{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T04:04:54Z","timestamp":1648613094357},"reference-count":46,"publisher":"Cambridge University Press (CUP)","issue":"4","license":[{"start":{"date-parts":[[2013,7,8]],"date-time":"2013-07-08T00:00:00Z","timestamp":1373241600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Math. Struct. Comp. Sci."],"published-print":{"date-parts":[[2013,8]]},"abstract":"Have formal methods in computer science come of age? While the contributions to this special issue of Mathematical Structures in Computer Science<\/jats:italic> attest to their importance in the design and analysis of particular software systems, their relevance to the field as a whole is far wider. In recent years, formal methods have become more accessible and easier to use, more directly related to practical problems and more adaptable to imperfect and\/or approximate specifications in real-life applications. As a result, they are now a central component of computer-science education and research.<\/jats:p>","DOI":"10.1017\/s0960129512000072","type":"journal-article","created":{"date-parts":[[2013,7,8]],"date-time":"2013-07-08T11:28:01Z","timestamp":1373282881000},"page":"934-943","source":"Crossref","is-referenced-by-count":0,"title":["Postlude: seamless composition and integration \u2013 a perspective on formal methods research"],"prefix":"10.1017","volume":"23","author":[{"given":"AZER","family":"BESTAVROS","sequence":"first","affiliation":[]},{"given":"ASSAF","family":"KFOURY","sequence":"additional","affiliation":[]},{"given":"ANDREI","family":"LAPETS","sequence":"additional","affiliation":[]}],"member":"56","published-online":{"date-parts":[[2013,7,8]]},"reference":[{"key":"S0960129512000072_ref26","first-page":"381","volume-title":"AIC '06: Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications","author":"Katayama","year":"2006"},{"key":"S0960129512000072_ref36","first-page":"27","article-title":"Hoogle overview.","volume":"12","author":"Mitchell","year":"2008","journal-title":"The Monad.Reader"},{"key":"S0960129512000072_ref43","volume-title":"Proceedings of EOOLT 2011: 4th International Workshop on Equation-Based Object-Oriented Modeling Languages and Tools","author":"Soule","year":"2011"},{"key":"S0960129512000072_ref3","doi-asserted-by":"crossref","unstructured":"Ancona D. , Damiani F. , Drossopoulou S. and Zucca E. (2004) Even more principal typings for Java-like languages. In: ECOOP Workshop on Formal Techniques for Java Programs.","DOI":"10.1145\/964001.964027"},{"key":"S0960129512000072_ref8","doi-asserted-by":"publisher","DOI":"10.2307\/2687773"},{"key":"S0960129512000072_ref32","unstructured":"Lim S.-S. et al. (1995) An accurate worst case timing analysis for risc processors. In: Proceedings of the 15th IEEE real-time systems symposium 97\u2013108."},{"key":"S0960129512000072_ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36078-6_25"},{"key":"S0960129512000072_ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(97)00165-5"},{"key":"S0960129512000072_ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321646"},{"key":"S0960129512000072_ref40","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MC.1996.488298","article-title":"An invitation to formal methods. A \u2018roundtable\u2019 of short articles by several authors.","volume":"29","author":"Saiedian","year":"1996","journal-title":"IEEE Computer"},{"key":"S0960129512000072_ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-007-9073-2"},{"key":"S0960129512000072_ref24","doi-asserted-by":"crossref","unstructured":"Jim T. (1995) What are principal typings and what are they good for? Technical Memorandum MIT LCS TM 532.","DOI":"10.1145\/237721.237728"},{"key":"S0960129512000072_ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2012.06.004"},{"key":"S0960129512000072_ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24725-8_21"},{"key":"S0960129512000072_ref29","volume-title":"Enterprise SOA: Service-Oriented Architecture Best Practices (The Coad Series)","author":"Krafzig","year":"2004"},{"key":"S0960129512000072_ref15","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/REAL.1997.641292","volume-title":"Proceedings of the 18th IEEE Real-Time Systems