{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:04:59Z","timestamp":1729663499535,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icccn.2017.8038505","type":"proceedings-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T20:33:46Z","timestamp":1505766826000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Equivalence Checking of Java Methods: Toward Ensuring IoT Dependability"],"prefix":"10.1109","author":[{"given":"Kozo","family":"Okano","sequence":"first","affiliation":[]},{"given":"Satoshi","family":"Harauchi","sequence":"additional","affiliation":[]},{"given":"Toshifusa","family":"Sekizawa","sequence":"additional","affiliation":[]},{"given":"Shinpei","family":"Ogata","sequence":"additional","affiliation":[]},{"given":"Shin","family":"Nakashima","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"77","article-title":"Formal Verification Technique for Consistency Checking between equals and hashCode Methods in Java","volume":"7","author":"okano","year":"2015","journal-title":"Inform Soc Int J"},{"journal-title":"Software Abstractions Logic Language and Analysis (Revised Edition)","year":"2011","author":"jackson","key":"ref11"},{"journal-title":"The SMT-LIB Standard Version 2 0","year":"2010","author":"barrett","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48869-1_5"},{"key":"ref14","first-page":"272","volume":"25","author":"darringer","year":"1981","journal-title":"Logic Synthesis through Local Transformations"},{"key":"ref15","first-page":"24","article-title":"ABC: An Academic Industrial-Strength Verification Tool","volume":"6174","author":"brayton","year":"2010","journal-title":"LNCS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2002.804386"},{"key":"ref17","first-page":"337","article-title":"Z3: An efficient SMT solver","volume":"4963","author":"de moura","year":"2008","journal-title":"Proceedings of TACAS 2008 LNCS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_49"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-642-22110-1_14","article-title":"CVC4","author":"barrett","year":"2011","journal-title":"Proceedings of the 23rd international conference on Computer aided verification (CAV&#x2018;11)"},{"key":"ref28","article-title":"Studying Verification Conditions for Imperative Programs","author":"lourenco","year":"2015","journal-title":"Proceedings of 15th International Workshop on Automated Verification of Critical Systems AVoCS'15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070534"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_17"},{"journal-title":"Apache PDFBox - A Java PDF Library","year":"0","key":"ref3"},{"key":"ref6","first-page":"317","article-title":"Secure the clones: Static enforcement of policies for secure object copying","author":"jensen","year":"2010","journal-title":"Proceedings of the 20th European conference on Programming languages and systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1868294.1868320"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463800"},{"journal-title":"Java Platform Standard Edition 7 API Specification","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405256"},{"journal-title":"Interactive The Top Programming Languages 2016","year":"0","author":"diakopoulos","key":"ref1"},{"key":"ref20","first-page":"93","article-title":"The Math-SAT5 SMT Solver","volume":"7795","author":"cimatti","year":"2013","journal-title":"Proc TACAS 2013 Ser LNCS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-004-0167-4"},{"journal-title":"Handbook of Satisfiability","year":"2009","author":"biere","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_16"},{"journal-title":"Object-Oriented Software Construction Second Edition","year":"1997","author":"meyer","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1066100.1066102"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2588548.2588550"}],"event":{"name":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2017,7,31]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2017,8,3]]}},"container-title":["2017 26th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8038296\/8038338\/08038505.pdf?arnumber=8038505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T16:47:14Z","timestamp":1570121234000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8038505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icccn.2017.8038505","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}