{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T15:04:26Z","timestamp":1722351866436},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["STTT"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1007\/s10009-003-0114-9","type":"journal-article","created":{"date-parts":[[2004,3,19]],"date-time":"2004-03-19T13:53:20Z","timestamp":1079704400000},"page":"205-220","source":"Crossref","is-referenced-by-count":15,"title":["Development of a verified Erlang program for resource locking"],"prefix":"10.1007","volume":"5","author":[{"given":"Thomas","family":"Arts","sequence":"first","affiliation":[]},{"given":"Clara","family":"Benac Earle","sequence":"additional","affiliation":[]},{"given":"John","family":"Derrick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,3,1]]},"reference":[{"key":"114_CR1","unstructured":"Armstrong JL, Virding SR, Williams MC, Wikstr\u00f6m C (1996) Concurrent programming in Erlang, 2nd edn. Prentice-Hall, Upper Saddle River, NJ"},{"key":"114_CR2","unstructured":"Arts T, Benac Earle C (2001) Development of a verified distributed resource locker. In: Proceedings of FMICS, Paris, July 2001"},{"key":"114_CR3","doi-asserted-by":"crossref","unstructured":"Arts T, Benac Earle C, Derrick J (2002) Verifying Erlang code: a resource locker case-study. In: Proceedings of the Formal Methods Europe symposium (FME02), Copenhagen, July 2002","DOI":"10.1007\/3-540-45614-7_11"},{"key":"114_CR4","doi-asserted-by":"crossref","unstructured":"Arts T, Dam M, Fredlund L\u00c5, Gurov D (1998) System description: verification of distributed Erlang programs. In: Proceedings of CADE\u201998, Lindau, July 1998. Lecture notes in artificial intelligence, vol 1421, Springer, Berlin Heidelberg New York, pp 38\u201342","DOI":"10.1007\/BFb0054244"},{"key":"114_CR5","unstructured":"Arts T, Noll T (2000) Verifying generic Erlang client-server implementations. In: Proceedings of IFL2000, Aachen, Germany, September 2000. Lecture notes in computer science, vol 2011, Springer, Berlin Heidelberg New York, pp 37\u201353"},{"key":"114_CR6","unstructured":"Arts T, S\u00e1nchez Penas JJ (2002) Global schedular properties derived from local restrictions. In: Proceedings of the ACM SIGPLAN Erlang workshop, Pittsburgh, October 2002"},{"key":"114_CR7","first-page":"10","volume":"1","author":"Blau","year":"1998","unstructured":"Blau S, Rooth J (1998) AXD 301 \u2013 a new generation ATM switching system. Ericsson Rev 1:10\u201317","journal-title":"Ericsson Rev"},{"key":"114_CR8","unstructured":"Bollig B, Leucker M, Weber M (2001) Local parallel model checking for the alternation free \u03bc\u2013Calculus. In: Proceedings of the 9th international SPIN workshop on model checking software, Grenoble, France, April 2002. Lecture notes in computer science, vol 2318, Springer, Berlin Heidelberg New York, pp 128\u2013147"},{"key":"114_CR9","unstructured":"Clarke EM, Grumberg O, Peled D (1999) Model checking. MIT Press, Cambridge, MA"},{"key":"114_CR10","doi-asserted-by":"crossref","unstructured":"Corbett J, Dwyer M, Hatcliff L (2000) Bandera: a source-level interface for model checking Java programs. In: Proceedings of the teaching and research demos at ICSE\u201900, Limerick, Ireland, 4\u201311 June 2000","DOI":"10.1145\/337180.337625"},{"key":"114_CR11","unstructured":"CWI (1999) A language and tool set to study communicating processes with data. Available at: http:\/\/www.cwi.nl\/\u223cmcrl"},{"key":"114_CR12","unstructured":"Emerson EA, Lei CL (1986) Efficient model checking in fragments of the propositional Mu-Calculus, In: Proceedings of the 1st LICS, Cambridge, MA, June 1986, pp 267\u2013278"},{"key":"114_CR13","unstructured":"Open Source Erlang (1999) http:\/\/www.erlang.org"},{"key":"114_CR14","doi-asserted-by":"crossref","unstructured":"Fredlund L-\u00c5 et al (2003) A tool for verifying software written in Erlang, Int J Software Tools Technol Trans (in press) (http:\/\/link.springer.de\/)","DOI":"10.1007\/s100090100071"},{"key":"114_CR15","unstructured":"Fernandez JC, Garavel H, Kerbrat A, Mateescu R, Mounier L, Sighireau M (1996) Cadp (Caesar\/Ald\u00e9baran development package): a protocol validation and verification toolbox. In: Proceedings of CAV, New Brunswick, NJ, July 1996. Lecture notes in computer science, vol 1102, Springer, Berlin Heidelberg New York, pp 437\u2013440"},{"key":"114_CR16","unstructured":"Groote JF (1997) The syntax and semantics of timed \u03bcCRL. Technical report SEN-R9709, CWI, June 1997. Available at: http:\/\/www.cwi.nl"},{"key":"114_CR17","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/s100090050043","volume":"2","author":"Havelund","year":"2000","unstructured":"Havelund K, Pressburger T (2000) Model checking Java programs using Java PathFinder. Int J Software Tools Technol Trans 2(4):366\u2013381","journal-title":"Int J Software Tools Technol Trans"},{"key":"114_CR18","unstructured":"Holzmann G (1991) The design and validation of computer protocols. Prentice-Hall, Upper Saddle River, NJ"},{"key":"114_CR19","doi-asserted-by":"crossref","unstructured":"Huch F (1999) Verification of Erlang programs using abstract interpretation and model checking. In: Proceedings of ICFP\u201999, Paris, September 1999","DOI":"10.1145\/317636.317908"},{"key":"114_CR20","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/0304-3975(82)90125-6","volume":"27","author":"Kozen","year":"1983","unstructured":"Kozen D (1983) Results on the propositional \u03bc-calculus. J Theor Comput Sci 27:333\u2013354","journal-title":"J Theor Comput Sci"},{"key":"114_CR21","doi-asserted-by":"crossref","unstructured":"Milner R (1980) A calculus of communicating systems. Springer, Berlin Heidelberg New York","DOI":"10.1007\/3-540-10235-3"},{"key":"114_CR22","unstructured":"Van de Pol JC (2001) A prover for the \u03bcCRL toolset with applications, version 0.1. Technical report SEN-R0106, CWI, Amsterdam. Available at: http:\/\/www.cwi.nl"},{"key":"114_CR23","unstructured":"Wells D (1999) Extreme programming: a gentle introduction. Available at: http:\/\/www. extremeprogramming.org"},{"key":"114_CR24","unstructured":"Wouters AG (2001) Manual for the \u03bcCRL tool set, version 2.8.2. Technical report SEN-R0130, CWI, Amsterdam"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-003-0114-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-003-0114-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-003-0114-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-003-0114-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T03:25:18Z","timestamp":1559100318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-003-0114-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":24,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["114"],"URL":"https:\/\/doi.org\/10.1007\/s10009-003-0114-9","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"value":"1433-2779","type":"print"},{"value":"1433-2787","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}