Symposium","author":"Deng","year":"1997"},{"key":"S0960129512000072_ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EMRTS.2001.934038"},{"key":"S0960129512000072_ref37","doi-asserted-by":"publisher","DOI":"10.1007\/11825890_1"},{"key":"S0960129512000072_ref39","first-page":"143","volume-title":"Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference","author":"Regehr","year":"2002"},{"key":"S0960129512000072_ref34","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047600.45421.6d"},{"key":"S0960129512000072_ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592436"},{"key":"S0960129512000072_ref13","doi-asserted-by":"publisher","DOI":"10.1145\/242223.242257"},{"key":"S0960129512000072_ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.64"},{"key":"S0960129512000072_ref6","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.66.2"},{"key":"S0960129512000072_ref19","volume-title":"13th IFAC Symposium on Information Control Problems in Manufacturing (Track Advanced Software Engineering)","author":"Hanenberg","year":"2009"},{"key":"S0960129512000072_ref11","volume-title":"Proceedings of AAAI Spring Symposium on Knowledge Collection from Volunteer Contributors (KCVC05)","author":"Chklovski","year":"2005"},{"key":"S0960129512000072_ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1088622.1088630"},{"key":"S0960129512000072_ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-007-9070-5"},{"key":"S0960129512000072_ref21","doi-asserted-by":"crossref","unstructured":"Hanenberg S. (2010b) Faith, hope, and love \u2013 a criticism of software science's carelessness with regard to the human factor. In: Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA\/SPLASH) 933\u2013946.","DOI":"10.1145\/1869459.1869536"},{"key":"S0960129512000072_ref16","doi-asserted-by":"publisher","DOI":"10.1145\/177492.177725"},{"key":"S0960129512000072_ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45449-7_27"},{"key":"S0960129512000072_ref17","doi-asserted-by":"publisher","DOI":"10.2307\/2687775"},{"key":"S0960129512000072_ref2","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964027"},{"key":"S0960129512000072_ref38","doi-asserted-by":"crossref","unstructured":"Pouwelse J. , Langendoen K. and Sips H. (2001) Dynamic voltage scaling on a low-power microprocessor. In: Mobile Computing and Networking \u2013 Mobicom 251\u2013259.","DOI":"10.1145\/381677.381701"},{"key":"S0960129512000072_ref14","first-page":"315","volume-title":"The Universal Turing Machine: A Half-Century Survey","author":"Davis","year":"1988"},{"key":"S0960129512000072_ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2003.10.032"},{"key":"S0960129512000072_ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.03.063"},{"key":"S0960129512000072_ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45653-8_35"},{"key":"S0960129512000072_ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2003.1183145"},{"key":"S0960129512000072_ref27","unstructured":"Kfoury A. (2011) The Denotational, Operational, and Static Semantics of a Domain-Specific Language for the Design of Flow Networks. In: Proceedings of SBLP 2011: Brazilian Symposium on Programming Languages."},{"key":"S0960129512000072_ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11812289_10"},{"key":"S0960129512000072_ref1","volume-title":"PTP '01: IJCAR Workshop on Proof Transformations, Proof Presentations and Complexity of Proofs","author":"Abel","year":"2001"},{"key":"S0960129512000072_ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85110-3_47"},{"key":"S0960129512000072_ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-005-2643-9"},{"key":"S0960129512000072_ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14107-2_14"},{"key":"S0960129512000072_ref23","volume-title":"Software Abstractions: Logic, Language, and Analysis","author":"Jackson","year":"2006"}],"container-title":["Mathematical Structures in Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S0960129512000072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T20:43:15Z","timestamp":1556052195000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S0960129512000072\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,8]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["S0960129512000072"],"URL":"https:\/\/doi.org\/10.1017\/s0960129512000072","relation":{},"ISSN":["0960-1295","1469-8072"],"issn-type":[{"value":"0960-1295","type":"print"},{"value":"1469-8072","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,8]]}}}