{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T22:47:42Z","timestamp":1648939662574},"reference-count":31,"publisher":"Elsevier BV","issue":"1-5","license":[{"start":{"date-parts":[[1990,8,1]],"date-time":"1990-08-01T00:00:00Z","timestamp":649468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessing and Microprogramming"],"published-print":{"date-parts":[[1990,8]]},"DOI":"10.1016\/0165-6074(90)90272-b","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T17:14:48Z","timestamp":1062609288000},"page":"389-396","source":"Crossref","is-referenced-by-count":9,"title":["The specification and design of hard real-time systems using timed and temporal petri nets"],"prefix":"10.1016","volume":"30","author":[{"given":"J.S.","family":"Sagoo","sequence":"first","affiliation":[]},{"given":"D.J.","family":"Holding","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No 2","key":"10.1016\/0165-6074(90)90272-B_BIB1","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/7474.7528","article-title":"Software safety: why, what and how","volume":"Vol 18","author":"Levenson","year":"1986","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0165-6074(90)90272-B_BIB2","series-title":"Interim Defence Standards 00\u201355 and 00\u201356","author":"MOD (UK)","year":"1989"},{"key":"10.1016\/0165-6074(90)90272-B_BIB3","series-title":"Software considerations in airborne systems and equipment certification","volume":"178A","year":"1985"},{"key":"10.1016\/0165-6074(90)90272-B_BIB4","series-title":"Software for computers in the application of industrial safety-related systems","year":"1989"},{"key":"10.1016\/0165-6074(90)90272-B_BIB5","first-page":"510","article-title":"Applications of temporal logic to the specification and verification of reactive systems: a survey of current trends","volume":"224","author":"Pnueli","year":"1986"},{"issue":"No 2","key":"10.1016\/0165-6074(90)90272-B_BIB6","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/0950-5849(89)90085-2","article-title":"Formal description of real-time systems: a review","volume":"Vol 31","author":"Joseph","year":"1989","journal-title":"Information and Software Technology"},{"key":"10.1016\/0165-6074(90)90272-B_BIB7","series-title":"Software development: a rigorous approach","author":"Jones","year":"1980"},{"key":"10.1016\/0165-6074(90)90272-B_BIB8","author":"Spivey","year":"1989"},{"issue":"No 8","key":"10.1016\/0165-6074(90)90272-B_BIB9","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1145\/359576.359585","article-title":"Communicating Sequential Processes","volume":"Vol 21","author":"Hoare","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0165-6074(90)90272-B_BIB10","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/0304-3975(88)90030-8","article-title":"A timed model for CSP","volume":"Vol 58","author":"Reed","year":"1987","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/0165-6074(90)90272-B_BIB11","series-title":"Proc. 18th Symp. \u2018Foundations of Computer Science\u2019","first-page":"46","article-title":"The temporal logic of programs","author":"Pneuli","year":"1977"},{"key":"10.1016\/0165-6074(90)90272-B_BIB12","series-title":"7th Ann Symp. on Principles of Prog. Lang.","article-title":"The temporal analysis of fairness","author":"Gabbay","year":"1980"},{"issue":"No 3","key":"10.1016\/0165-6074(90)90272-B_BIB13","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1145\/357172.357178","article-title":"Proving liveness properties of concurrent programs","volume":"Vol 4","author":"Lamport","year":"1982","journal-title":"ACM Trans. Prog. Lang. Systems (ACM TOPLAS))"},{"issue":"No 4","key":"10.1016\/0165-6074(90)90272-B_BIB14","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/0020-0190(85)90056-0","article-title":"Defining liveness","volume":"Vol 21","author":"Alpern","year":"1985","journal-title":"Inf. Process. Lett."