{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T12:05:04Z","timestamp":1762862704080,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/grc.2012.6468641","type":"proceedings-article","created":{"date-parts":[[2013,3,2]],"date-time":"2013-03-02T07:39:39Z","timestamp":1362209979000},"page":"370-375","source":"Crossref","is-referenced-by-count":4,"title":["Formal specification and automated verification of UML2.0 sequence diagrams"],"prefix":"10.1109","author":[{"given":"Tu","family":"Peng","sequence":"first","affiliation":[]},{"given":"Gangyi","family":"Ding","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"527","article-title":"ASM semantic modeling and checking for sequence diagrams","volume":"2009","author":"zhou","year":"0","journal-title":"Proc of the 5th Int'l Conf on Natural Computation (ICNC 2009)"},{"key":"11","first-page":"143","article-title":"Efficient model checking using tabled resolution","author":"ramakrishna","year":"1997","journal-title":"Proceedings of the 9th International Conference on Computer Aided Verification"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.3724\/SP.J.1001.2011.04005"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/363516.363528"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1007\/s11334-008-0056-1"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1017\/CBO9780511624162"},{"key":"10","article-title":"Communication and concurrency","author":"robin","year":"1989","journal-title":"International Series in Computer Science"},{"key":"7","first-page":"519","article-title":"The Z specification-based method for the semantic analysis of UML sequence diagrams","volume":"30","author":"jf","year":"2003","journal-title":"Journal of Xidian University (Natural Sciences)"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/ICISE.2009.918"},{"year":"2010","author":"dong","journal-title":"On Instantiation and Integration Commutability of Design Pattern the Computer Journal","key":"5"},{"key":"4","first-page":"274","article-title":"Automated verification of security pattern compositions, \"information and software technology (1st) elsevier","volume":"53","author":"dong","year":"2010","journal-title":"Science"},{"key":"9","article-title":"Symbolic model checking","author":"mcmillan","year":"1992","journal-title":"An Approach to the State Explosion Problem"},{"key":"8","article-title":"Model checking for security protocols","author":"marrero","year":"1997","journal-title":"Technical Report CMU-SCS-97-139 Carnegie Mellon University"}],"event":{"name":"2012 IEEE International Conference on Granular Computing (GrC-2012)","start":{"date-parts":[[2012,8,11]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,8,13]]}},"container-title":["2012 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6459622\/6468554\/06468641.pdf?arnumber=6468641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:40:12Z","timestamp":1490218812000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6468641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/grc.2012.6468641","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}