{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:33:58Z","timestamp":1720114438284},"reference-count":21,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[1991,9,1]],"date-time":"1991-09-01T00:00:00Z","timestamp":683683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[1991,9]]},"DOI":"10.1016\/0020-0255(91)90092-9","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T17:28:37Z","timestamp":1056994117000},"page":"427-450","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Verification of complex systems using incremental operational specifications"],"prefix":"10.1016","volume":"57-58","author":[{"given":"William E.","family":"Howden","sequence":"first","affiliation":[]},{"given":"David","family":"Nesbitt","sequence":"additional","affiliation":[]},{"given":"Cheron","family":"Vail","sequence":"additional","affiliation":[]},{"given":"Bruce","family":"Wieand","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0020-0255(91)90092-9_BIB1","article-title":"Constrained Expressions: Adding Analysis Capabilities to Design Methods for Concurrent Software Systems","volume":"SE-12","author":"Avrunin","year":"1986","journal-title":"IEEE Transactions on software Reliability"},{"key":"10.1016\/0020-0255(91)90092-9_BIB2","doi-asserted-by":"crossref","DOI":"10.1145\/5397.5399","article-title":"Automatic verification of finite-state concurrent systems, using temporal logic specifications","author":"Clarke","year":"1986","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/0020-0255(91)90092-9_BIB3","year":"1987"},{"key":"10.1016\/0020-0255(91)90092-9_BIB4","article-title":"Trace specifications: Methodology and Models","volume":"SE-14","author":"Hoffman","year":"1988","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/0020-0255(91)90092-9_BIB5","series-title":"Proceedings 16th Hawaii International Systems Sciences","article-title":"A General Model for Static Analysis","author":"Howden","year":"1983"},{"issue":"10","key":"10.1016\/0020-0255(91)90092-9_BIB6","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.1986.6313016","article-title":"A Functional Approach to Program Testing and Analysis","volume":"SE-12","author":"Howden","year":"1986","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/0020-0255(91)90092-9_BIB7","series-title":"Functional Program Testing and Analysis","author":"Howden","year":"1986"},{"key":"10.1016\/0020-0255(91)90092-9_BIB8","series-title":"Proceedings of Eleventh International Conference on Software Engineering (extended abstract)","article-title":"Error-based software validation","author":"Howden","year":"1989"},{"key":"10.1016\/0020-0255(91)90092-9_BIB9","series-title":"Proceedings of IFIPS II","article-title":"Completeness of program tests","author":"Howden","year":"1989"},{"key":"10.1016\/0020-0255(91)90092-9_BIB10","series-title":"Proceedings of Third Symposium on Testing Analysis and Verifications, ACM","article-title":"Validating Programs without Specifications","author":"Howden","year":"1989"},{"key":"10.1016\/0020-0255(91)90092-9_BIB11","doi-asserted-by":"crossref","DOI":"10.1109\/32.44365","article-title":"Comments Analysis and Programming Errors","author":"Howden","year":"1990","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/0020-0255(91)90092-9_BIB12","series-title":"Design and Experimental Use of a Verification System Using Incremental Operational Specifications","author":"Howden","year":"1990"},{"key":"10.1016\/0020-0255(91)90092-9_BIB13","series-title":"Comments Analysis Logic","author":"Howden","year":"1989"},{"key":"10.1016\/0020-0255(91)90092-9_BIB14","series-title":"Proceedings of the Eleventh International Conference on Software Engineering","article-title":"Task interaction graphs for concurrency analysis","author":"Long","year":"1989"},{"key":"10.1016\/0020-0255(91)90092-9_BIB15","doi-asserted-by":"crossref","unstructured":"K. M. Olender and L. J. Osterweil, Cecil: A sequencing constraint language for automatic static analysis generation, IEEE Transactions on software Engineering, (to appear).","DOI":"10.1007\/978-3-642-19823-6_7"},{"key":"10.1016\/0020-0255(91)90092-9_BIB16","series-title":"Trace-based module specifications","author":"Parnas","year":"1989"},{"key":"10.1016\/0020-0255(91)90092-9_BIB17","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.1980.234488","article-title":"Anomaly detection of concurrent software by static data flow analysis","volume":"SE-6","author":"Taylor","year":"1980","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/0020-0255(91)90092-9_BIB18","series-title":"Proceedings 4th Jerusalem Conference on Information Technology","article-title":"Analysis and testing based on sequencing specifications","author":"Taylor","year":"1984"},{"key":"10.1016\/0020-0255(91)90092-9_BIB19","article-title":"Fault Detection in Production Programs by Means of Data Usage Analysis","author":"Werner","year":"1988"},{"key":"10.1016\/0020-0255(91)90092-9_BIB20","article-title":"An Investigation of the Applicability of Data Usage Analysis","author":"Werner","year":"1990","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/0020-0255(91)90092-9_BIB21","series-title":"Proceedings of Third Symposium on Testing Analysis and Verifications, ACM","article-title":"Integrated concurrency analysis in a software development environment","author":"Young","year":"1989"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020025591900929?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020025591900929?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T13:24:18Z","timestamp":1552915458000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0020025591900929"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,9]]},"references-count":21,"alternative-id":["0020025591900929"],"URL":"https:\/\/doi.org\/10.1016\/0020-0255(91)90092-9","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[1991,9]]}}}