},{"issue":"No 1","key":"10.1016\/0165-6074(90)90272-B_BIB15","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/63238.63240","article-title":"A simple approach to specifying concurrent systems","volume":"Vol 32","author":"Lamport","year":"1989","journal-title":"Comm. ACM"},{"key":"10.1016\/0165-6074(90)90272-B_BIB16","series-title":"Proc. of ACM SIGOPS 8th Ann. ACM Symp. on Operating Syst., Prin.","first-page":"187","article-title":"Proving real-time properties of programs with temporal logic","author":"Bernstein","year":"1983"},{"key":"10.1016\/0165-6074(90)90272-B_BIB17","series-title":"Proc. Real-time Systems Symp.","first-page":"124","article-title":"Modelling, specifying and verifying real-time embedded computer systems","author":"Ostroff","year":"1987"},{"issue":"No 9","key":"10.1016\/0165-6074(90)90272-B_BIB18","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TSE.1986.6313045","article-title":"Safety analysis of timing properties in real-time systems","volume":"Vol SE-12","author":"Jahanian","year":"1986","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0165-6074(90)90272-B_BIB19","series-title":"Proc. Real-Time Sys. Symp.","first-page":"12","article-title":"A method of verifying properties of modechart specifications","author":"Jahanian","year":"1988"},{"key":"10.1016\/0165-6074(90)90272-B_BIB20","series-title":"Petri net theory and the modelling of systems","author":"Peterson","year":"1981"},{"key":"10.1016\/0165-6074(90)90272-B_BIB21","series-title":"Parallel processing in control, the Transputer and other architectures","article-title":"Software Fault Tolerance","author":"Holding","year":"1988"},{"issue":"No 9","key":"10.1016\/0165-6074(90)90272-B_BIB22","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","article-title":"Recoverability of communication protocols, implications of a theoretical study","volume":"Vol COM-24","author":"Merlin","year":"1976","journal-title":"IEEE Trans. Comms."},{"key":"10.1016\/0165-6074(90)90272-B_BIB23","series-title":"Proc. IFIP Congress","first-page":"41","article-title":"An enumeration approach for analysing time Petri nets","author":"Berthomieu","year":"1983"},{"key":"10.1016\/0165-6074(90)90272-B_BIB24","article-title":"Analysis of asynchronous concurrent systems by Petri nets","author":"Ramachandani","year":"1974"},{"key":"10.1016\/0165-6074(90)90272-B_BIB25","series-title":"3rd Int. Symp. on \u2018Modelling and performance of computer systems\u2019","first-page":"75","article-title":"Use of Petri nets for performance evaluation","author":"Sirfakis","year":"1977"},{"issue":"No 2","key":"10.1016\/0165-6074(90)90272-B_BIB26","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1145\/639624.802080","article-title":"The derivation of performance expressions for comm. protocols from timed Petri nets","volume":"Vol 14","author":"Razouk","year":"1984","journal-title":"Computer Comm. Review (USA)"},{"issue":"No 3","key":"10.1016\/0165-6074(90)90272-B_BIB27","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/TSE.1987.233170","article-title":"Safety analysis using Petri nets","volume":"Vol SE-13","author":"Levenson","year":"1987","journal-title":"IEEE Trans. Eng."},{"key":"10.1016\/0165-6074(90)90272-B_BIB28","article-title":"Compositional semantics for real-time distributed computing","volume":"193","author":"Koymans","year":"1985"},{"issue":"No 5","key":"10.1016\/0165-6074(90)90272-B_BIB29","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1109\/12.24271","article-title":"Temporal Petri nets and their application to modelling and analysis of a handshake daisy chain arbiter","volume":"Vol 38","author":"Suzuki","year":"1989","journal-title":"IEEE Trans. Comp."},{"key":"10.1016\/0165-6074(90)90272-B_BIB30","series-title":"Proc. 9th Ann Conf. Inform. Sci. Syst.","first-page":"641","article-title":"Fundamental properties and application of temporal Petri nets","author":"Suzuki","year":"1985"},{"key":"10.1016\/0165-6074(90)90272-B_BIB31","series-title":"Proc SERC Conf on \u201cHigh Speed Machinery\u201d","first-page":"19","article-title":"Modular machine systems","author":"Fenny","year":"1988"}],"container-title":["Microprocessing and Microprogramming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016560749090272B?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016560749090272B?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T10:20:15Z","timestamp":1551090015000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016560749090272B"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,8]]},"references-count":31,"journal-issue":{"issue":"1-5","published-print":{"date-parts":[[1990,8]]}},"alternative-id":["016560749090272B"],"URL":"https:\/\/doi.org\/10.1016\/0165-6074(90)90272-b","relation":{},"ISSN":["0165-6074"],"issn-type":[{"value":"0165-6074","type":"print"}],"subject":[],"published":{"date-parts":[[1990,8]]}}}