{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:45:24Z","timestamp":1767167124869,"version":"build-2238731810"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2013,7,12]],"date-time":"2013-07-12T00:00:00Z","timestamp":1373587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2013,7,12]]},"abstract":"<jats:p>To provide a forum for researchers in related research areas to address the challenges in high confidence software, exchange ideas, and foster collaborations, the Institute of Software and Key Laboratory of High Confidence Software Technologies (Ministry of Education) at Peking University hosted and sponsored the International Symposium on High Confidence Software in 2011 and 2012. The symposium consisted of a series of invited talks from internationally known researchers on the symposium topic, discussion\/panel sessions, and poster sessions to enable substantial interactions among attendees.<\/jats:p>","DOI":"10.1145\/2492248.2492282","type":"journal-article","created":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T03:42:01Z","timestamp":1585971721000},"page":"27-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Report on the international symposium on high confidence software (ISHCS 2011\/2012)"],"prefix":"10.1145","volume":"38","author":[{"given":"Tao","family":"Xie","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2013,7,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.189"},{"key":"e_1_2_1_2_1","first-page":"588","volume-title":"Internetware: An emerging software paradigm for Internet computing. Journal of Computer Science and Technology","author":"Mei H.","year":"2011","unstructured":"H. Mei , X. Liu . Internetware: An emerging software paradigm for Internet computing. Journal of Computer Science and Technology , Volume 26 , Issue 4, pages 588 -- 599 , 2011 . H. Mei, X. Liu. Internetware: An emerging software paradigm for Internet computing. Journal of Computer Science and Technology, Volume 26, Issue 4, pages 588--599, 2011."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2010.90"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.24"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270332"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.30"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.31"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985876"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486941"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337327"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882324"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859204.1859226"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.04.078"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.005"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.35"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.99"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000793"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242060.1242063"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070821.2070829"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337345"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421004"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337241"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863573"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337287"},{"key":"e_1_2_1_26_1","volume-title":"Proc. USENIX Security","author":"Sun F.","year":"2011","unstructured":"F. Sun , L. Xu , Z. Su . Static detection of access control vulnerabilities in web applications . In Proc. USENIX Security , 2011 . F. Sun, L. Xu, Z. Su. Static detection of access control vulnerabilities in web applications. In Proc. USENIX Security, 2011."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393614"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337236"},{"key":"e_1_2_1_29_1","first-page":"293","volume-title":"Proc. OSDI","author":"Yuan D.","year":"2012","unstructured":"D. Yuan , S. Park , P. Huang , Y. Liu , M. M. Lee , X. Tang , Y. Zhou , S. Savage . Be conservative : Enhancing failure diagnosis with proactive logging . In Proc. OSDI , pages 293 -- 306 , 2012 . D. Yuan, S. Park, P. Huang, Y. Liu, M. M. Lee, X. Tang, Y. Zhou, S. Savage. Be conservative: Enhancing failure diagnosis with proactive logging. In Proc. OSDI, pages 293--306, 2012."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110360"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.49"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351735"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487157"},{"key":"e_1_2_1_35_1","first-page":"951","volume-title":"Proc. ICSE, Software Engineering in Practice, Mini-Tutorial","author":"Zhang D.","year":"2013","unstructured":"D. Zhang , T. Xie . Pathways to technology transfer and adoption: Achievements and challenges . In Proc. ICSE, Software Engineering in Practice, Mini-Tutorial , pages 951 -- 952 , 2013 . D. Zhang, T. Xie. Pathways to technology transfer and adoption: Achievements and challenges. In Proc. ICSE, Software Engineering in Practice, Mini-Tutorial, pages 951--952, 2013."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025115.1025219"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2007206.2007217"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02408-5_19"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384634"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462189"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882323"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337328"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462167"},{"key":"e_1_2_1_45_1","author":"Liu X.","unstructured":"X. Liu , Y. Yang , D. Yuan and J. Chen , Do we need to handle every temporal violation in scientific workflow systems? ACM Transactions on Software Engineering and Methodology. To appear. X. Liu, Y. Yang, D. Yuan and J. Chen, Do we need to handle every temporal violation in scientific workflow systems? ACM Transactions on Software Engineering and Methodology. To appear.","journal-title":"ACM Transactions on Software Engineering and Methodology. To appear."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351701"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337231"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110147.2110164"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492248.2492282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2492248.2492282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:02Z","timestamp":1750221542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492248.2492282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,12]]},"references-count":48,"aliases":["10.1145\/2492248.2503012"],"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,7,12]]}},"alternative-id":["10.1145\/2492248.2492282"],"URL":"https:\/\/doi.org\/10.1145\/2492248.2492282","relation":{},"ISSN":["0163-5948"],"issn-type":[{"value":"0163-5948","type":"print"}],"subject":[],"published":{"date-parts":[[2013,7,12]]},"assertion":[{"value":"2013-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}