{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T10:32:21Z","timestamp":1648981941016},"reference-count":21,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":1397,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1016\/j.entcs.2009.09.033","type":"journal-article","created":{"date-parts":[[2009,9,27]],"date-time":"2009-09-27T08:19:26Z","timestamp":1254039566000},"page":"145-160","source":"Crossref","is-referenced-by-count":1,"title":["Automated Construction of Reasonable Environment for Java Components"],"prefix":"10.1016","volume":"253","author":[{"given":"Pavel","family":"Parizek","sequence":"first","affiliation":[]},{"given":"Jiri","family":"Adamek","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Kalibera","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.entcs.2009.09.033_bib002","doi-asserted-by":"crossref","unstructured":"Bradbury, J. S., J. R. Cordy, and J. Dingel, Mutation Operators for Concurrent Java (J2SE 5.0), In Proceedings of the 2nd Workshop on Mutation Analysis (Mutation 2006), 2006","DOI":"10.1109\/MUTATION.2006.10"},{"issue":"6","key":"10.1016\/j.entcs.2009.09.033_bib003","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2004.22","article-title":"Modular Verification of Software Components in C","volume":"30","author":"Chaki","year":"2004","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.entcs.2009.09.033_bib004","series-title":"Model Checking","author":"Clarke","year":"2000"},{"key":"10.1016\/j.entcs.2009.09.033_bib005","series-title":"Proceedings of the 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems","article-title":"Learning Assumptions for Compositional Verification","volume":"vol. 2619","author":"Cobleigh","year":"2003"},{"key":"10.1016\/j.entcs.2009.09.033_bib006","series-title":"Proceedings of the 17th IEEE International Conference on Automated Software Engineering","article-title":"Assumption Generation for Software Component Verification","author":"Giannakopoulou","year":"2002"},{"key":"10.1016\/j.entcs.2009.09.033_bib007","series-title":"Proceedings of 26th ICSE","article-title":"Assume-guarantee Verification of Source Code with Design-Level Assumptions","author":"Giannakopoulou","year":"2004"},{"key":"10.1016\/j.entcs.2009.09.033_bib009","series-title":"Proceedings of the 9th International SPIN Workshop on Model Checking of Software","article-title":"Heuristics for Model Checking Java Programs","volume":"vol. 2318","author":"Groce","year":"2002"},{"key":"10.1016\/j.entcs.2009.09.033_bib010","doi-asserted-by":"crossref","unstructured":"Hughes, G., S. P. Rajan, T. Sidle, and K. Swenson, Error Detection in Concurrent Java Programs, In Proceedings of SoftMC 2005, ENTCS, 144(3)","DOI":"10.1016\/j.entcs.2006.01.004"},{"key":"10.1016\/j.entcs.2009.09.033_bib011","unstructured":"Mathews, M. E., and S. Tu, Metrics Measuring Control Flow Complexity in Concurrent Programs, Proceedings of the 13th PNSQC, 1995"},{"key":"10.1016\/j.entcs.2009.09.033_bib012","author":"Parizek"},{"key":"10.1016\/j.entcs.2009.09.033_bib013","series-title":"Proceedings of the 33rd EUROMICRO SEAA conference","article-title":"Partial Verification of Software Components: Heuristics for Environment Construction","author":"Parizek","year":"2007"},{"issue":"2","key":"10.1016\/j.entcs.2009.09.033_bib014","article-title":"Specification and Generation of Environment for Model Checking of Software Components","volume":"176","author":"Parizek","year":"2007","journal-title":"ENTCS"},{"key":"10.1016\/j.entcs.2009.09.033_bib015","series-title":"Proceedings of the 6th SPIN Workshop on Model Checking of Software","article-title":"Assume-Guarantee Model Checking of Software: A Comparative Case Study","volume":"vol. 1680","author":"Pasareanu","year":"1999"},{"issue":"11","key":"10.1016\/j.entcs.2009.09.033_bib016","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2002.1049404","article-title":"Behavior Protocols for Software Components","volume":"28","author":"Plasil","year":"2002","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.entcs.2009.09.033_bib017","author":"Qadeer"},{"key":"10.1016\/j.entcs.2009.09.033_bib018","series-title":"Proceedings of the 9th European Software Engineering Conference","article-title":"Bogor: An extensible and highly-modular model checking framework","author":"Robby","year":"2003"},{"issue":"8","key":"10.1016\/j.entcs.2009.09.033_bib019","article-title":"Towards Complexity Metrics for Ada Tasking","volume":"14","author":"Shatz","year":"1988","journal-title":"IEEE Trans. Sw. Eng."},{"key":"10.1016\/j.entcs.2009.09.033_bib020","series-title":"Proceedings of ASE'03","article-title":"Automated Environment Generation for Software Model Checking","author":"Tkachuk","year":"2003"},{"key":"10.1016\/j.entcs.2009.09.033_bib021","series-title":"Proceedings of ISSTA'06","article-title":"Application of Automated Environment Generation to Commercial Software","author":"Tkachuk","year":"2006"},{"issue":"2","key":"10.1016\/j.entcs.2009.09.033_bib022","doi-asserted-by":"crossref","DOI":"10.1023\/A:1022920129859","article-title":"Model Checking Programs","volume":"10","author":"Visser","year":"2003","journal-title":"Automated Software Engineering Journal"},{"key":"10.1016\/j.entcs.2009.09.033_bib023","unstructured":"Zhao, J., Analyzing Control Flow in Java Bytecode, Tech. report, Fukuoka Inst. of Technology, 2000"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066109003879?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066109003879?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T21:42:48Z","timestamp":1558561368000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066109003879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["S1571066109003879"],"URL":"https:\/\/doi.org\/10.1016\/j.entcs.2009.09.033","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2009,10]]}}}