{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:10Z","timestamp":1772164030629,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,2]],"date-time":"2012-12-02T00:00:00Z","timestamp":1354406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,2]]},"DOI":"10.1145\/2402676.2402707","type":"proceedings-article","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T12:08:34Z","timestamp":1354190914000},"page":"97-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Adapting ACATS for use with run-time checks suppressed"],"prefix":"10.1145","author":[{"given":"Dan R.","family":"Eilers","sequence":"first","affiliation":[{"name":"Irvine Compiler Corp., Irvine, CA, USA"}]},{"given":"Tero","family":"Koskinen","sequence":"additional","affiliation":[{"name":"n\/a, Tampere, Finland"}]}],"member":"320","published-online":{"date-parts":[[2012,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Baptiste Fouques list of errors whose detection is required by RM comp.lang.ada August 8 2011. http:\/\/groups.google.com\/forum\/#!topic\/comp.lang.ada\/-5HAYDbXmuI Reprinted in Ada User Journal Vol 32 No 4 December 2011.  Baptiste Fouques list of errors whose detection is required by RM comp.lang.ada August 8 2011. http:\/\/groups.google.com\/forum\/#!topic\/comp.lang.ada\/-5HAYDbXmuI Reprinted in Ada User Journal Vol 32 No 4 December 2011."},{"key":"e_1_3_2_1_2_1","unstructured":"Randall L. Brukardt Ada Conformity Assessment Test Suite (ACATS) http:\/\/www.ada-auth.org\/acats.html.  Randall L. Brukardt Ada Conformity Assessment Test Suite (ACATS) http:\/\/www.ada-auth.org\/acats.html."},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","volume-title":"International Standard ISO\/IEC 8652\/1995(E) with Technical Corrigendum 1 and Amendment 1","author":"Taft S. Tucker","year":"2006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620593.1620597"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Dan\n       \n      Eilers\n     and \n      \n      \n      Tero\n       \n      Koskinen Adapting ACATS to the Ahven Testing Framework. Reliable Software Technologies -- Ada-Europe\n   \n  2011 Lecture Notes in Computer Science 2011 Vol. \n  6652\/2011 pp. \n  75\n  --\n  88\n  .   Dan Eilers and Tero Koskinen Adapting ACATS to the Ahven Testing Framework. Reliable Software Technologies -- Ada-Europe 2011 Lecture Notes in Computer Science 2011 Vol. 6652\/2011 pp. 75--88.","DOI":"10.1007\/978-3-642-21338-0_6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070337.2070361"},{"key":"e_1_3_2_1_7_1","unstructured":"Ada Resource Association Operating Procedures for Ada Conformity Assessments Version 3.0 2001. http:\/\/www.ada-auth.org\/procs\/3.0\/ACAP30.html  Ada Resource Association Operating Procedures for Ada Conformity Assessments Version 3.0 2001. http:\/\/www.ada-auth.org\/procs\/3.0\/ACAP30.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Tery L. Hardy Software and System Safety: Accidents Incidents and Lessons Learned 2012; p. 223.  Tery L. Hardy Software and System Safety: Accidents Incidents and Lessons Learned 2012; p. 223."},{"key":"e_1_3_2_1_9_1","unstructured":"Ada Compiler Validation Implementers' Guide SofTech Inc. Waltham Massachusetts October 1980.  Ada Compiler Validation Implementers' Guide SofTech Inc. Waltham Massachusetts October 1980."}],"event":{"name":"HILT'12: ACM SIGAda Annual","location":"Boston Massachusetts USA","acronym":"HILT'12","sponsor":["SIGAda ACM Special Interest Group on Ada Programming Language","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems","SIGCAS ACM Special Interest Group on Computers and Society","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2012 ACM conference on High integrity language technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2402676.2402707","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2402676.2402707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2402676.2402707"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,2]]},"references-count":9,"alternative-id":["10.1145\/2402676.2402707","10.1145\/2402676"],"URL":"https:\/\/doi.org\/10.1145\/2402676.2402707","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2402709.2402707","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,12,2]]},"assertion":[{"value":"2012-12-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}