{"id":"https://openalex.org/W1580752092","doi":"https://doi.org/10.1007/978-3-540-31869-9_6","title":"Modeling and Analysis of Exception Handling by Using UML Statecharts","display_name":"Modeling and Analysis of Exception Handling by Using UML Statecharts","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W1580752092","doi":"https://doi.org/10.1007/978-3-540-31869-9_6","mag":"1580752092"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-31869-9_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-31869-9_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103296447","display_name":"Gergely Pint\u00e9r","orcid":null},"institutions":[{"id":"https://openalex.org/I29770179","display_name":"Budapest University of Technology and Economics","ror":"https://ror.org/02w42ss30","country_code":"HU","type":"education","lineage":["https://openalex.org/I29770179"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"Gergely Pint\u00e9r","raw_affiliation_strings":["Department of Measurement and Information Systems, Budapest University of Technology and Economics, H-1521, Budapest, Hungary","Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Department of Measurement and Information Systems, Budapest University of Technology and Economics, H-1521, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]},{"raw_affiliation_string":"Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022426737","display_name":"Istv\u00e1n Majzik","orcid":"https://orcid.org/0000-0002-1184-2882"},"institutions":[{"id":"https://openalex.org/I29770179","display_name":"Budapest University of Technology and Economics","ror":"https://ror.org/02w42ss30","country_code":"HU","type":"education","lineage":["https://openalex.org/I29770179"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Istv\u00e1n Majzik","raw_affiliation_strings":["Department of Measurement and Information Systems, Budapest University of Technology and Economics, H-1521, Budapest, Hungary","Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Department of Measurement and Information Systems, Budapest University of Technology and Economics, H-1521, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]},{"raw_affiliation_string":"Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103296447"],"corresponding_institution_ids":["https://openalex.org/I29770179"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.1117,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.78408195,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"58","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8877370357513428},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.7829046249389648},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.76096111536026},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.7561622262001038},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.7464791536331177},{"id":"https://openalex.org/keywords/applications-of-uml","display_name":"Applications of UML","score":0.5578135251998901},{"id":"https://openalex.org/keywords/exception-handling","display_name":"Exception handling","score":0.5575190186500549},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.545188307762146},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5130183100700378},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.4656465947628021},{"id":"https://openalex.org/keywords/uml-tool","display_name":"UML tool","score":0.45764607191085815},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.42555955052375793},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4231812357902527},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.41913312673568726},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2603474259376526},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.14107558131217957},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11083540320396423},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.06692168116569519}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8877370357513428},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.7829046249389648},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.76096111536026},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7561622262001038},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.7464791536331177},{"id":"https://openalex.org/C41298492","wikidata":"https://www.wikidata.org/wiki/Q4781506","display_name":"Applications of UML","level":4,"score":0.5578135251998901},{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.5575190186500549},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.545188307762146},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5130183100700378},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.4656465947628021},{"id":"https://openalex.org/C146939238","wikidata":"https://www.wikidata.org/wiki/Q2467310","display_name":"UML tool","level":4,"score":0.45764607191085815},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.42555955052375793},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4231812357902527},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.41913312673568726},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2603474259376526},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.14107558131217957},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11083540320396423},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.06692168116569519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-31869-9_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-31869-9_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.103.5792","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.5792","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.mit.bme.hu/~pinter/publications-files/pinter-majzik-2004-fidji-modeling-and-analysis-of-exception-handling-techniques-by-using-uml-statecharts.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1213813840","https://openalex.org/W1540492331","https://openalex.org/W1552655093","https://openalex.org/W1575506554","https://openalex.org/W1760915023","https://openalex.org/W1845451745","https://openalex.org/W1899268182","https://openalex.org/W1977237988","https://openalex.org/W1994959402","https://openalex.org/W2106837287","https://openalex.org/W2126039446","https://openalex.org/W2159765281","https://openalex.org/W2166895275"],"related_works":["https://openalex.org/W4230811716","https://openalex.org/W4241150048","https://openalex.org/W1991550997","https://openalex.org/W1601767717","https://openalex.org/W2406303540","https://openalex.org/W2033930908","https://openalex.org/W2064897848","https://openalex.org/W2150469568","https://openalex.org/W2387087283","https://openalex.org/W4239635237"],"abstract_inverted_index":null,"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
