{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:08:21Z","timestamp":1649063301811},"reference-count":9,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1997,4,1]],"date-time":"1997-04-01T00:00:00Z","timestamp":859852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessors and Microsystems"],"published-print":{"date-parts":[[1997,4]]},"DOI":"10.1016\/s0141-9331(96)01110-6","type":"journal-article","created":{"date-parts":[[2002,11,2]],"date-time":"2002-11-02T00:11:24Z","timestamp":1036195884000},"page":"455-461","source":"Crossref","is-referenced-by-count":1,"title":["Achieving high integrity at low cost: a constructive approach"],"prefix":"10.1016","volume":"20","author":[{"given":"J.M.","family":"Sutton","sequence":"first","affiliation":[]},{"given":"B.A.","family":"Carr\u00e9","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0141-9331(96)01110-6_bib1","series-title":"Process Engineering with the Evolutionary Spiral Process Model","year":"1994"},{"key":"10.1016\/S0141-9331(96)01110-6_bib2","series-title":"Reuse-Driven Software Process Guidebook","year":"1993"},{"issue":"5","key":"10.1016\/S0141-9331(96)01110-6_bib3","doi-asserted-by":"crossref","DOI":"10.1109\/52.156894","article-title":"The CoRE method for real-time requirements","volume":"9","author":"Faulk","year":"1992","journal-title":"IEEE Software"},{"key":"10.1016\/S0141-9331(96)01110-6_bib4","series-title":"Proc. Ninth Annual Conf. on Computer Assurance","first-page":"3","article-title":"Experience applying the CoRE method to the Lockheed C-130J software equirements","author":"Faulk","year":"1994"},{"key":"10.1016\/S0141-9331(96)01110-6_bib5","series-title":"Total Quality Management for Software","first-page":"297","article-title":"Quality function deployment (QFD) for software","author":"Zultner","year":"1992"},{"key":"10.1016\/S0141-9331(96)01110-6_bib6","year":"1991"},{"key":"10.1016\/S0141-9331(96)01110-6_bib7","series-title":"Proc. Tri-Ada Conference","article-title":"SPARK \u2014 An annotated Ada subset for safety-critical programming","author":"Carr\u00e9","year":"1990"},{"key":"10.1016\/S0141-9331(96)01110-6_bib8","series-title":"The Formal Semantic of SPARK (Volume 1: Static Semantics; Volume 2: Dynamic Semantics)","year":"1994"},{"key":"10.1016\/S0141-9331(96)01110-6_bib9","year":"1994","journal-title":"Ada 95 Reference Manual"}],"container-title":["Microprocessors and Microsystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0141933196011106?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0141933196011106?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T19:52:25Z","timestamp":1555617145000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0141933196011106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,4]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1997,4]]}},"alternative-id":["S0141933196011106"],"URL":"https:\/\/doi.org\/10.1016\/s0141-9331(96)01110-6","relation":{},"ISSN":["0141-9331"],"issn-type":[{"value":"0141-9331","type":"print"}],"subject":[],"published":{"date-parts":[[1997,4]]}}}