{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:48Z","timestamp":1725483708366},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540425410"},{"type":"electronic","value":"9783540447986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44798-9_23","type":"book-chapter","created":{"date-parts":[[2007,5,3]],"date-time":"2007-05-03T13:16:15Z","timestamp":1178198175000},"page":"275-292","source":"Crossref","is-referenced-by-count":12,"title":["Efficient Debugging in a Formal Verification Environment"],"prefix":"10.1007","author":[{"given":"Fady","family":"Copty","sequence":"first","affiliation":[]},{"given":"Amitai","family":"Irron","sequence":"additional","affiliation":[]},{"given":"Osnat","family":"Weissberg","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Kropp","sequence":"additional","affiliation":[]},{"given":"Kamhi","family":"Gila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,24]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"-35","author":"R. Bryant","year":"1986","unstructured":"R. Bryant, \u201cGraph-based Algorithms for Boolean Function Manipulations\u201d,, IEEE Transactions on Computers, C-35:677\u2013691, August 1986.","journal-title":"IEEE Transactions on Computers, C"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"K.L. McMillan. \u201cSymbolic Model Checking\u201d, Kluwer Academics, 1993.","DOI":"10.1007\/978-1-4615-3190-6"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"K. Ravi, F. Somenzi, \u201cEfficient Fixpoint Computation for Invariant Checking\u201d, In Proceedings of ICCD\u20199, pp. 467\u2013474.","DOI":"10.1109\/ICCD.1999.808582"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"R. Fraer, G. Kamhi, L. Fix, M. Vardi. \u201cEvaluating Semi-Exhaustive Verification Techniques for Bug-Hunting\u201d in Proceedings of SMC\u201999.","DOI":"10.1016\/S1571-0661(04)80665-0"},{"key":"23_CR5","unstructured":"R. Fraer, G. Kamhi, B. Ziv, M. Vardi, L. Fix. \u201cPrioritized Traversal: Efficient Reachability Computation for Verification and Falsification\u201d, in Proceedings of CAV\u201900,Chicago,IL."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"I. Beer, S. Ben-Davis, A. Landver. \u201cOn-the-Fly Model Checking\u201d of RCTL Formulas\u201d, in Proceedings of CAV\u201998.","DOI":"10.1007\/BFb0028744"},{"key":"23_CR7","unstructured":"R.H. Hardin, R. P. Kurshan, K.L. McMillan, J.A. Reeds and N.J.A. Sloane, \u201cEfficient Regression Verification\u201d, Int\u2019l Workshop on Discrete Event Systems (WODES\u2019 96)"},{"key":"23_CR8","unstructured":"E. Clarke, O. Grumberg, K. McMillan, X. Zhao, \u2018\u2018Efficient generation of counterexamples and witnesses in symbolic model checking\u201d, in the proceeding of DAC\u201995."},{"key":"23_CR9","unstructured":"B. Kurshan, \u201cFormal Verification in a Commercial Setting\u201d, In Proceedings of DAC\u201997."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"J. Jang, S. Quader, M. Kaufmann, C. Pixley,\u201cFormal Verification of FIRE: A Case Study\u201d, in Proceedings of Design Automation Conference, 1997, Anaheim, CA","DOI":"10.1109\/DAC.1997.597139"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"R.K. Brayton, G.D. Hachtel, A. Sangiovanni-Vincentelli, F. Somenzi, A. Aziz, S.T. Cheng, S. Edwards, S. Khatri, Y. Kukimoto, A. Pardo, S. Qadeer, R.K. Ranjan, S. Sarwary, T.R. Shiple, G. Swamy, T. Villa, \u201cVIS: A system for Verification and Synthesis\u201d, in Proc. of DAC\u201994.","DOI":"10.1007\/3-540-61474-5_95"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"I. Beer, S. Ben-David, C. Eisner, A. Landver. \u201cRuleBase: An industry-oriented formal verification tool\u201d. In Proc. of Design Automation Conference 1996 (DAC\u201996)","DOI":"10.1145\/240518.240642"}],"container-title":["Lecture Notes in Computer Science","Correct Hardware Design and Verification Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44798-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T07:12:48Z","timestamp":1550301168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44798-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425410","9783540447986"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44798-9_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}