{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:26Z","timestamp":1772164046870,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":0,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,2]],"date-time":"2012-12-02T00:00:00Z","timestamp":1354406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,2]]},"DOI":"10.1145\/2402676.2402679","type":"proceedings-article","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T12:08:34Z","timestamp":1354190914000},"page":"3-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Leading-edge Ada verification technologies"],"prefix":"10.1145","author":[{"given":"Jason","family":"Belt","sequence":"first","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"Patrice","family":"Chalin","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"John","family":"Hatcliff","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"family":"Robby","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,12,2]]},"event":{"name":"HILT'12: ACM SIGAda Annual","location":"Boston Massachusetts USA","acronym":"HILT'12","sponsor":["SIGAda ACM Special Interest Group on Ada Programming Language","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems","SIGCAS ACM Special Interest Group on Computers and Society","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2012 ACM conference on High integrity language technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2402676.2402679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2402676.2402679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2402676.2402679"}},"subtitle":["highly automated Ada contract checking using bakar kiasan"],"short-title":[],"issued":{"date-parts":[[2012,12,2]]},"references-count":0,"alternative-id":["10.1145\/2402676.2402679","10.1145\/2402676"],"URL":"https:\/\/doi.org\/10.1145\/2402676.2402679","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2402709.2402679","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,12,2]]},"assertion":[{"value":"2012-12-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}