{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:44Z","timestamp":1772164004575,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,18]],"date-time":"2014-10-18T00:00:00Z","timestamp":1413590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,18]]},"DOI":"10.1145\/2663171.2663184","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T08:29:24Z","timestamp":1413275364000},"page":"81-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A framework for model checking UDP network programs with Java pathfinder"],"prefix":"10.1145","author":[{"given":"William","family":"Rathje","sequence":"first","affiliation":[{"name":"University of Puget Sound, Tacoma, WA, USA"}]},{"given":"Brad","family":"Richards","sequence":"additional","affiliation":[{"name":"University of Puget Sound, Tacoma, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.10"},{"key":"e_1_3_2_1_2_1","first-page":"22","volume-title":"Models and Patterns","author":"Artho C.","year":"2008","unstructured":"C. Artho , Leungwattanakit, W., M. Hagiya , and Y. Tanabe . Efficient model checking of networked applications. Objects, Components , Models and Patterns , pages 22 -- 40 , 2008 . C. Artho, Leungwattanakit, W., M. Hagiya, and Y. Tanabe. Efficient model checking of networked applications. Objects, Components, Models and Patterns, pages 22--40, 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.43"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321638"},{"key":"e_1_3_2_1_5_1","volume-title":"Model Checking","author":"Clarke E.","year":"1999","unstructured":"E. Clarke , O. Grumberg , and D. Peled . Model Checking . The MIT Press , 1999 . E. Clarke, O. Grumberg, and D. Peled. Model Checking. The MIT Press, 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050043"},{"key":"e_1_3_2_1_7_1","first-page":"155","volume-title":"Proceedings of the First Symposium on Networked Systems Design and Implementation","author":"Musuvathi M.","year":"2004","unstructured":"M. Musuvathi and D. Engler . Model checking large network protocol implementations . In Proceedings of the First Symposium on Networked Systems Design and Implementation , pages 155 -- 168 . NSDI, March 2004 . M. Musuvathi and D. Engler. Model checking large network protocol implementations. In Proceedings of the First Symposium on Networked Systems Design and Implementation, pages 155--168. NSDI, March 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/330908.331865"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971408"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/544414.544425"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557833.2560577"},{"key":"e_1_3_2_1_12_1","volume-title":"Model Checking Distributed Java Applications. Unpublished Thesis Proposal","author":"Shafiei N.","year":"2013","unstructured":"N. Shafiei , E. Ruppert , and J. Ostroff . Model Checking Distributed Java Applications. Unpublished Thesis Proposal . University of York. , 2013 . N. Shafiei, E. Ruppert, and J. Ostroff. Model Checking Distributed Java Applications. Unpublished Thesis Proposal. University of York., 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/380921.380938"}],"event":{"name":"HILT '14: High Integrity Language Technology ACM SIGAda Annual Conference","location":"Portland Oregon USA","acronym":"HILT '14","sponsor":["SIGAda ACM Special Interest Group on Ada Programming Language","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages","Ada Europe Ada Europe","SIGBED ACM Special Interest Group on Embedded Systems","SIGSOFT ACM Special Interest Group on Software Engineering","SIGCAS ACM Special Interest Group on Computers and Society","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2014 ACM SIGAda annual conference on High integrity language technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663171.2663184","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663171.2663184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:47Z","timestamp":1750212827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663171.2663184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,18]]},"references-count":13,"alternative-id":["10.1145\/2663171.2663184","10.1145\/2663171"],"URL":"https:\/\/doi.org\/10.1145\/2663171.2663184","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2692956.2663184","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,10,18]]},"assertion":[{"value":"2014-10-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}