{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:46:58Z","timestamp":1760586418056,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2006,12]]},"abstract":"<jats:p>Using formal verification techniques to verify designs within a product line.<\/jats:p>","DOI":"10.1145\/1183236.1183270","type":"journal-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T19:38:29Z","timestamp":1168976309000},"page":"73-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Formal verification and software product lines"],"prefix":"10.1145","volume":"49","author":[{"given":"Tomoji","family":"Kishi","sequence":"first","affiliation":[{"name":"Japan Advanced Institute of Science and Technology"}]},{"given":"Natsuko","family":"Noda","sequence":"additional","affiliation":[{"name":"NEC Corporation"}]}],"member":"320","published-online":{"date-parts":[[2006,12]]},"reference":[{"volume-title":"MIT","year":"1999","author":"Clarke E.","key":"e_1_2_1_1_1"},{"volume-title":"Addison-Wesley","year":"2001","author":"Clements P.","key":"e_1_2_1_2_1"},{"volume-title":"Object Technology Series","year":"2004","author":"Gomaa H.","key":"e_1_2_1_3_1"},{"volume-title":"Addison-Wesley","year":"2004","author":"Holzmann G.J.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","first-page":"21","volume":"9","author":"Kang K.","year":"1990","journal-title":"Feature-Oriented Domain Analysis (FODA) Feasibility Study. CUM\/SEI-"},{"volume-title":"Proceedings of the 2nd IEEE Workshop on Software Technology for Embedded and Ubiquitous Computing Systems (WSTFEUS'04)","year":"2004","author":"Kishi T.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_18"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/503209.503236"},{"volume-title":"Springer","year":"2005","author":"Paul K.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_17"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1183236.1183270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1183236.1183270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:37Z","timestamp":1750259197000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1183236.1183270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":10,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["10.1145\/1183236.1183270"],"URL":"https:\/\/doi.org\/10.1145\/1183236.1183270","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2006,12]]},"assertion":[{"value":"2006-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}