{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:46:26Z","timestamp":1648881986098},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1007\/s10009-005-0196-7","type":"journal-article","created":{"date-parts":[[2005,6,9]],"date-time":"2005-06-09T08:50:04Z","timestamp":1118307004000},"page":"195-196","source":"Crossref","is-referenced-by-count":0,"title":["Introductory paper"],"prefix":"10.1007","volume":"7","author":[{"given":"Thomas","family":"Arts","sequence":"first","affiliation":[]},{"given":"Jaco","family":"van de Pol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,10]]},"reference":[{"key":"196_CR1","unstructured":"Arts T, Fokkink W (2003) Proceedings of the 8th international workshop on formal methods for industrial critical systems. Trondheim, Norway, 5\u20137 June 2003"},{"key":"196_CR2","doi-asserted-by":"crossref","unstructured":"Blom S, Orzan S (2005) Distributed state space minimization. Int J Softw Tools Technol Transfer (current issue)","DOI":"10.1007\/s10009-004-0185-2"},{"key":"196_CR3","doi-asserted-by":"crossref","unstructured":"Brucker AD, Wolff B (2005) A verification approach for applied system security. Int J Softw Tools Technol Transfer (current issue)","DOI":"10.1007\/s10009-004-0176-3"},{"key":"196_CR4","doi-asserted-by":"crossref","unstructured":"Bubel R, H\u00e4hnle R (2005) Integration of informal and formal development of object-oriented safety-critical software \u2013 a case study with the KeY system. Int J Softw Tools Technol Transfer (current issue)","DOI":"10.1007\/s10009-004-0166-5"},{"key":"196_CR5","doi-asserted-by":"crossref","unstructured":"Butterfield A, Woodcock J (2005) prialt in Handel-C: an operational semantics. Int J Softw Tools Technol Transfer (current issue)","DOI":"10.1007\/s10009-004-0181-6"},{"key":"196_CR6","doi-asserted-by":"crossref","unstructured":"Burdy L et al. (2005) An overview of JML tools and applications. Int J Softw Tools Technol Transfer (current issue)","DOI":"10.1007\/s10009-004-0167-4"},{"key":"196_CR7","doi-asserted-by":"crossref","unstructured":"Hammarberg J, Nadjm-Tehrani S (2005) Formal verification of fault tolerance in safety-critical modules. Int J Softw Tools Technol Transfer (current issue)","DOI":"10.1007\/s10009-004-0152-y"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-005-0196-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-005-0196-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-005-0196-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:25:21Z","timestamp":1559114721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-005-0196-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,6]]}},"alternative-id":["196"],"URL":"https:\/\/doi.org\/10.1007\/s10009-005-0196-7","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"value":"1433-2779","type":"print"},{"value":"1433-2787","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}