{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:56:50Z","timestamp":1772243810842,"version":"3.50.1"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"abstract":"<jats:p>Common program specification and verification build on concepts like method pre- and postconditions and loop invariants. These lectures notes teach those concepts in the context of the language and verifier Dafny.<\/jats:p>","DOI":"10.3233\/978-1-61499-028-4-152","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T14:11:46Z","timestamp":1739974306000},"source":"Crossref","is-referenced-by-count":0,"title":["Getting Started with Dafny: A Guide"],"prefix":"10.3233","author":[{"family":"Koenig Jason","sequence":"additional","affiliation":[]},{"family":"Rustan K.","sequence":"additional","affiliation":[]},{"family":"Leino M.","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["NATO Science for Peace and Security Series - D: Information and Communication Security","Software Safety and Security"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T14:31:31Z","timestamp":1739975491000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=1874-6268&volume=33&spage=152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-028-4-152","relation":{"is-cited-by":[{"id-type":"doi","id":"10.4204\/EPTCS.338.9","asserted-by":"object"}]},"ISSN":["1874-6268"],"issn-type":[{"value":"1874-6268","type":"print"}],"subject":[],"published":{"date-parts":[[2012]]}}}