{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T21:44:34Z","timestamp":1693863874126},"reference-count":16,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1982,1,1]],"date-time":"1982-01-01T00:00:00Z","timestamp":378691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages"],"published-print":{"date-parts":[[1982,1]]},"DOI":"10.1016\/0096-0551(82)90024-8","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T19:11:16Z","timestamp":1060283476000},"page":"89-102","source":"Crossref","is-referenced-by-count":12,"title":["A mechanism for exception handling and its verification rules"],"prefix":"10.1016","volume":"7","author":[{"given":"N.","family":"Cocco","sequence":"first","affiliation":[]},{"given":"S.","family":"Dulli","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0096-0551(82)90024-8_BIB1","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1145\/361227.361230","article-title":"Exception handling: issues and a proposed notation","volume":"18","author":"Goodenough","year":"1975","journal-title":"CACM"},{"key":"10.1016\/0096-0551(82)90024-8_BIB2","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","article-title":"System structure for software tolerance","volume":"SE-1","author":"Randell","year":"1975","journal-title":"IEEE Trans. Soft. Engng"},{"key":"10.1016\/0096-0551(82)90024-8_BIB3","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TSE.1979.230191","article-title":"Exception handling in CLU","volume":"SE-5","author":"Liskov","year":"1979","journal-title":"IEEE Trans. Soft Engng"},{"key":"10.1016\/0096-0551(82)90024-8_BIB4","series-title":"Reference Manual for ADA Programming Language","author":"Honeywell, Inc.","year":"1980"},{"key":"10.1016\/0096-0551(82)90024-8_BIB5","series-title":"Working party XI\/3. Draft Recommendation Z. 200: proposal for a recommendation for a CCITT High Level Programming Language (CHILL)","year":"1980"},{"key":"10.1016\/0096-0551(82)90024-8_BIB6","series-title":"MESA Language Manual","author":"Mitchell","year":"1978"},{"key":"10.1016\/0096-0551(82)90024-8_BIB7","series-title":"Programming Symposium","first-page":"170","article-title":"A control statement for natural topdown structured programming","volume":"Vol. 19","author":"Zahn","year":"1974"},{"key":"10.1016\/0096-0551(82)90024-8_BIB8","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TSE.1977.229905","article-title":"A general, verifiable iterative control structure","volume":"SE-3","author":"Mack Adams","year":"1977","journal-title":"IEEE Trans. Soft. Engng"},{"key":"10.1016\/0096-0551(82)90024-8_BIB9","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/BF00288686","article-title":"Program proving: jumps and functions","volume":"1","author":"Clint","year":"1972","journal-title":"Acta Informatica"},{"key":"10.1016\/0096-0551(82)90024-8_BIB10","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/BF00289504","article-title":"An axiomatic definition of the programming language PASCAL","volume":"2","author":"Hoare","year":"1973","journal-title":"Acta Informatica"},{"key":"10.1016\/0096-0551(82)90024-8_BIB11","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/BF00288660","article-title":"Remarks on \u201cProgram Proving: jumps and Functions by M. Clint and C. A. R. Hoare\u201d","volume":"6","author":"Ashcroft","year":"1976","journal-title":"Acta Informatica"},{"key":"10.1016\/0096-0551(82)90024-8_BIB12","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/357094.357100","article-title":"ADA exception handling: an axiomatic approach","volume":"2","author":"Luckam","year":"1980","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10.1016\/0096-0551(82)90024-8_BIB13","series-title":"Mathematical Theory of Program Correctness","author":"de Bakker","year":"1980"},{"key":"10.1016\/0096-0551(82)90024-8_BIB14","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/BF00264021","article-title":"Proof rules for Gotos","volume":"11","author":"Arbib","year":"1979","journal-title":"Acta Informatica"},{"key":"10.1016\/0096-0551(82)90024-8_BIB15","first-page":"3","article-title":"Traitement d'exceptions et de fautes residuelles dans les langages de programmation, R.A.I.R.O.","volume":"15","author":"Banatre","year":"1981","journal-title":"Informat. Comput. Sci."},{"key":"10.1016\/0096-0551(82)90024-8_BIB16","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/0096-0551(80)90049-1","article-title":"Towards modular verifiable exception handling","volume":"5","author":"Berry","year":"1980","journal-title":"Comput. Lang."}],"container-title":["Computer Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0096055182900248?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0096055182900248?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T05:23:01Z","timestamp":1552627381000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0096055182900248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1982,1]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1982,1]]}},"alternative-id":["0096055182900248"],"URL":"https:\/\/doi.org\/10.1016\/0096-0551(82)90024-8","relation":{},"ISSN":["0096-0551"],"issn-type":[{"value":"0096-0551","type":"print"}],"subject":[],"published":{"date-parts":[[1982,1]]}}}