programs, Proc. IEEE-CS 15th Annual International Computer Software & Applications Conference (1991) 56-63","DOI":"10.1109\/CMPSAC.1991.170152"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, J., Ushijima, K.: Analyzing Ada Tasking Deadlocks and Livelocks Using Extended Petri Nets, in Christodoulakis, D. (ed.), \u201cAda: The Choice for '92,\u201d Lecture Notes in Computer Science, Vol.499, Springer-Verlag (1991) 125\u2013146","DOI":"10.1007\/BFb0018493"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, J., Ushijima, K.: Partial Order Transparency as a Tool to Reduce Interference in Monitoring Concurrent Systems, in Ohno, Y. (ed.), \u201cDistributed Environments,\u201d Springer-Verlag (1991) 156\u2013171","DOI":"10.1007\/978-4-431-68144-1_11"},{"issue":"No.4","key":"10_CR8","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1145\/201024.201038","volume":"3","author":"S. Duri","year":"1994","unstructured":"Duri, S., Buy, U., Devarapalli, R., Shatz, S.M.: Application and Experimental Evaluation of State Space Reduction Methods for Deadlock Analysis in Ada, ACM Transactions on Software Engineering and Methodology, Vol.3, No.4 (1994) 340\u2013380","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Clarke, L.A., Nies, K.A.: A Compact Petri Net Representation for Concurrent Programs, Proc. IEEE-CS & ACM 17th International Conference on Software Engineering (1995) 147\u2013157","DOI":"10.1145\/225014.225028"},{"key":"10_CR10","unstructured":"International Organization for Standardization: Information Technology \u2014 Programming Language \u2014 Ada, ISO\/IEC 8652:1995(E), 1995"},{"issue":"No.10","key":"10_CR11","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/32.99197","volume":"17","author":"G.M. Karam","year":"1991","unstructured":"Karam, G.M., Buhr, R.J.A.: Temporal Logic-Based Deadlock Analysis for Ada, IEEE Transaction on Software Engineering, Vol.17, No.10 (1991) 1109\u20131125","journal-title":"IEEE Transaction on Software Engineering"},{"key":"10_CR12","unstructured":"Lander, L.C., Mitra, S.: Detection and Avoidance of Elaboration-Time Problems for Multi-Unit Real-Time Ada Applications, in van Katwijk, J. (ed.), \u201cAda: Moving Towards 2000,\u201d Lecture Notes in Computer Science, Vol.603, Springer-Verlag (1992) 165\u2013181"},{"issue":"No.5","key":"10_CR13","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/32.286423","volume":"20","author":"M. Natomi","year":"1994","unstructured":"Natomi, M., Murata, T.: Hierarchical Reachability Graph of Bounded Petri Nets for Concurrent-Software Analysis, IEEE Transaction on Software Engineering, Vol.20, No.5 (1994) 325\u2013336","journal-title":"IEEE Transaction on Software Engineering"},{"key":"10_CR14","unstructured":"United States Department of Defense: Reference Manual for Ada Programming Language, ANSI\/MIL-STD-1815A-1983, 1983"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies \u2014 Ada-Europe '96"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,7]],"date-time":"2019-04-07T08:30:01Z","timestamp":1554625801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540613176","9783540684572"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/bfb0013484","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}