{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T11:48:41Z","timestamp":1771588121215,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1995,5,1]],"date-time":"1995-05-01T00:00:00Z","timestamp":799286400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mind Mach"],"published-print":{"date-parts":[[1995,5]]},"DOI":"10.1007\/bf00974746","type":"journal-article","created":{"date-parts":[[2005,1,13]],"date-time":"2005-01-13T09:25:12Z","timestamp":1105608312000},"page":"243-255","source":"Crossref","is-referenced-by-count":6,"title":["The specification of ?specification?"],"prefix":"10.1007","volume":"5","author":[{"given":"Derek","family":"Partridge","sequence":"first","affiliation":[]},{"given":"Antony","family":"Galton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"CR1","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1145\/42411.315802","volume":"31","author":"P. Abrahams","year":"1988","unstructured":"P. Abrahams (1988), ?Specifications and Illusions?,CACM 31(5), pp. 480?481.","journal-title":"CACM"},{"key":"CR2","unstructured":"C. Chang (1990), ?Let's Stop the Bipolar Drift?,IEEE Software, May 1990, p. 4."},{"key":"CR3","first-page":"1077","volume-title":"Encyclopedia of Software Engineering","author":"E. Chikofsky","year":"1994","unstructured":"E. Chikofsky and J.H. Cross (1994), ?Reverse Engineering?, inEncyclopedia of Software Engineering, New York: Wiley, pp. 1077?1084."},{"issue":"6","key":"CR4","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1145\/390016.808478","volume":"10","author":"E.W. Dijkstra","year":"1975","unstructured":"E.W. Dijkstra (1975), ?Correctness Concerns and, Among Other Things, Why They are Resented?,Proc. Internat. Conf. on Reliable Software, SIGPLAN Notices 10(6), pp. 546?550.","journal-title":"Proc. Internat. Conf. on Reliable Software, SIGPLAN Notices"},{"issue":"12","key":"CR5","first-page":"1398","volume":"32","author":"E.W. Dijkstra","year":"1989","unstructured":"E.W. Dijkstra (1989), ?On the Cruelty of Really Teaching Computing Science?,CACM 32(12), pp. 1398?1404 and p. 1414.","journal-title":"CACM"},{"issue":"9","key":"CR6","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1145\/48529.48530","volume":"31","author":"J.H. Fetzer","year":"1988","unstructured":"J.H. Fetzer (1988), ?Program Verification: the Very Idea?,CACM 31(9), pp. 1048?1063.","journal-title":"CACM"},{"key":"CR7","doi-asserted-by":"crossref","unstructured":"G. Fischer (1992), ?Domain-Oriented Design Environments?,Proc. 7 Knowledge-Based Software Engineering Conference, McLean, VA, September, 20th?23rd, pp. 204?213.","DOI":"10.1109\/KBSE.1992.252920"},{"issue":"2","key":"CR8","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1145\/42372.42377","volume":"31","author":"S.I. Gallant","year":"1988","unstructured":"S.I. Gallant (1988), ?Connectionist Expert Systems?,CACM 31(2), pp. 152?169.","journal-title":"CACM"},{"key":"CR9","doi-asserted-by":"crossref","unstructured":"A.P. Galton (1993), ?On the notions of specification and implementation?, in C. Hookway and D. Peterson (eds.),Philosophy and Cognitive Science, Cambridge University Press.","DOI":"10.1017\/S1358246100002472"},{"key":"CR10","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/B978-0-408-03741-9.50019-2","volume-title":"The Software Life Cycle","author":"D. Ince","year":"1990","unstructured":"D. Ince (1990), ?Z and System Specification?, in D. Ince and D. Andrews (eds.),The Software Life Cycle, London: Butterworths, pp. 260?277."},{"key":"CR11","doi-asserted-by":"crossref","unstructured":"J.C. Knight and N.G. Leveson (1986), ?An Experimental Evaluation of Independence in Multiversion Programming?,IEEE Transactions on Software Engineering, SE-12(1).","DOI":"10.1109\/TSE.1986.6312924"},{"issue":"1","key":"CR12","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MS.1985.229776","volume":"2","author":"B. Meyer","year":"1985","unstructured":"B. Meyer (1985), ?On Formalism in Specifications?,IEEE Software 2(1), pp. 6?26.","journal-title":"IEEE Software"},{"issue":"6","key":"CR13","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1093\/comjnl\/34.6.559","volume":"34","author":"D. Michie","year":"1991","unstructured":"D. Michie (1991), ?Methodologies from Machine Learning in Data Analysis and Software?,The Computer Journal 34(6), pp. 559?565.","journal-title":"The Computer Journal"},{"key":"CR14","unstructured":"P. Naur, B. Randell and J.N. Buxton (eds.). (1976),Software Engineering Concepts and Techniques, Proceedings of NATO Science Committee sponsored conferences on software engineering, Garmisch, Germany, Oct. 7?11, 1968 and Rome, Italy, Oct. 27?31, 1969. New York: Petrocelli\/Charter."},{"key":"CR15","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/BF01934408","volume":"22","author":"P. Naur","year":"1982","unstructured":"P. Naur (1982), ?Formalization in Program Development?,Bit 22, pp. 437?453.","journal-title":"Bit"},{"key":"CR16","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BF02454224","volume":"2","author":"D.A. Nelson","year":"1992","unstructured":"D.A. Nelson (1992), ?Deductive Program Verification (a Practitioner's Commentary)?,Minds and Machines 2, pp. 283?307.","journal-title":"Minds and Machines"},{"key":"CR17","volume-title":"Artificial Intelligence: Applications in the Future of Software Engineering","author":"D. Partridge","year":"1986","unstructured":"D. Partridge (1986),Artificial Intelligence: Applications in the Future of Software Engineering, Chichester: Ellis Horwood."},{"key":"CR18","first-page":"224","volume-title":"Proceedings of the Second Safety-Critical Systems Symposium","author":"D. Partridge","year":"1994","unstructured":"D. Partridge and N. Sharkey (1994), ?Use of Neural Computing in Multi-version Software Reliability?, in F. Redmill and T. Anderson (eds.),Proceedings of the Second Safety-Critical Systems Symposium, London: Springer-Verlag, pp. 224?235."},{"issue":"8","key":"CR19","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/2.75","volume":"21","author":"C.R. Rich","year":"1988","unstructured":"C.R. Rich and R.C. Waters (1988), ?Automatic Programming: Myths and Prospects?,IEEE Computer 21(8), pp. 40?51.","journal-title":"IEEE Computer"},{"issue":"7","key":"CR20","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/358557.358572","volume":"25","author":"W. Swartout","year":"1983","unstructured":"W. Swartout and R. Balzer (1983), ?On the Inevitable Intertwining of Specification and Implementation?,CACM 25(7), pp. 438?440.","journal-title":"CACM"},{"key":"CR21","unstructured":"R.C. Waters (1989), ?Programming in the Year 2009?, in Preprints of the Int. Workshop on AI and Software Engineering, Dept. of Computer Science, University of Exeter, pp. 1?5."}],"container-title":["Minds and Machines"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/BF00974746.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/BF00974746\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/BF00974746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,5]],"date-time":"2020-04-05T09:00:18Z","timestamp":1586077218000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/link.springer.com\/10.1007\/BF00974746"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,5]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1995,5]]}},"alternative-id":["BF00974746"],"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/bf00974746","relation":{},"ISSN":["0924-6495","1572-8641"],"issn-type":[{"value":"0924-6495","type":"print"},{"value":"1572-8641","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,5]]}}}