{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:10Z","timestamp":1772164030626,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,2]],"date-time":"2012-12-02T00:00:00Z","timestamp":1354406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,2]]},"DOI":"10.1145\/2402676.2402699","type":"proceedings-article","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T12:08:34Z","timestamp":1354190914000},"page":"63-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Real-time Java in modernization of the aegis weapon system"],"prefix":"10.1145","author":[{"given":"Kelvin","family":"Nilsen","sequence":"first","affiliation":[{"name":"Atego Systems, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Prentice Hall PTR.","author":"Arnold K.","year":"2005"},{"key":"e_1_3_2_1_2_1","unstructured":"R. Stanton Transitioning Legacy Proprietary Systems to Open Architecture Marine Systems and Technology 2010 Rome Italy  R. Stanton Transitioning Legacy Proprietary Systems to Open Architecture Marine Systems and Technology 2010 Rome Italy"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Winkler The Modernization of the Aegis Fleet with Open Architecture Keynote address presented at Java Technology for Real-Time and Embedded Systems Sept. 2011 York UK.  A. Winkler The Modernization of the Aegis Fleet with Open Architecture Keynote address presented at Java Technology for Real-Time and Embedded Systems Sept. 2011 York UK."},{"key":"e_1_3_2_1_4_1","unstructured":"K. Nilsen Differentiating Features of the PERC Virtual Machine http:\/\/www.aonix.com\/pdf\/PERCWhitePaper_e.pdf  K. Nilsen Differentiating Features of the PERC Virtual Machine http:\/\/www.aonix.com\/pdf\/PERCWhitePaper_e.pdf"},{"key":"e_1_3_2_1_5_1","unstructured":"G. Bollella B. Brosgol J. Gosling P. Dibble S. Furr M. Turnbull The Real-Time Specification for Java Addison Wesley Longman 195 pages Jan. 15 2000.  G. Bollella B. Brosgol J. Gosling P. Dibble S. Furr M. Turnbull The Real-Time Specification for Java Addison Wesley Longman 195 pages Jan. 15 2000."},{"key":"e_1_3_2_1_6_1","volume-title":"Atego White Paper","author":"Nilsen K.","year":"2004"},{"key":"e_1_3_2_1_7_1","unstructured":"D. Locke B. S. Andersen B. Brosgol M. Fulton T. Henties J. Hunt J. Nielsen K. Nilsen M. Schoeberl J. Tokar J. Vitek A. Wellings. Safety-Critical Java Technology Specification Public Draft version 0.78 Oct. 2010 available at http:\/\/www.jcp.org\/en\/jsr\/detail?id=302.  D. Locke B. S. Andersen B. Brosgol M. Fulton T. Henties J. Hunt J. Nielsen K. Nilsen M. Schoeberl J. Tokar J. Vitek A. Wellings. Safety-Critical Java Technology Specification Public Draft version 0.78 Oct. 2010 available at http:\/\/www.jcp.org\/en\/jsr\/detail?id=302."},{"key":"e_1_3_2_1_8_1","volume-title":"Conference Proceedings: Embedded Real-Time Software and Systems","author":"Richard-Foy M.","year":"2010"},{"key":"e_1_3_2_1_9_1","volume-title":"Conference Proceedings System and Software Technology Conference","author":"Durbin J.","year":"2011"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288940.1288943"}],"event":{"name":"HILT'12: ACM SIGAda Annual","location":"Boston Massachusetts USA","acronym":"HILT'12","sponsor":["SIGAda ACM Special Interest Group on Ada Programming Language","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems","SIGCAS ACM Special Interest Group on Computers and Society","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2012 ACM conference on High integrity language technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2402676.2402699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2402676.2402699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2402676.2402699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,2]]},"references-count":10,"alternative-id":["10.1145\/2402676.2402699","10.1145\/2402676"],"URL":"https:\/\/doi.org\/10.1145\/2402676.2402699","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2402709.2402699","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,12,2]]},"assertion":[{"value":"2012-12-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}