{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:10:50Z","timestamp":1725459050626},"publisher-location":"Berlin\/Heidelberg","reference-count":8,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"354018712X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/bfb0022123","type":"book-chapter","created":{"date-parts":[[2006,1,12]],"date-time":"2006-01-12T11:45:40Z","timestamp":1137066340000},"page":"307-317","source":"Crossref","is-referenced-by-count":0,"title":["High level interpretation of execution traces of Ada tasks"],"prefix":"10.1007","author":[{"given":"Jean-Fran\u00e7ois","family":"Caillet","sequence":"first","affiliation":[]},{"given":"Christian","family":"Bonnet","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Raither","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"K.A. Bartlett, R.A. Scantleburry & P.T. Wilkinson: \"A Note on Reliable Full-Duplex Transmission over Half-Duplex Links\", Communications of the ACM, 12-5, May 1969.","DOI":"10.1145\/362946.362970"},{"key":"31_CR2","unstructured":"A. Evans, G. Goos, W.A. Wulf & K.J. Butler: \"DIANA: An Intermediate Language for Ada\", Lecture Notes in Computer Science, Springer-Verlag, 1983."},{"issue":"6","key":"31_CR3","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1109\/TSE.1984.5010305","volume":"SE-10","author":"S.M. German","year":"1984","unstructured":"S.M. German: \"Monitoring for Deadlock and Blocking in Ada Tasking\", IEEE Transactions on Software Engineering, Vol. SE-10, No. 6, November 1984, pp. 764\u2013777.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"D.P. Helmbold & D.C. Luckham: \"Debugging Ada Tasking Programs\", IEEE SOFTWARE, March 1985, pp. 47\u201357.","DOI":"10.1109\/MS.1985.230351"},{"key":"31_CR5","unstructured":"Military Standard Ada Programming Language, (ANSI\/MIL-STD-1815A-1983), American National Standard Institute, January 1983."},{"issue":"3","key":"31_CR6","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/TSE.1980.234488","volume":"SE-6","author":"L.J. Osterweil","year":"1980","unstructured":"L.J. Osterweil & R.N. Taylor: \"Anomaly Detection in Concurrent Software by Static Data Flow Analysis\", IEEE Transactions on Software Engineering, SE-6, No. 3, May 1980, pp. 265\u2013277.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"31_CR7","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1145\/69586.69587","volume":"26","author":"R.N. Taylor","year":"1983","unstructured":"R.N. Taylor: \"A General-Purpose Algorithm for Analyzing Concurrent Programs\", Communications of the ACM, Vol. 26, No. 5, May 1983, pp. 362\u2013376.","journal-title":"Communications of the ACM"},{"key":"31_CR8","first-page":"127","volume-title":"Software Validation","author":"R.N. Taylor","year":"1984","unstructured":"R.N. Taylor: \"Analysis of Concurrent Software by Cooperative Application of Static and Dynamic Techniques\", Software Validation; H.L. Hausen (ed.), Elsevier Science Publishers B.V. (North Holland), 1984, pp. 127\u2013137."}],"container-title":["Lecture Notes in Computer Science","ESEC '87"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0022123.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T21:47:41Z","timestamp":1607550461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0022123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["354018712X"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/bfb0022123","relation":{},"subject":[]}}