{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:36:35Z","timestamp":1725550595046},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291053"},{"type":"electronic","value":"9783540320302"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11560548_17","type":"book-chapter","created":{"date-parts":[[2005,10,6]],"date-time":"2005-10-06T09:38:22Z","timestamp":1128591502000},"page":"207-221","source":"Crossref","is-referenced-by-count":3,"title":["Automatic Generation of Hints for Symbolic Traversal"],"prefix":"10.1007","author":[{"given":"David","family":"Ward","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Somenzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","volume":"82","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., Lamport, L.: The existence of refinement mappings. Theoretical Computer Science\u00a082(2), 253\u2013284 (1991)","journal-title":"Theoretical Computer Science"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/BFb0031812","volume-title":"Formal Methods in Computer-Aided Design","author":"R.K. Brayton","year":"1996","unstructured":"Brayton, R.K., et al.: VIS. In: Srivas, M., Camilleri, A. (eds.) FMCAD 1996. LNCS, vol.\u00a01166, pp. 248\u2013256. Springer, Heidelberg (1996)"},{"issue":"8","key":"17_CR3","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"R.E. Bryant","year":"1986","unstructured":"Bryant, R.E.: Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers\u00a0C-35(8), 677\u2013691 (1986)","journal-title":"IEEE Transactions on Computers"},{"key":"17_CR4","volume-title":"An Introduction to Algorithms","author":"T.H. Cormen","year":"1990","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L.: An Introduction to Algorithms. McGraw-Hill, New York (1990)"},{"doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by constructions or approximation of fixpoints. In: Proceedings of the ACM Symposium on the Principles of Programming Languages, pp. 238\u2013250 (1977)","key":"17_CR5","DOI":"10.1145\/512950.512973"},{"issue":"3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J. Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a09(3), 319\u2013349 (1987)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"unstructured":"Gustafsson, J., Lisper, B., Kirner, R., Puschner, P.: Input-dependency analysis for hard real-time software. In: International Workshop on Object-Oriented Real-Time Dependable System (October 2004)","key":"17_CR7"},{"doi-asserted-by":"crossref","unstructured":"Horwitz, S., Reps, T.: The use of program dependence graphs in software engineering. In: Fourteenth International Conference on Software Engineering (1992)","key":"17_CR8","DOI":"10.1145\/143062.143156"},{"unstructured":"ITC 1999 benchmark home page, \n                    \n                      http:\/\/www.cerc.utexas.edu\/itc99-benchmarks\/bench.html","key":"17_CR9"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1137\/0204007","volume":"4","author":"D.B. Johnson","year":"1975","unstructured":"Johnson, D.B.: Finding all the elementary circuits of a directed graph. SIAM Journal on Computing\u00a04, 77\u201384 (1975)","journal-title":"SIAM Journal on Computing"},{"key":"17_CR11","volume-title":"Computer-Aided Verification of Coordinating Processes","author":"R.P. Kurshan","year":"1994","unstructured":"Kurshan, R.P.: Computer-Aided Verification of Coordinating Processes. Princeton University Press, Princeton (1994)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/BFb0028738","volume-title":"Computer Aided Verification","author":"K.L. McMillan","year":"1998","unstructured":"McMillan, K.L.: Verification of an implementation of Tomasulo\u2019s algorithm by compositional model checking. In: Y. Vardi, M. (ed.) CAV 1998. LNCS, vol.\u00a01427, pp. 110\u2013121. Springer, Heidelberg (1998)"},{"doi-asserted-by":"crossref","unstructured":"Ottenstein, K.J., Ottenstein, L.M.: The program dependence graph in a software development environment. In: Symposium on Practical Software Development Environments, New York, NY, pp. 177\u2013184 (1984)","key":"17_CR13","DOI":"10.1145\/800020.808263"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-48153-2_19","volume-title":"Correct Hardware Design and Verification Methods","author":"K. Ravi","year":"1999","unstructured":"Ravi, K., Somenzi, F.: Hints to accelerate symbolic traversal. In: Pierre, L., Kropf, T. (eds.) CHARME 1999. LNCS, vol.\u00a01703, pp. 250\u2013264. Springer, Heidelberg (1999)"},{"issue":"4","key":"17_CR15","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M. Weiser","year":"1984","unstructured":"Weiser, M.: Program slicing. IEEE Transactions on Software Engineering\u00a010(4), 352\u2013357 (1984)","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Correct Hardware Design and Verification Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11560548_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:13:09Z","timestamp":1619507589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11560548_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291053","9783540320302"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11560548_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}