{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:38:34Z","timestamp":1725622714408},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265704","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":14,"title":["Improving network system security with function extraction technology for automated calculation of program behavior"],"prefix":"10.1109","author":[{"given":"M.G.","family":"Pleszkoch","sequence":"first","affiliation":[]},{"given":"R.C.","family":"Linger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Principles of Information Systems Analysis and Design","year":"1986","author":"mills","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/0471028959.sof040"},{"article-title":"Generalized Aliasing as a Basis for Program Analysis Tools","year":"2000","author":"o'callahan","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1990.205177"},{"journal-title":"Cleanroom Software Engineering Technology and Practice","year":"1999","author":"prowell","key":"ref14"},{"key":"ref4","article-title":"Specifying Large-Scale, Adaptive Systems with Flow-Service-Quality (FSQ) Objects","author":"hevner","year":"2001","journal-title":"Proc 10th OOPSLA Workshop Behavioral Semantics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/52.43050"},{"journal-title":"Software Fundamentals Collected Papers by David L Parnas","year":"2001","author":"hoffman","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994480"},{"journal-title":"Flow-Service-Quality Engineering Foundations for Network System Analysis and Development CMU\/SEI-2002-TN-01","year":"2002","author":"linger","key":"ref8"},{"journal-title":"Structured Programming Theory and Practice","year":"1979","author":"linger","key":"ref7"},{"journal-title":"Computability and Unsolvability","year":"1982","author":"davis","key":"ref2"},{"journal-title":"Compilers Principles Techniques and Tools","year":"1986","author":"aho","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1016\/S0049-237X(08)72018-4","article-title":"A Basis for a Mathematical Theory of Computation","author":"mccarthy","year":"1963","journal-title":"Computer Programming and Formal Systems"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265704.pdf?arnumber=1265704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:56:10Z","timestamp":1497599770000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265704","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}