{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T00:03:57Z","timestamp":1770768237652,"version":"3.50.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540374060","type":"print"},{"value":"9783540374114","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11817963_20","type":"book-chapter","created":{"date-parts":[[2006,8,5]],"date-time":"2006-08-05T05:07:51Z","timestamp":1154754471000},"page":"190-204","source":"Crossref","is-referenced-by-count":16,"title":["Automatic Refinement and Vacuity Detection for Symbolic Trajectory Evaluation"],"prefix":"10.1007","author":[{"given":"Rachel","family":"Tzoref","sequence":"first","affiliation":[]},{"given":"Orna","family":"Grumberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Aided Verification","author":"I. Beer","year":"1997","unstructured":"Beer, I., Ben-David, S., Eisner, C., Rodeh, Y.: Efficient detection of vacuity in ACTL formulas. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol.\u00a01254. Springer, Heidelberg (1997)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/3-540-49059-0_14","volume-title":"Tools and Algorithms for the Construction of Analysis of Systems","author":"A. Biere","year":"1999","unstructured":"Biere, A., Cimatti, A., Clarke, E.M., Zhu, Y.: Symbolic model checking without BDDs. In: Cleaveland, W.R. (ed.) TACAS 1999. LNCS, vol.\u00a01579, p. 193. Springer, Heidelberg (1999)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-48683-6_19","volume-title":"Computer Aided Verification","author":"C.-T. Chou","year":"1999","unstructured":"Chou, C.-T.: The mathematical foundation of symbolic trajectory evaluation. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol.\u00a01633, pp. 196\u2013207. Springer, Heidelberg (1999)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counter example-guided abstraction refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855. Springer, Heidelberg (2000)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Hazelhurst, S., Seger, C.-J.H.: Model checking lattices: Using and reasoning about information orders for abstraction. Logic journal of IGPL\u00a07(3) (1999)","DOI":"10.1093\/jigpal\/7.3.375"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Kurshan, R.P.: Computer-Aided Verification of coordinating processes - the automata theoretic approach (1994)","DOI":"10.1515\/9781400864041"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Pandey, M., Raimi, R., Bryant, R.E., Abadir, M.S.: Formal verification of content addressable memories using symbolic trajectory evaluation. In: DAC (1997)","DOI":"10.1145\/266021.266056"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/11560548_19","volume-title":"Correct Hardware Design and Verification Methods","author":"J.-W. Roorda","year":"2005","unstructured":"Roorda, J.-W., Claessen, K.: A new SAT-based algorithm for symbolic trajectory evaluation. In: Borrione, D., Paul, W. (eds.) CHARME 2005. LNCS, vol.\u00a03725, pp. 238\u2013253. Springer, Heidelberg (2005)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/11817963_19","volume-title":"Computer Aided Verification","author":"J.-W. Roorda","year":"2006","unstructured":"Roorda, J.-W., Claessen, K.: SAT-based assistance in abstraction refinement for symbolic trajectory evaluation. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol.\u00a04144, pp. 175\u2013189. Springer, Heidelberg (2006)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Schubert, T.: High level formal verification of next-generation microprocessors. In: DAC 2003 (2003)","DOI":"10.1145\/775833.775834"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Seger, C.-J.H., Bryant, R.E.: Formal verification by symbolic evaluation of partially-ordered trajectories. Formal Methods in System Design 6(2) (1995)","DOI":"10.1007\/BF01383966"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Seger, C.-J.H., Jones, R.B., O\u2019Leary, J.W., Melham, T.F., Aagaard, M., Barrett, C., Syme, D.: An industrially effective environment for formal hardware verification. IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems\u00a024(9) (2005)","DOI":"10.1109\/TCAD.2005.850814"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Tzoref, R.: Automatic refinement and vacuity detection for symbolic trajectory evaluation. Master\u2019s thesis, Department of Computer Science, Technion, Israel (2006)","DOI":"10.1007\/11817963_20"},{"key":"20_CR14","volume-title":"Comprehensive Functional Verification: The Complete Industry Cycle","author":"B. Wile","year":"2005","unstructured":"Wile, B., Roesner, W., Goss, J.: Comprehensive Functional Verification: The Complete Industry Cycle. Morgan Kaufmann, San Francisco (2005)"},{"key":"20_CR15","unstructured":"Wilson, J.C.: Symbolic Simulation Using Automatic Abstraction of Internal Node Values. PhD thesis, Stanford University, Dept. of Electrical Engineering (2001)"},{"key":"20_CR16","unstructured":"Yang, J., Gil, R., Singerman, E.: satGSTE: Combining the abstraction of GSTE with the capacity of a SAT solver. In: DCC (2004)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Yang, J., Goel, A.: GSTE through a case study. In: ICCAD (2002)","DOI":"10.1145\/774572.774651"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36126-X_5","volume-title":"Formal Methods in Computer-Aided Design","author":"J. Yang","year":"2002","unstructured":"Yang, J., Seger, C.-J.H.: Generalized symbolic trajectory evaluation - abstraction in action. In: Aagaard, M.D., O\u2019Leary, J.W. (eds.) FMCAD 2002. LNCS, vol.\u00a02517. Springer, Heidelberg (2002)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Yang, J., Seger, C.-J.H.: Introduction to generalized symbolic trajectory evaluation. IEEE Trans. Very Large Scale Integr. Syst.\u00a011(3) (2003)","DOI":"10.1109\/TVLSI.2003.812320"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11817963_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:15:56Z","timestamp":1605644156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11817963_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540374060","9783540374114"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11817963_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}