{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:58:12Z","timestamp":1725490692091},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403340"},{"type":"electronic","value":"9783540449195"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44919-1_29","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T20:38:42Z","timestamp":1188765522000},"page":"463-472","source":"Crossref","is-referenced-by-count":19,"title":["The Model-Checking Kit"],"prefix":"10.1007","author":[{"given":"Claus","family":"Schr\u00f6ter","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Schwoon","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Esparza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"29_CR1","unstructured":"ADVANCE \u2014 Advanced Validation Techniques for Telecommunication Protocols. http:\/\/verif.liafa.jussieu.fr\/~haberm\/ADVANCE\/main.html."},{"key":"29_CR2","unstructured":"E. Best and B. Grahlmann. PEP Documentation and User Guide 1.8. Universit\u00e4t Oldenburg, 1998."},{"key":"29_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/3-540-56891-3_30","volume-title":"PARLE\u201993","author":"E. Best","year":"1993","unstructured":"E. Best and R. P. Hopkins. B(PN)2 \u2014 a Basic Petri Net Programming Notation. In PARLE\u201993, LNCS 694, pages 379\u2013390. Springer, 1993."},{"key":"29_CR4","unstructured":"M. Bozga, J.-C. Fernandez, L. Ghirvu, S. Graf, L. Mounier, J. P. Krimm, and J. Sifakis. The Intermediate Representation IF. Technical Report. V\u00e9rimag, 1998."},{"issue":"8","key":"29_CR5","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"C-35","author":"R. E. Bryant","year":"1986","unstructured":"R. E. Bryant. Graph-Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers, C-35(8):677\u2013691, Aug. 1986.","journal-title":"IEEE Transactions on Computers"},{"key":"29_CR6","unstructured":"J. C. Corbett. Evaluating Deadlock Detection Methods, 1994."},{"key":"29_CR7","first-page":"997","volume":"B","author":"E. A. Emerson","year":"1990","unstructured":"E. A. Emerson. Temporal and Modal Logic. In Handbook of Theoretical Computer Science, volume B, pages 997\u20131067. Elsevier Science Publishers B. V., 1990.","journal-title":"Handbook of Theoretical Computer Science"},{"key":"29_CR8","unstructured":"J. Esparza, C. Schr\u00f6ter, and S. Schwoon. The Model-Checking Kit. http:\/\/www7.in.tum.de\/gruppen\/theorie\/KIT\/."},{"key":"29_CR9","unstructured":"B. Grahlmann, M. M\u00f6ller, and U. Anhalt. A new Interface for the PEP-tool \u2014 Parallel Finite Automata. 2nd Workshop of Algorithms and Tools for Petri nets. Oldenburg, 1995."},{"key":"29_CR10","unstructured":"B. Grahlmann, S. R\u00f6mer, T. Thielke, B. Graves, M. Damm, R. Riemann, L. Jenner, S. Melzer, and A. Gronewold. PEP: Programming Environment Based on Petri Nets. Technical Report 14, Universit\u00e4t Hildesheim, May 1995."},{"key":"29_CR11","unstructured":"M. Heiner and P. Deusen. Petri net based qualitative analysis \u2014 A case study. Technical report I-08\/1995. Brandenburg Technische Universit\u00e4t Cottbus, 1995."},{"key":"29_CR12","unstructured":"K. Heljanko. Combining Symbolic and Partial Order Methods for Model Checking 1-Safe Petri Nets. PhD thesis, Helsinki University of Technology, 2002."},{"key":"29_CR13","unstructured":"G. J. Holzmann. Design and Validation of Computer Protocols. Prentice Hall, 1991."},{"key":"29_CR14","unstructured":"V. Khomenko. CLP. http:\/\/www.cs.ncl.ac.uk\/people\/victor.khomenko\/home.formal\/tools\/tools.html."},{"key":"29_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-58867-1","volume-title":"Formal Development of Reactive Systems","author":"C. Lewerentz","year":"1995","unstructured":"C. Lewerentz and T. Lindner. Case Study Production Cell. In Formal Development of Reactive Systems, LNCS 891. Springer, 1995."},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"A. J. Martin. Self-timed FIFO: An exercise in compiling programs into VLSI circuits. In From HDL Descriptions to Guruanteed Correct Circuit Designs, pages 133\u2013153. Elsevier Science Publishers, 1986.","DOI":"10.21236\/ADA442970"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"K. L. McMillan. Symbolic Model Checking \u2014 An approach to the state explosion problem. PhD thesis, Carnegie Mellon University, 1992.","DOI":"10.1007\/978-1-4615-3190-6_3"},{"key":"29_CR18","series-title":"Lect Notes Comput Sci","first-page":"164","volume-title":"CAV\u201992","author":"K. L. McMillan","year":"1992","unstructured":"K. L. McMillan. Using Unfoldings to Avoid the State Explosion Problem in the Verification of Asynchronous Circuits. In CAV\u201992, LNCS 663, pages 164\u2013174. Springer, 1992."},{"key":"29_CR19","unstructured":"M. Raynal. Algorithms For Mutual Exclusion, 1986."},{"key":"29_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/3-540-60029-9_50","volume-title":"ATPN\u201995","author":"O. Roig","year":"1995","unstructured":"O. Roig, J. Cortadella, and E. Pastor. Verification of Asynchronous Circuits by BDD-based Model Checking of Petri Nets. In ATPN\u201995, LNCS 935, pages 374\u2013391. Springer, 1995."},{"key":"29_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/3-540-56922-7_33","volume-title":"CAV\u201993","author":"A. Valmari","year":"1993","unstructured":"A. Valmari. On-the-Fly Verification with Stubborn Sets. In CAV\u201993, LNCS 697, pages 397\u2013408. Springer, 1993."},{"issue":"13","key":"29_CR22","first-page":"1","volume":"B","author":"K. Varpaaniemi","year":"1995","unstructured":"K. Varpaaniemi, J. Halme, K. Hiekkanen, and T. Pyssysalo. PROD Reference Manual. Technical Reports, B(13):1\u201356, Aug. 1995.","journal-title":"PROD Reference Manual"}],"container-title":["Lecture Notes in Computer Science","Applications and Theory of Petri Nets 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44919-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T15:41:22Z","timestamp":1556811682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44919-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403340","9783540449195"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-44919-1_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}