{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:29:24Z","timestamp":1742394564886},"reference-count":26,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[1985,1,1]],"date-time":"1985-01-01T00:00:00Z","timestamp":473385600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":10424,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[1985]]},"DOI":"10.1016\/0167-6423(85)90004-8","type":"journal-article","created":{"date-parts":[[2003,3,25]],"date-time":"2003-03-25T11:44:35Z","timestamp":1048592675000},"page":"59-81","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["A language of specified programs"],"prefix":"10.1016","volume":"5","author":[{"given":"Andrzej","family":"Tarlecki","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/0167-6423(85)90004-8_BIB1","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/357146.357150","article-title":"Ten years of Hoare's logic: a survey\u2014part I","volume":"3","author":"Apt","year":"1981","journal-title":"TOPLAS"},{"key":"10.1016\/0167-6423(85)90004-8_BIB2","unstructured":"R.J.R. Back, On the correctness of refinement steps in program development, Department of Computer Science, University of Helsinki, Report A-1978-4."},{"key":"10.1016\/0167-6423(85)90004-8_BIB3","article-title":"Checking whether programs are correct or incorrect","author":"Back","year":"1980","journal-title":"Mathematical Centrum, IW-144\/80"},{"key":"10.1016\/0167-6423(85)90004-8_BIB4","series-title":"Constructing Quality Software","article-title":"A methodology for simultaneously developing and verifying PASCAL programs","author":"Bar","year":"1978"},{"key":"10.1016\/0167-6423(85)90004-8_BIB5","series-title":"Mathematical Theory of Program Correctness","author":"de Bakker","year":"1980"},{"key":"10.1016\/0167-6423(85)90004-8_BIB6","unstructured":"F.L. Bauer et al. (the CIP Language Group), Report on a wide spectrum language for program specification and development, Report TUM-18104, Technische Universit\u00e4t M\u00fcnchen."},{"key":"10.1016\/0167-6423(85)90004-8_BIB7","series-title":"Formal Description of Programming Concepts","first-page":"183","article-title":"Towards mathematical structured programming","author":"Blikle","year":"1978"},{"key":"10.1016\/0167-6423(85)90004-8_BIB8","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TSE.1981.231114","article-title":"On the development of correct specified programs","volume":"7","author":"Blikle","year":"1981","journal-title":"IEEE Trans. Software Engrg."},{"key":"10.1016\/0167-6423(85)90004-8_BIB9","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/BF00261259","article-title":"The clean termination of iterative programs","volume":"16","author":"Blikle","year":"1981","journal-title":"Acta Informat."},{"key":"10.1016\/0167-6423(85)90004-8_BIB10","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/321992.321996","article-title":"A transformation system for developing recursive programs","volume":"24","author":"Burstall","year":"1977","journal-title":"J. ACM"},{"key":"10.1016\/0167-6423(85)90004-8_BIB11","series-title":"Proc. Advanced Course on Abstract Software Specification","first-page":"292","article-title":"The semantics of Clear, a specification language","volume":"86","author":"Burstall","year":"1980"},{"key":"10.1016\/0167-6423(85)90004-8_BIB12","series-title":"A Discipline of Programming","author":"Dijkstra","year":"1976"},{"key":"10.1016\/0167-6423(85)90004-8_BIB13","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1109\/TSE.1981.234518","article-title":"Inference rules for program annotation","volume":"7","author":"Dershowitz","year":"1981","journal-title":"IEEE Trans. Software Engrg."},{"key":"10.1016\/0167-6423(85)90004-8_BIB14","series-title":"Current Trends in Programming Methodology IV, Data Structuring","first-page":"80","article-title":"An initial algebra approach to the specification, correctness and implementation of abstract data types","author":"Goguen","year":"1978"},{"key":"10.1016\/0167-6423(85)90004-8_BIB15","series-title":"The Science of Programming","author":"Gries","year":"1981"},{"key":"10.1016\/0167-6423(85)90004-8_BIB16","article-title":"The specification and application to programming of abstract data types","author":"Guttag","year":"1975"},{"key":"10.1016\/0167-6423(85)90004-8_BIB17","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1145\/363235.363259","article-title":"An axiomatic basis for computer programming","volume":"12","author":"Hoare","year":"1969","journal-title":"Comm. ACM"},{"key":"10.1016\/0167-6423(85)90004-8_BIB18","series-title":"Software Development: A Rigorous Approach","author":"Jones","year":"1980"},{"key":"10.1016\/0167-6423(85)90004-8_BIB19","series-title":"6th ACM Symposium on Principles of Programming Languages","article-title":"The evolution of list copying algorithms","author":"Lee","year":"1979"},{"key":"10.1016\/0167-6423(85)90004-8_BIB20","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/BF00288637","article-title":"Axiomatic approach to total correctness of programs","author":"Manna","year":"1974","journal-title":"Acta Informat."},{"key":"10.1016\/0167-6423(85)90004-8_BIB21","series-title":"The Craft of Programming","author":"Reynolds","year":"1981"},{"key":"10.1016\/0167-6423(85)90004-8_BIB22","series-title":"New Directions in Algorithmic Languages","article-title":"An example of hierarchical design and proof","author":"Spitzen","year":"1976"},{"key":"10.1016\/0167-6423(85)90004-8_BIB23","article-title":"Jezyk programow specyfikowanych","author":"Tarlecki","year":"1982"},{"key":"10.1016\/0167-6423(85)90004-8_BIB24","series-title":"A language of specified programs\u2014an informal introduction","author":"Tarlecki","year":"1983"},{"key":"10.1016\/0167-6423(85)90004-8_BIB25","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/TSE.1976.233533","article-title":"Goal-directed program transformations","volume":"2","author":"Wegbreit","year":"1976","journal-title":"IEEE Trans. Software Engrg."},{"key":"10.1016\/0167-6423(85)90004-8_BIB26","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TSE.1976.233830","article-title":"An introduction to the construction and verification of Alphard programs","volume":"2","author":"Wulf","year":"1976","journal-title":"IEEE Trans. Software Engrg."}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167642385900048?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167642385900048?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,24]],"date-time":"2019-03-24T11:50:03Z","timestamp":1553428203000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167642385900048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985]]},"references-count":26,"alternative-id":["0167642385900048"],"URL":"https:\/\/doi.org\/10.1016\/0167-6423(85)90004-8","relation":{},"ISSN":["0167-6423"],"issn-type":[{"value":"0167-6423","type":"print"}],"subject":[],"published":{"date-parts":[[1985]]}}}