{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T08:14:54Z","timestamp":1697789694354},"reference-count":40,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1980,1,1]],"date-time":"1980-01-01T00:00:00Z","timestamp":315532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages"],"published-print":{"date-parts":[[1980,1]]},"DOI":"10.1016\/0096-0551(80)90049-1","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T19:17:02Z","timestamp":1060283822000},"page":"77-101","source":"Crossref","is-referenced-by-count":7,"title":["Toward modular verifiable exception handling"],"prefix":"10.1016","volume":"5","author":[{"given":"D.M.","family":"Berry","sequence":"first","affiliation":[]},{"given":"R.A.","family":"Kemmerer","sequence":"additional","affiliation":[]},{"given":"A.","family":"von Staa","sequence":"additional","affiliation":[]},{"given":"S.","family":"Yemini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0096-0551(80)90049-1_BIB1","series-title":"Advanced Course in Software Engineering","article-title":"Modularity","author":"Dennis","year":"1973"},{"key":"10.1016\/0096-0551(80)90049-1_BIB2","doi-asserted-by":"crossref","DOI":"10.1145\/355602.361309","article-title":"A technique for the specification of software modules","volume":"15","author":"Parnas","year":"1972","journal-title":"CACM"},{"key":"10.1016\/0096-0551(80)90049-1_BIB3","doi-asserted-by":"crossref","DOI":"10.1145\/361598.361623","article-title":"On the criteria to be used in decomposing systems into modules","volume":"15","author":"Parnas","year":"1972","journal-title":"CACM"},{"key":"10.1016\/0096-0551(80)90049-1_BIB4","series-title":"Reliable Software through Composite Design","author":"Myers","year":"1975"},{"key":"10.1016\/0096-0551(80)90049-1_BIB5","article-title":"On the concept of modules in programming systems","author":"Cowan","year":"1976"},{"key":"10.1016\/0096-0551(80)90049-1_BIB6","series-title":"Second ACM Symposium on Principles of Programming Languages","article-title":"Structured exception handling","author":"Goodenough","year":"1975"},{"key":"10.1016\/0096-0551(80)90049-1_BIB7","doi-asserted-by":"crossref","DOI":"10.1145\/361227.361230","article-title":"Exception handling: issues and a proposed notation","volume":"18","author":"Goodenough","year":"1975","journal-title":"CACM"},{"key":"10.1016\/0096-0551(80)90049-1_BIB8","article-title":"The control of exceptional conditions in PL\/1 object programs","volume":"68","author":"Noble","year":"1968"},{"key":"10.1016\/0096-0551(80)90049-1_BIB9","article-title":"A STRIMULA 76 debugging system","author":"Kemmerer","year":"1976"},{"key":"10.1016\/0096-0551(80)90049-1_BIB10","article-title":"Programming structures for exceptional condition handling","author":"Levin","year":"1977"},{"key":"10.1016\/0096-0551(80)90049-1_BIB11","series-title":"OS Pl\/1 Checkout and Optimizing Compilers: Language Reference Manual","year":"1973"},{"key":"10.1016\/0096-0551(80)90049-1_BIB12","series-title":"On Programming, an Interim Report on the SETL Project","author":"Schwartz","year":"1973"},{"key":"10.1016\/0096-0551(80)90049-1_BIB13","series-title":"A Comparison of MADCAP and SETL","author":"Morris","year":"1973"},{"key":"10.1016\/0096-0551(80)90049-1_BIB14","article-title":"Abstract data types in MADCAP-VI","author":"Lauterbach","year":"1975"},{"key":"10.1016\/0096-0551(80)90049-1_BIB15","doi-asserted-by":"crossref","DOI":"10.1007\/BF00289507","article-title":"Proof of correctness of data representations","volume":"1","author":"Hoare","year":"1972","journal-title":"Acta Inform."},{"key":"10.1016\/0096-0551(80)90049-1_BIB16","doi-asserted-by":"crossref","DOI":"10.1007\/BF00289504","article-title":"An axiomatic definition of the programming language PASCAL","volume":"2","author":"Hoare","year":"1973","journal-title":"Acta Inform."},{"key":"10.1016\/0096-0551(80)90049-1_BIB17","article-title":"Algebraic Specification of Data Types","author":"Zilles","year":"1975","journal-title":"MIT Project MAC Progress Report 11"},{"key":"10.1016\/0096-0551(80)90049-1_BIB18","article-title":"The Specification and Application to Programming of Abstract Data Types","author":"Guttag","year":"1975"},{"key":"10.1016\/0096-0551(80)90049-1_BIB19","series-title":"Proc. Conf. Computer Graphics, Pattern Recognition, and Data Structures","article-title":"Abstract data types as initial algebras and correctness of data representations","author":"Goguen","year":"1975"},{"key":"10.1016\/0096-0551(80)90049-1_BIB20","article-title":"Specification techniques for data