{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:58:28Z","timestamp":1730260708743,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icycs.2008.168","type":"proceedings-article","created":{"date-parts":[[2008,12,17]],"date-time":"2008-12-17T20:14:35Z","timestamp":1229544875000},"page":"2295-2301","source":"Crossref","is-referenced-by-count":0,"title":["Implementation of Pointer Logic for Automated Verification"],"prefix":"10.1109","author":[{"given":"Zhifang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yiyun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhenming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/514188.514190"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2002.1029817"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040330"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2004.10.007"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378851"},{"key":"3","first-page":"102","article-title":"proving pointer programs in hoare logic","author":"bornat","year":"2000","journal-title":"Proc of MPC'00"},{"key":"2","first-page":"52","article-title":"symbolic execution with separation logic","author":"berdine","year":"2005","journal-title":"Proc of APLAS'05"},{"key":"1","first-page":"115","article-title":"smallfoot: modular automatic assertion checking with separation logic","volume":"4111","author":"berdine","year":"2005","journal-title":"LNCS"},{"key":"10","first-page":"321","article-title":"abstract storage structures. in de bakker and van","author":"jonkers","year":"1981","journal-title":"Algorithmic Languages"},{"journal-title":"The Coq Proof Assistant","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-007-0029-9"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2007.19"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/777388.777395"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.69"},{"key":"8","first-page":"1","article-title":"local reasoning about programs that alter data structures","volume":"2142","author":"o'hearn","year":"2001","journal-title":"LNCS"}],"event":{"name":"2008 9th International Conference for Young Computer Scientists (ICYCS)","start":{"date-parts":[[2008,11,18]]},"location":"Hunan, China","end":{"date-parts":[[2008,11,21]]}},"container-title":["2008 The 9th International Conference for Young Computer Scientists"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4708920\/4708921\/04709330.pdf?arnumber=4709330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:54:40Z","timestamp":1489769680000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4709330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icycs.2008.168","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}