{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T12:12:37Z","timestamp":1714997557343},"reference-count":68,"publisher":"CRC Press","isbn-type":[{"value":"9781420059779","type":"print"},{"value":"9781420059786","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11,24]]},"DOI":"10.1081\/e-ese-120044149","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:09:12Z","timestamp":1469718552000},"page":"772-785","source":"Crossref","is-referenced-by-count":0,"title":["Programming Phase: Formal Methods"],"prefix":"10.1081","author":[{"given":"Richard F.","family":"Paige","sequence":"first","affiliation":[]},{"given":"Jim","family":"Woodcock","sequence":"additional","affiliation":[]},{"given":"Phillip J.","family":"Brooke","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Cavalcanti","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,7,28]]},"reference":[{"key":"CIT0001","volume-title":"Using Z\u2014Specification, Refinement, and Proof","author":"Woodcock J. C.P.","year":"1996"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162"},{"key":"CIT0003","volume-title":"Communicating Sequential Processes","author":"Hoare C. A.R.","year":"1985"},{"key":"CIT0004","volume-title":"Systematic Software Development Using VDM","author":"Jones C. B.","year":"1990","edition":"2"},{"key":"CIT0005","volume-title":"Software Abstractions","author":"Jackson D.","year":"2006"},{"key":"CIT0006","volume-title":"High-Integrity Software: The SPARK Approach to Safety and Security","author":"Barnes J.","year":"2003"},{"key":"CIT0007","volume-title":"The SPIN Model Checker","author":"Holzmann G. J.","year":"2003"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Crocker , D. Carlton , J. Fifth IEEE International Conference on Software Engineering and Formal Method .Verification of C programs using automated reasoning, Sept 10\u201314, 2007 , IEEE Computer Society : London, UK , 7\u201314 .","DOI":"10.1109\/SEFM.2007.44"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69149-5_16"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"CIT0012","volume-title":"Object-Oriented Software Construction","author":"Meyer B.","year":"1997","edition":"2"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-004-0167-4"},{"key":"CIT0014","series-title":"Ser. A No. 55","volume-title":"Procedural Abstraction in the Refinement Calculus","author":"Back R. J.R.","year":"1987"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1147\/rd.315.0546"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90011-6"},{"key":"CIT0017","volume-title":"A Discipline of Programming","author":"Dijkstra E. W.","year":"1976"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1674-2"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/27651.27653"},{"key":"CIT0020","volume-title":"Algebra of Programming","author":"Bird R.","year":"1997"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(88)90049-7"},{"key":"CIT0022","volume-title":"Applying Object-Oriented Refactoring and Patterns as Formal Refinements","author":"Corn\u00e9lio M. L.","year":"2004"},{"key":"CIT0023","doi-asserted-by":"crossref","DOI":"10.1142\/2870","volume-title":"An Algebraic Approach to Compiler Design","volume":"4","author":"Sampaio A.C. A.","year":"1997"},{"key":"CIT0024","volume-title":"Programming from Specifications","author":"Morgan C. C.","year":"1994","edition":"2"},{"key":"CIT0025","volume-title":"The Z Notation: A Reference Manual","author":"Spivey J. M.","year":"1992","edition":"2"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/s001650050016"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2005.1563404"},{"issue":"1","key":"CIT0029","first-page":"10","volume":"1","author":"Jones R. B.","year":"1992","journal-title":"BCS FACS FACTS"},{"key":"CIT0030","volume-title":"Prentice-Hall Series in Computer Science","author":"Roscoe A. W.","year":"1998"},{"key":"CIT0031","volume-title":"Programming in occam 2","author":"Jones G.","year":"1988"},{"key":"CIT0032","volume-title":"D-1-C Handel-C Language Reference Manual","author":"Sweeney C.","year":"1998"},{"key":"CIT0033","first-page":"98","volume-title":"16th Brazilian Symposium on Software Engineering","author":"Freitas L.J. S.","year":"2002"},{"key":"CIT0034","first-page":"48","volume-title":"Proceedings of the 20th World Occam and Transputer User Group Technical Meeting","author":"Hilderink G."