abstractions","volume":"1","author":"Liskov","year":"1975","journal-title":"IEEE TSE"},{"key":"10.1016\/0096-0551(80)90049-1_BIB21","article-title":"Common base language","author":"Dahl","year":"1970"},{"key":"10.1016\/0096-0551(80)90049-1_BIB22","article-title":"Protected program modules in SIMULA 67","author":"Palme","year":"1973"},{"key":"10.1016\/0096-0551(80)90049-1_BIB23","article-title":"Data transmission and modularity aspects of programming languages","author":"von Staa","year":"1974"},{"key":"10.1016\/0096-0551(80)90049-1_BIB24","doi-asserted-by":"crossref","DOI":"10.1145\/942572.807045","article-title":"Programming with abstract data types","volume":"9","author":"Liskov","year":"1974","journal-title":"SIGPLAN Notices"},{"key":"10.1016\/0096-0551(80)90049-1_BIB25","doi-asserted-by":"crossref","DOI":"10.1145\/954666.971189","article-title":"Report on the programming language Euclid","volume":"12","author":"Lampson","year":"1977","journal-title":"SIGPLAN Notices"},{"key":"10.1016\/0096-0551(80)90049-1_BIB26","series-title":"USC ISI Tech. Report","article-title":"Abstraction and verification in Alphard: introduction to language and methodology","author":"Wulf","year":"1976"},{"key":"10.1016\/0096-0551(80)90049-1_BIB27","article-title":"An introduction to the construction and verification of Alphard programs","volume":"2","author":"Wulf","year":"1976","journal-title":"IEEE TSE"},{"key":"10.1016\/0096-0551(80)90049-1_BIB28","article-title":"An algebraic definition of simulation between programs","author":"Milner","year":"1971"},{"key":"10.1016\/0096-0551(80)90049-1_BIB29","series-title":"Response to detected errors in well-structured programs","author":"Parnas","year":"1972"},{"key":"10.1016\/0096-0551(80)90049-1_BIB30","doi-asserted-by":"crossref","DOI":"10.1145\/390017.808312","article-title":"Some extensions to algebraic specifications","volume":"12","author":"Guttag","year":"1977","journal-title":"SIGPLAN Notices"},{"key":"10.1016\/0096-0551(80)90049-1_BIB31","series-title":"Formal Description of Programming Concepts","article-title":"Abstract errors for abstract data types","author":"Goguen","year":"1978"},{"key":"10.1016\/0096-0551(80)90049-1_BIB32","volume":"14","year":"1979","journal-title":"SIGPLAN Notices"},{"key":"10.1016\/0096-0551(80)90049-1_BIB33","doi-asserted-by":"crossref","DOI":"10.1007\/BF00288746","article-title":"Automatic program verification I: a logical basis and its implementation","volume":"4","author":"Igarashi","year":"1975","journal-title":"Acta Inform."},{"key":"10.1016\/0096-0551(80)90049-1_BIB34","series-title":"Proceedings of the Symposium on Semantics of Algorithmic Languages","article-title":"Procedures and parameters: an axiomatic approach","author":"Hoare","year":"1971"},{"key":"10.1016\/0096-0551(80)90049-1_BIB35","series-title":"Proc. IFIP Working Conference on Formal Description of Programming Concepts","article-title":"A proof rule for Euclid procedures","author":"Guttag","year":"1977"},{"key":"10.1016\/0096-0551(80)90049-1_BIB36","article-title":"Revised report on the algorithmic language ALGOL 68","volume":"5","author":"van Wijngaarden","year":"1975","journal-title":"Acta Inform."},{"key":"10.1016\/0096-0551(80)90049-1_BIB37","doi-asserted-by":"crossref","DOI":"10.1145\/361011.361061","article-title":"The UNIX time sharing system","volume":"17","author":"Ritchie","year":"1974","journal-title":"CACM"},{"key":"10.1016\/0096-0551(80)90049-1_BIB38","article-title":"Hierarchical organization of data types for program modularity","author":"Lauterbach","year":"1977"},{"key":"10.1016\/0096-0551(80)90049-1_BIB39","article-title":"Programming-in-the-large versus programming-in-the-small","volume":"2","author":"DeRemer","year":"1976","journal-title":"IEEE TSE"},{"key":"10.1016\/0096-0551(80)90049-1_BIB40","article-title":"Module interconnection in programming systems supporting abstraction","author":"Thomas","year":"1976"}],"container-title":["Computer Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0096055180900491?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0096055180900491?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T05:21:18Z","timestamp":1552627278000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0096055180900491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1980,1]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1980,1]]}},"alternative-id":["0096055180900491"],"URL":"https:\/\/doi.org\/10.1016\/0096-0551(80)90049-1","relation":{},"ISSN":["0096-0551"],"issn-type":[{"value":"0096-0551","type":"print"}],"subject":[],"published":{"date-parts":[[1980,1]]}}}