{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T02:38:07Z","timestamp":1648953487125},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T00:00:00Z","timestamp":1416960000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s11219-014-9262-2","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T11:17:59Z","timestamp":1417519079000},"page":"115-135","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Certifying a java type resolution function using program transformation, annotation, and reflection"],"prefix":"10.1007","volume":"24","author":[{"given":"Victor","family":"Winter","sequence":"first","affiliation":[]},{"given":"Carl","family":"Reinke","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Guerrero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,26]]},"reference":[{"key":"9262_CR1","unstructured":"Perry, J. T., Winter, V., Siy, H., Srinivasan, S., Farkas, B. D., & McCoy, J. A. (2010). The difficulties of type resolution algorithms. Technical Report SAND2010-8745, Sandia National Laboratories."},{"key":"9262_CR2","doi-asserted-by":"crossref","unstructured":"McCoy, J.A. (2000). An embedded system for safe, secure and reliable execution of high consequence software. In Proceedings of the 5th IEEE International Symposium on High Assurance Systems Engineering (HASE), (pp. 107\u2013114). IEEE.","DOI":"10.1109\/HASE.2000.895448"},{"key":"9262_CR3","unstructured":"Wickstrom, G. L., Davis, J., Morrison, S. E., Roach, S., & Winter, V. L. (2004). The SSP: An example of high-assurance system engineering. In HASE 2004: The 8th IEEE International Symposium on High Assurance Systems Engineering, (pp. 167\u2013177). IEEE, Tampa, Florida, United States."},{"key":"9262_CR4","volume-title":"The Java virtual machine","year":"1999","unstructured":"Lindholm, T., & Yellin, F. (Eds.). (1999). The Java virtual machine (2nd ed.). Boston: Addison-Wesley.","edition":"2"},{"key":"9262_CR5","volume-title":"Java in academia and research","author":"VL Winter","year":"2011","unstructured":"Winter, V. L., Siy, H., McCoy, J., Farkas, B., Wickstrom, G., Demming, D., et al. (2011). Incorporating standard Java libraries into the design of embedded systems. In K. Cai (Ed.), Java in academia and research. Brisbane: iConcept Press."},{"key":"9262_CR6","doi-asserted-by":"crossref","unstructured":"Winter, V., Guerrero, J., Reinke, C., & Perry, J. (2011). Monarch: A High-Assurance Java-to-java (J2j) Source code Migrator. In Proceedings of the 13th IEEE International Symposium on High Assurance Systems Engineering (HASE).","DOI":"10.1109\/HASE.2011.30"},{"key":"9262_CR7","unstructured":"Winter, V., Guerrero, J., Reinke, C., & Perry, J. T. (2014). Java core API migration: Challenges and techniques. In Proceedings of the 2014 International Conference on Software Engineering Research and Practice (SERP)."},{"key":"9262_CR8","unstructured":"Gosling, J., Joy, B., Steele, G., Bracha, G., & Buckley, A. (2011). The Java language specification (Java SE 7 Edition). Oracle."},{"key":"9262_CR9","volume-title":"Java in a Nutshell","author":"D Flanagan","year":"2005","unstructured":"Flanagan, D. (2005). Java in a Nutshell (5th ed.). Sebastopol: O\u2019Reilly Media, Inc.","edition":"5"},{"key":"9262_CR10","doi-asserted-by":"crossref","unstructured":"Winter, V., Guerrero, J., James, A., & Reinke, C. (2012). Linking syntactic and semantic models of Java source code within a program transformation system. In Proceedings of the 14th IEEE International Symposium on High Assurance Systems Engineering (HASE).","DOI":"10.1109\/HASE.2012.8"},{"key":"9262_CR11","unstructured":"Winter, V. L. (2007). Stack-based strategic control. In: Preproceedings of the Seventh International Workshop on Reduction Strategies in Rewriting and Programming."},{"key":"9262_CR12","unstructured":"The TL System. (2010). http:\/\/faculty.ist.unomaha.edu\/winter\/ShiftLab\/TL_web\/TL_index.html"},{"key":"9262_CR13","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.scico.2004.03.006","volume":"52","author":"V Winter","year":"2004","unstructured":"Winter, V., & Subramaniam, M. (2004). The transient combinator, higher-order strategies, and the distributed data problem. Science of Computer Programming (Special Issue on Program Transformation), 52, 165\u2013212.","journal-title":"Science of Computer Programming (Special Issue on Program Transformation)"},{"key":"9262_CR14","doi-asserted-by":"crossref","unstructured":"Mametjanov, A., Winter, V., & L\u00e4mmel, R. (2011). More precise typing of rewrite strategies. In Eleventh International Workshop on Language Descriptions, Tools, and Applications (LDTA 2011).","DOI":"10.1145\/1988783.1988786"},{"key":"9262_CR15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2319.001.0001","volume-title":"The definition of standard ML (revised)","author":"R Milner","year":"1997","unstructured":"Milner, R., Tofte, M., Harper, R., & MacQueen, D. (1997). The definition of standard ML (revised). Cambridge: MIT Press."