{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:02:41Z","timestamp":1725483761315},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679011"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-44612-5_4","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:28:20Z","timestamp":1178357300000},"page":"52-63","source":"Crossref","is-referenced-by-count":0,"title":["And\/Or Hierarchies and Round Abstraction"],"prefix":"10.1007","author":[{"given":"1Radu","family":"Grosu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"R. Alur and R. Grosu. Modular refinement of hierarchic reactive machines. In Proceedings of the 27th Annual ACM Symposium on Principles of Programming Languages, pages 390\u2013402, 2000.","DOI":"10.1145\/325694.325746"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"R. Alur, R. Grosu, M. McDougall. Efficient Reachability Analysis of Hierarchical Reactive Machines. In Proceedings of the 12th Conference on Computer Aided Verification, Chicago, USA, 2000.","DOI":"10.1007\/10722167_23"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008739929481","volume":"15","author":"R. Alur","year":"1999","unstructured":"R. Alur and T.A. Henzinger. Reactive modules. Formal Methods in System Design, 15(1):7\u201348, 1999.","journal-title":"Formal Methods in System Design"},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/BFb0028774","volume-title":"Proceedings of the 10th International Conference on Computer Aided Verification","author":"A.H.M.+.9.8._.R. Alur","year":"1998","unstructured":"[AHM+98]_R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani, and S. Tasiran. MOCHA: Modularity in model checking. In Proceedings of the 10th International Conference on Computer Aided Verification, LNCS 1427, pages 516\u2013520. Springer-Verlag, 1998."},{"key":"4_CR5","unstructured":"S. Aggarwal, R.P. Kurshan, and D. Sharma. A language for the specification and analysis of protocols. In IFIP Protocol Specification, Testing, and Verification III, pages 35\u201350, 1983."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"R. Alur, S. Kannan, and M. Yannakakis. Communicating hierarchical state machines. In Automata, Languages and Programming, 26th International Colloquium, pages 169\u2013178. 1999.","DOI":"10.1007\/3-540-48523-6_14"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"R. Alur and M. Yannakakis. Model checking of hierarchical state machines. In Proceedings of the Sixth ACM Symposium on Foundations of Software Engineering, pages 175\u2013188. 1998.","DOI":"10.1145\/288195.288305"},{"key":"4_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/3-540-61474-5_95","volume-title":"Proceedings of the Eighth Conference on Computer Aided Verification","author":"B.H.S.V.+.9.6._.R. Brayton","year":"1996","unstructured":"[BHSV+96]_R. Brayton, G. Hachtel, A. Sangiovanni-Vincentell, F. Somenzi, A. Aziz, S. Cheng, S. Edwards, S. Khatri, Y. Kukimoto, A. Pardo, S. Qadeer, R. Ranjan, S. Sarwary, T. Shiple, G. Swamy, and T. Villa. VIS: A system for verification and synthesis. In Proceedings of the Eighth Conference on Computer Aided Verification, LNCS 1102, pages 428\u2013432. 1996."},{"key":"4_CR9","unstructured":"G. Booch, I. Jacobson, and J. Rumbaugh. Unified Modeling Language User Guide. Addison Wesley, 1997."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"[BLA+99]_G. Behrmann, K. Larsen, H. Andersen, H. Hulgaard, and J. Lind-Nielsen. Verification of hierarchical state\/event systems using reusability and compositionality. In TAC AS\u2019 99: Fifth International Conference on Tools and Algorithms for the Construction and Analysis of Software, 1999.","DOI":"10.1007\/3-540-49059-0_12"},{"issue":"7","key":"4_CR11","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/32.708566","volume":"24","author":"C.A.B.+.9.8._.W. Chan","year":"1998","unstructured":"[CAB+98]_W. Chan, R. Anderson, P. Beame, S. Burns, F. Modugno, D. Notkin, and J. Reese. Model checking large software specifications. IEEE Transactions on Software Engineering, 24(7):498\u2013519, 1998.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BFb0025774","volume-title":"Proc. Workshop on Logic of Programs","author":"E.M. Clarke","year":"1981","unstructured":"E.M. Clarke and E.A. Emerson. Design and synthesis of synchronization skeletons using branching time temporal logic. In Proc. Workshop on Logic of Programs, LNCS 131, pages 52\u201371. Springer-Verlag, 1981."},{"issue":"6","key":"4_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/6.499951","volume":"33","author":"E.M. Clarke","year":"1996","unstructured":"E.M. Clarke and R.P. Kurshan. Computer-aided verification. IEEE Spectrum, 33(6):61\u201367, 1996.","journal-title":"IEEE Spectrum"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","volume":"8","author":"D. Harel","year":"1987","unstructured":"D. Harel. Statecharts: A visual formalism for complex systems. Science of Computer Programming, 8:231\u2013274, 1987.","journal-title":"Science of Computer Programming"},{"key":"4_CR15","unstructured":"G.J. Holzmann. Design and Validation of Computer Protocols. Prentice-Hall, 1991."},{"issue":"5","key":"4_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"G.J. Holzmann","year":"1997","unstructured":"G.J. Holzmann. The model checker SPIN. IEEE Trans. on Software Engineering, 23(5):279\u2013295, 1997.","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"8","key":"4_CR17","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/TC.1987.5009519","volume":"C-36","author":"F. Jahanian","year":"1987","unstructured":"F. Jahanian and A.K. Mok. A graph-theoretic approach for timing analysis and its implementation. IEEE Transactions on Computers, C-36(8):961\u2013975, 1987.","journal-title":"IEEE Transactions on Computers"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"N.G. Leveson, M. Heimdahl, H. Hildreth, and J.D. Reese. Requirements specification for process control systems. IEEE Transactions on Software Engineerings, 20(9), 1994.","DOI":"10.1109\/32.317428"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"K. McMillan. Symbolic model checking: an approach to the state explosion problem. Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3190-6"},{"key":"4_CR20","unstructured":"L. Peterson and B. Davie. Computer Networks: A Systems Approach. Morgan Kaufmann, 1996."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"G. Peterson. Myths about the mutual exclusion problem. Information Processing Letters, 12(3), 1981.","DOI":"10.1016\/0020-0190(81)90106-X"},{"key":"4_CR22","series-title":"Lect Notes Comput Sci","first-page":"195","volume-title":"Proceedings of the Fifth International Symposium on Programming","author":"J.P. Queille","year":"1982","unstructured":"J.P. Queille and J. Sifakis. Specification and verification of concurrent programs in CESAR. In Proceedings of the Fifth International Symposium on Programming, LNCS 137, pages 195\u2013220. Springer-Verlag, 1982."},{"key":"4_CR23","unstructured":"B. Selic, G. Gullekson, and P.T. Ward. Real-time object oriented modeling and design. J. Wiley, 1994."},{"key":"4_CR24","unstructured":"IEEE Standard 1364-1995. Verilog Hardware Description Language Reference Manual, 1995."},{"key":"4_CR25","unstructured":"IEEE Standard 1076-1993. VHDL Language Reference Manual, 1993."}],"container-title":["Lecture Notes in Computer Science","Mathematical Foundations of Computer Science 2000"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44612-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:06:16Z","timestamp":1605629176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44612-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540679011"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-44612-5_4","relation":{},"subject":[]}}