{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T06:44:43Z","timestamp":1745477083213},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2008,12,1]],"date-time":"2008-12-01T00:00:00Z","timestamp":1228089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/jsyst.2008.2009190","type":"journal-article","created":{"date-parts":[[2009,1,14]],"date-time":"2009-01-14T18:47:22Z","timestamp":1231958842000},"page":"513-519","source":"Crossref","is-referenced-by-count":17,"title":["A Visual Tradeoff Space for Formal Verification and Validation Techniques"],"prefix":"10.1109","volume":"2","author":[{"given":"Doron","family":"Drusinsky","sequence":"first","affiliation":[]},{"given":"James Bret","family":"Michael","sequence":"additional","affiliation":[]},{"given":"Man-Tak","family":"Shing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/s100090050010","article-title":"UPPAAL in a nutshell","volume":"1","author":"larsen","year":"1997","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"ref38","first-page":"546","article-title":"Kronos: A model-checking tool for real-time systems","author":"bozga","year":"1998","journal-title":"Proc 10th Int Conf Comput -Aided Verification"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5983-1"},{"key":"ref32","first-page":"263","article-title":"An embedding of timed transition systems in HOL","author":"cardell-oliver","year":"1992","journal-title":"Proc Int Workshop Higher Order Logic Theorem Proving its Appl"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HOL.1991.596282"},{"key":"ref30","author":"joyce","year":"1990","journal-title":"Multi-Level Verification of Microprocessor-Based Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-88074-1.50009-3"},{"key":"ref36","author":"constable","year":"1986","journal-title":"Implementing Mathematics with the Nuprl Proof Development System"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/369264.369271"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2714-2"},{"key":"ref28","first-page":"106","article-title":"Development of practical verification tools","volume":"11","author":"king","year":"1996","journal-title":"ICL Syst J"},{"key":"ref27","author":"paulson","year":"1994","journal-title":"Isabelle A Generic Theorem Prover"},{"key":"ref29","author":"hale","year":"1989","journal-title":"Programming in temporal logic"},{"key":"ref2","year":"2004","journal-title":"Guide to the Software Engineering Body of Knowledge 2004 Version- Swebok"},{"key":"ref1","year":"2002","journal-title":"The Economic Impacts of Inadequate Infrastructure for Software Testing"},{"key":"ref20","first-page":"72","article-title":"The Z-eves system","volume":"1212","year":"1997","journal-title":"Proc Int Conf Z Users"},{"key":"ref22","author":"kaufmann","year":"2000","journal-title":"Computer-Aided Reasoning An Approach"},{"key":"ref21","first-page":"85","article-title":"Model checking Z specifications using SAL","volume":"3455","author":"smith","year":"2005","journal-title":"Proc Int Conf Z Users"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58140-5_26"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/3-540-61474-5_92","article-title":"STeP: Deductive-algorithmic verification of reactive and real-time systems","volume":"1102","author":"bj\ufffdrner","year":"1996","journal-title":"Proc 8th Int Conf Comput -Aided Verification"},{"key":"ref26","author":"boyer","year":"1988","journal-title":"A Computational Logic Handbook"},{"key":"ref25","year":"1993","journal-title":"Introduction to HOL A Theorem Proving Environment for Higher Order Logic"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2007.25"},{"key":"ref51","year":"2008","journal-title":"About IV&V"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-008-0047-2"},{"key":"ref10","author":"jacobson","year":"1999","journal-title":"The Unified Development Process"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(93)90005-H"},{"key":"ref40","first-page":"52","article-title":"Design and synthesis of synchronization skeletons using branching time temporal logic","author":"clarke","year":"1981","journal-title":"Proc Logic of Programs Workshop"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"ref13","first-page":"607","article-title":"Formal methods for specifying, validating, and verifying requirements","volume":"13","author":"heitmeyer","year":"2007","journal-title":"J Universal Comput Sci"},{"key":"ref14","author":"holzmann","year":"1991","journal-title":"Design and Validation of Computer Protocols"},{"key":"ref15","first-page":"131","article-title":"TAME: Using PVS strategies for special-purpose theorem proving","volume":"29","author":"archer","year":"2001","journal-title":"Annals Math Artif Intell"},{"key":"ref16","year":"2001","journal-title":"PVS prover guide Version 2 4"},{"key":"ref17","author":"spivey","year":"1992","journal-title":"The Z Notation A Reference Manual"},{"key":"ref18","first-page":"573","article-title":"Using PVS to prove a Z refinement: A case study","volume":"1313","author":"stringer-calvert","year":"1997","journal-title":"Proc Formal Methods Europe"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BFb0105411","article-title":"A structure preserving encoding of Z in isabelle\/hol","volume":"1125","author":"kolyang","year":"1996","journal-title":"Theorem Proving in Higher Order Logics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/242223.242257"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1993.324825"},{"key":"ref6","author":"craigen","year":"1993","journal-title":"An international survey of industrial applications of formal methods Vol 1 and 2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.663994"},{"key":"ref8","first-page":"1","article-title":"Managing the development for large software systems","author":"royce","year":"1970","journal-title":"Proc WESCON"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.35"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1994.316045"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/2.59"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.01.025"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2005.84"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050043"},{"key":"ref47","author":"drusinsky","year":"2006","journal-title":"Modeling and Verification Using UML Statecharts?A Working Guide to Reactive System Design Runtime Monitoring and Execution?Based Model Checking"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186051"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/4904.4999"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1023\/B:FORM.0000017721.39909.4b","volume":"24","author":"havelund","year":"2004","journal-title":"Formal Methods in System Design"},{"key":"ref43","first-page":"323","article-title":"The temporal rover and the ATG rover","author":"drusinsky","year":"2000","journal-title":"Proc SPIN Workshop"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/4267003\/4711367\/04711369.pdf?arnumber=4711369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:28:07Z","timestamp":1638217687000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/4711369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":52,"journal-issue":{"issue":"4"},"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/jsyst.2008.2009190","relation":{},"ISSN":["1932-8184"],"issn-type":[{"value":"1932-8184","type":"print"}],"subject":[],"published":{"date-parts":[[2008,12]]}}}