},{"key":"CIT0035","first-page":"259","volume-title":"Architectures, Languages, and Patterns for Parallel and Distributed Applications, WoTUG\u201321","author":"Welch P. H.","year":"1998"},{"key":"CIT0036","first-page":"319","volume-title":"International Conference on Parallel and Distributed Processing Techniques and Applications","author":"Lazic R.","year":"1999"},{"key":"CIT0037","first-page":"33","volume-title":"Communicating Process Architectures 2007","author":"Brooke P. J.","year":"2007"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-003-0006-5"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49676-2_2"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0851-1_23"},{"key":"CIT0041","first-page":"253","volume-title":"Proceedings of Formal Methods 2005","author":"Cavalcanti A."},{"key":"CIT0042","volume-title":"The B-Method: An Introduction","author":"Schneider S.","year":"2001"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69824-1_18"},{"key":"CIT0044","volume-title":"Making Classes Provable Through Contracts, Models, and Frames","author":"Schoeller B.","year":"2008"},{"key":"CIT0045","volume-title":"A Practical Theory of Programming","author":"Hehner E.C. R.","year":"2003","edition":"2"},{"key":"CIT0047","first-page":"500","volume-title":"Proceedings of Formal Methods Europe 2001","author":"Flanagan C."},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146258"},{"key":"CIT0049","first-page":"449","volume-title":"Proceedings of the Inter-national Conference on Software Engineering","author":"Henkel J."},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1007\/11813040_6"},{"key":"CIT0053","first-page":"737","volume-title":"Handbook of Satisfiability","author":"Barrett C.","year":"2008"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_17"},{"key":"CIT0056","unstructured":"Barnett , M. DeLine , R. F\u00e4hndrich , M. Jacobs 0002 , B. Leino , K.R. M. Schulte , W. Venter , H. The spec# programming system: Challenges and directions .Verified Software: Theories, Tools, Experiments, Zurich, Switzerland , Oct, 10\u201313, 2005 ; Meyer , B. Woodcock , J. , Eds. Springer : New York , 2008 ; 144 \u2013 152 . First IFIP TC 2\/WG 2.3 Conference, VSTTE 2005 Revised Selected Papers and Discussions, Lecture Notes in Computer Science, Vol. 4171 ."},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2007.35"},{"key":"CIT0058","first-page":"1","volume-title":"Proceedings of Principles of Programming Languages 2002","author":"Ball T."},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_4"},{"key":"CIT0061","volume-title":"Proceedings of the International Symposium on Software Testing and Analysis","author":"Boyapati C."},{"key":"CIT0062","first-page":"261","volume-title":"Proceedings of 40th Hawaii International Conference on Systems Science","author":"Leitner A."},{"key":"CIT0063","doi-asserted-by":"crossref","unstructured":"Leitner , A. Ciupa , I. Oriol , M. Meyer , B. Fiva , A.Contract driven development\u2009=\u2009test driven development\u2014writing test cases; 425 \u2013 434 . ESEC\/SIGSOFT FSE 2007 .","DOI":"10.1145\/1287624.1287685"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1007\/BF00289507"},{"key":"CIT0066","volume-title":"Systematic Software Development Using VDM","author":"Jones C. B.","year":"1990","edition":"2"},{"key":"CIT0067","first-page":"42","volume-title":"Proceedings, Lecture Notes in Computer Science","author":"Back R. -J."},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1145\/44501.44503"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90011-6"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1090\/psapm\/019\/0235771"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592436"}],"container-title":["Encyclopedia of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-ESE-120044149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T21:31:53Z","timestamp":1568237513000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-ESE-120044149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,24]]},"ISBN":["9781420059779","9781420059786"],"references-count":68,"alternative-id":["10.1081\/E-ESE-120044149","10.1081\/E-ESE"],"URL":"https:\/\/doi.org\/10.1081\/e-ese-120044149","relation":{},"subject":[],"published":{"date-parts":[[2010,11,24]]}}}