{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:24:12Z","timestamp":1770434652665,"version":"3.49.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2008,9]]},"abstract":"<jats:p>The answer to software reliability concerns may lie in formal methods.<\/jats:p>","DOI":"10.1145\/1378727.1378742","type":"journal-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T11:56:36Z","timestamp":1219838196000},"page":"54-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Software engineering and formal methods"],"prefix":"10.1145","volume":"51","author":[{"given":"Mike","family":"Hinchey","sequence":"first","affiliation":[{"name":"University of Limerick, Ireland"}]},{"given":"Michael","family":"Jackson","sequence":"additional","affiliation":[{"name":"The Open University, Milton Keynes, England"}]},{"given":"Patrick","family":"Cousot","sequence":"additional","affiliation":[{"name":"Ecole Normale Sup\u00e9rieure"}]},{"given":"Byron","family":"Cook","sequence":"additional","affiliation":[{"name":"Cambridge University"}]},{"given":"Jonathan P.","family":"Bowen","sequence":"additional","affiliation":[{"name":"London South Bank University"}]},{"given":"Tiziana","family":"Margaria","sequence":"additional","affiliation":[{"name":"Institute of Informatics, Universit\u00e4t Potsdam, Germany"}]}],"member":"320","published-online":{"date-parts":[[2008,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.391826"},{"key":"e_1_2_1_2_1","volume-title":"High-integrity system specification and design. Formal Approaches to Computing and Information Technology","author":"Bowen J.P.","year":"1999","unstructured":"Bowen , J.P. and Hinchey , M.G . High-integrity system specification and design. Formal Approaches to Computing and Information Technology . Springer-Verlag , London , 1999 . Bowen, J.P. and Hinchey, M.G. High-integrity system specification and design. Formal Approaches to Computing and Information Technology. Springer-Verlag, London, 1999."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134029"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250771"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/567752.567778"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2007.55"},{"key":"e_1_2_1_7_1","series-title":"Lecture Notes in Computer Science 4634","volume-title":"Astr\u00e9e: From research to industry","author":"Delmas D.","year":"2007","unstructured":"Delmas , D. and Souyris , J . Astr\u00e9e: From research to industry . Lecture Notes in Computer Science 4634 , Springer ( 2007 ), 437--451. Delmas, D. and Souyris, J. Astr\u00e9e: From research to industry. Lecture Notes in Computer Science 4634, Springer (2007), 437--451."},{"key":"e_1_2_1_8_1","series-title":"Lecture Notes in Computer Science 4147","volume-title":"Analyzing the worst-case execution time by abstract interpretation of executable code","author":"Ferdinand C.","year":"2006","unstructured":"Ferdinand , C. , Heckmann , R. , and Wilhelm , R . Analyzing the worst-case execution time by abstract interpretation of executable code . Lecture Notes in Computer Science 4147 , Springer ( 2006 ), 1--14. Ferdinand, C., Heckmann, R., and Wilhelm, R. Analyzing the worst-case execution time by abstract interpretation of executable code. Lecture Notes in Computer Science 4147, Springer (2006), 1--14."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250765"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the High Dependability Computing Consortium Conference","author":"Gray J.","year":"2001","unstructured":"Gray , J. Dependability in the Internet era . In Proceedings of the High Dependability Computing Consortium Conference , Santa Cruz, CA , May 7, 2001 . Gray, J. Dependability in the Internet era. In Proceedings of the High Dependability Computing Consortium Conference, Santa Cruz, CA, May 7, 2001."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.57887"},{"key":"e_1_2_1_12_1","volume-title":"French, German, Italian and Japanese. Dependable Computing and Fault-Tolerant Systems","author":"Laprie J.-C.","year":"1992","unstructured":"Laprie , J.-C. , ed. Dependability: Basic concepts and terminology in English , French, German, Italian and Japanese. Dependable Computing and Fault-Tolerant Systems , Vol. 5 , Springer-Verlag , NY , 1992 . Laprie, J.-C., ed. Dependability: Basic concepts and terminology in English, French, German, Italian and Japanese. Dependable Computing and Fault-Tolerant Systems, Vol. 5, Springer-Verlag, NY, 1992."},{"key":"e_1_2_1_14_1","unstructured":"http:\/\/research.microsoft.com\/SLAyer  http:\/\/research.microsoft.com\/SLAyer"},{"key":"e_1_2_1_15_1","unstructured":"http:\/\/research.microsoft.com\/terminator  http:\/\/research.microsoft.com\/terminator"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/242224.242296"},{"key":"e_1_2_1_17_1","volume-title":"The meaning of \"formal\": From weak to strong formal methods. STTT1, 1--2","author":"Wolper P.","year":"1997","unstructured":"Wolper , P. The meaning of \"formal\": From weak to strong formal methods. STTT1, 1--2 ( 1997 ), 6--8. Springer Verlag . Wolper, P. The meaning of \"formal\": From weak to strong formal methods. STTT1, 1--2 (1997), 6--8. Springer Verlag."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378727.1378742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378727.1378742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:25Z","timestamp":1750253965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378727.1378742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":16,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["10.1145\/1378727.1378742"],"URL":"https:\/\/doi.org\/10.1145\/1378727.1378742","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]},"assertion":[{"value":"2008-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}