{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:50Z","timestamp":1750306730477,"version":"3.41.0"},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM SIGLOG News"],"published-print":{"date-parts":[[2014,7]]},"abstract":"<jats:p>Verification can be described as a process applying logical reasoning to mathematical models of computation. Often these models represent software and hardware systems or their components, however, various other application domains, for example, systems biology, can also benefit from verification techniques.<\/jats:p>","DOI":"10.1145\/2657460.2657466","type":"journal-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T21:47:51Z","timestamp":1585950471000},"page":"9-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Verification column"],"prefix":"10.1145","volume":"1","author":[{"given":"Andrey","family":"Rybalchenko","sequence":"first","affiliation":[{"name":"Microsoft Research Cambridge"}]}],"member":"320","published-online":{"date-parts":[[2014,7]]},"container-title":["ACM SIGLOG News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2657460.2657466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2657460.2657466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:43Z","timestamp":1750231183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2657460.2657466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["10.1145\/2657460.2657466"],"URL":"https:\/\/doi.org\/10.1145\/2657460.2657466","relation":{},"ISSN":["2372-3491"],"issn-type":[{"type":"electronic","value":"2372-3491"}],"subject":[],"published":{"date-parts":[[2014,7]]},"assertion":[{"value":"2014-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}