},{"key":"9262_CR16","doi-asserted-by":"crossref","unstructured":"Winter, V., & Beranek, J. (2006). Program transformation using HATS 1.84. In R. L\u00e4mmel, J. Saraiva, J. Visser (Eds.), Generative and transformational techniques in Software Engineering (GTTSE), LNCS (Vol. 4143, pp. 378\u2013396). New York: Springer-Verlag Berlin Heidelberg.","DOI":"10.1007\/11877028_15"},{"key":"9262_CR17","doi-asserted-by":"crossref","unstructured":"Winter, V., Reinke, C., & Guerrero, J. (2013). Sextant: A tool to specify and visualize software metrics for Java source code. In Proceedings of the 4th International Workshop on Emerging Trends in Software Metrics (WETSoM). (to appear).","DOI":"10.1109\/WETSoM.2013.6619336"},{"key":"9262_CR18","doi-asserted-by":"crossref","unstructured":"Proulx, V. K., & Jossey, W. (2009). Unit test support for Java via reflection and annotations. In Proceedings of the 7th International Conference on Principles and Practice of Programming in Java, PPPJ \u201909, (pp. 49\u201356). ACM, New York, NY, USA. doi: 10.1145\/1596655.1596663","DOI":"10.1145\/1596655.1596663"},{"key":"9262_CR19","doi-asserted-by":"crossref","unstructured":"Martins, M., & Rosa, A. (2000). A fault injection approach based on reflective programming. In Proceedings of the International Conferenceon Dependable Systems and Networks, 2000 (pp. 407\u2013416). doi: 10.1109\/ICDSN.2000.857569","DOI":"10.1109\/ICDSN.2000.857569"},{"key":"9262_CR20","doi-asserted-by":"crossref","unstructured":"McCaffrey, J. (2006). Reflection-based UI testing. In NET Test Automation Recipes, (pp. 33\u201363). Apress. doi: 10.1007\/978-1-4302-0163-2_2","DOI":"10.1007\/978-1-4302-0163-2_2"},{"key":"9262_CR21","doi-asserted-by":"crossref","unstructured":"Baxter, I. D., Pidgeon, C., & Mehlich, M. (2004). DMS: Program transformations for practical scalable software evolution. In Proceedings of the 26th International Conference on Software Engineering, ICSE \u201904 (pp. 625\u2013634). IEEE Computer Society, Washington, DC, USA. http:\/\/dl.acm.org\/citation.cfm?id=998675.999466","DOI":"10.1109\/ICSE.2004.1317484"},{"key":"9262_CR22","unstructured":"Baxter, I. (2002). Branch coverage for aribtrary languages made easy. Technical Report DMS-2002, Semantic Designs."},{"key":"9262_CR23","doi-asserted-by":"crossref","unstructured":"Roychoudhury, S., Gray, J., Zhang, J., Bangalore, P., & Skjellum, A. (2010). A program transformation technique to support AOP within C++ templates. Journal of Object Technology 9(1), 143\u2013160. doi: 10.5381\/jot.2010.9.1.a3 . http:\/\/www.jot.fm\/contents\/issue_2010_01\/article3.html","DOI":"10.5381\/jot.2010.9.1.a3"},{"key":"9262_CR24","doi-asserted-by":"crossref","unstructured":"ai Sun, C. (2008). A transformation-based approach to generating scenario-oriented test cases from UML activity diagrams for concurrent applications. In 32nd Annual IEEE International Conferenceon Computer Software and Applications (COMPSAC \u201908), 2008 (pp. 160\u2013167). doi: 10.1109\/COMPSAC.2008.74","DOI":"10.1109\/COMPSAC.2008.74"},{"issue":"1","key":"9262_CR25","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.entcs.2006.10.022","volume":"174","author":"V Winter","year":"2007","unstructured":"Winter, V. (2007). Model-driven transformation-based generation of Java stress tests. Electronic Notes in Theoretical Computer Science (ENTCS), 174(1), 99\u2013114.","journal-title":"Electronic Notes in Theoretical Computer Science (ENTCS)"},{"issue":"2","key":"9262_CR26","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1023\/B:FORM.0000017721.39909.4b","volume":"24","author":"K Havelund","year":"2004","unstructured":"Havelund, K., & Ro\u015fu, G. (2004). An overview of the runtime verification tool Java PathExplorer. Formal Methods in System Design, 24(2), 189\u2013215. doi: 10.1023\/B:FORM.0000017721.39909.4b .","journal-title":"Formal Methods in System Design"},{"key":"9262_CR27","doi-asserted-by":"crossref","unstructured":"Havelund, K., & Rosu, G. (2001). Monitoring programs using rewriting. In Proceedings of the 16th IEEE international conference on Automated software engineering, ASE \u201901 (pp. 135\u2013). IEEE Computer Society, Washington, DC, USA. http:\/\/dl.acm.org\/citation.cfm?id=872023.872572","DOI":"10.1109\/ASE.2001.989799"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-014-9262-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-014-9262-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-014-9262-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T22:21:37Z","timestamp":1566080497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-014-9262-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,26]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["9262"],"URL":"https:\/\/doi.org\/10.1007\/s11219-014-9262-2","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,26]]}}}