{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:37:23Z","timestamp":1648870643076},"reference-count":2,"publisher":"International Academy Publishing (IAP)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.10.2455-2461","type":"journal-article","created":{"date-parts":[[2013,9,30]],"date-time":"2013-09-30T19:11:37Z","timestamp":1380568297000},"source":"Crossref","is-referenced-by-count":0,"title":["Software Behavior Modeling Based on Invariant Constraints"],"prefix":"10.17706","volume":"8","author":[{"given":"Cheng","family":"Peng","sequence":"first","affiliation":[]},{"given":"Lu-ming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jun-feng","family":"Man","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,10,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1551-2916.2012.05148.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ceramint.2011.10.073"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:23:58Z","timestamp":1442330638000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/10248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":2,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2013,10,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.10.2455-2461","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}