{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:44Z","timestamp":1773655904852,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540433811","type":"print"},{"value":"9783540459880","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45988-x_6","type":"book-chapter","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T02:19:02Z","timestamp":1181182742000},"page":"57-71","source":"Crossref","is-referenced-by-count":3,"title":["Heuristics for Efficient Manipulation of Composite Constraints"],"prefix":"10.1007","author":[{"given":"Tuba","family":"Yavuz-Kahveci","sequence":"first","affiliation":[]},{"given":"Tevfik","family":"Bultan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,14]]},"reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.489079","volume":"22","author":"R. Alur","year":"1996","unstructured":"R. Alur, T. A. Henzinger, and P. Ho. Automatic symbolic verification of embedded systems. IEEE Transactions on Software Engineering, 22(3):181\u2013201, March 1996.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR2","volume-title":"Concurrent Programming: Principles and Practice","author":"G. R. Andrews","year":"1991","unstructured":"G. R. Andrews. Concurrent Programming: Principles and Practice. The Benjamin\/Cummings Publishing Company, Redwood City, California, 1991."},{"issue":"8","key":"6_CR3","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"R. E. Bryant","year":"1986","unstructured":"R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 35(8):677\u2013691, 1986.","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/332740.332746","volume":"9","author":"T. Bultan","year":"2000","unstructured":"T. Bultan, R. Gerber, and C. League. Composite model checking: Verification with type-specific symbolic representations. ACM Transactions on Software Engineering and Methodology, 9(1):3\u201350, January 2000.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1145\/325478.325480","volume":"21","author":"T. Bultan","year":"1999","unstructured":"T. Bultan, R. Gerber, and W. Pugh. Model-checking concurrent systems with unbounded integer variables: Symbolic representations, approximations, and experimental results. ACM Transactions on Programming Languages and Systems, 21(4):747\u2013789, July 1999.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"T. Bultan and T. Yavuz-Kahveci. Action language verifier. In Proceedings of the 6th IEEE Intl. Conference on Automated Software Engineering (ASE 2001), 2001.","DOI":"10.1109\/ASE.2001.989834"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"J. R. Burch, E. M. Clarke, K. L. McMillan, D. L. Dill, and L. H. Hwang. Symbolic model checking: 1020 states and beyond. In Proceedings of the 5th Annual IEEE Symposium on Logic in Computer Science, pages 428\u2013439, January 1990.","DOI":"10.1109\/LICS.1990.113767"},{"issue":"7","key":"6_CR8","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/32.708566","volume":"24","author":"W. Chan","year":"1998","unstructured":"W. Chan, R. J. Anderson, P. Beame, S. Burns, F. Modugno, D. Notkin, and J. D. Reese. Model checking large software specifications. IEEE Transactions on Software Engineering, 24(7):498\u2013520, July 1998.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR9","volume-title":"Model checking","author":"E.M. Clarke","year":"1999","unstructured":"E.M. Clarke, O. Grumberg, and D.A. Peled. Model checking. The MIT Press, Massachusetts, Cambridge, 1999."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"P. J. Courtois and D. L. Parnas. Documentation for safety critical software. In Proc. of the 15th Intl. Conf. on Software Engineering, pages 315\u2013323, May 1993.","DOI":"10.1109\/ICSE.1993.346033"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"G. Delzanno and T. Bultan. Constraint-based verification of client server protocols. In Proceedings of the Seventh Intl. Conference on Principles and Practice of Constraint Programming (CP 2001).","DOI":"10.1007\/3-540-45578-7_20"},{"issue":"3","key":"6_CR12","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/s100090100049","volume":"3","author":"G. Delzanno","year":"2001","unstructured":"Giorgio Delzanno and Andreas Podelski. Constraint-based deductive model checking. Journal of Software and Tools for Techn. Transfer, 3(3):250\u2013270, 2001.","journal-title":"Journal of Software and Tools for Techn. Transfer"},{"key":"6_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/3-540-56922-7_28","volume-title":"Proceedings of computer aided verification","author":"N. Halbwachs","year":"1993","unstructured":"N. Halbwachs. Delay analysis in synchronous programs. In C. Courcoubetis, ed., Proceedings of computer aided verification, volume 697 of Lecture Notes in Computer Science, pages 333\u2013346. Springer-Verlag, 1993."},{"key":"6_CR14","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Intl. Symposium on Static Analysis","author":"N. Halbwachs","year":"1994","unstructured":"N. Halbwachs, P. Raymond, and Y. Proy. Verification of linear hybrid systems by means of convex approximations. In B. LeCharlier, ed., Proceedings of Intl. Symposium on Static Analysis, volume 864 of LNCS. Springer-Verlag, Sept. 1994."},{"key":"6_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3190-6","volume-title":"Symbolic model checking","author":"K. L. McMillan","year":"1993","unstructured":"K. L. McMillan. Symbolic model checking. Kluwer, Massachusetts, 1993."},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/BF01530796","volume":"8","author":"D. Srivastava","year":"1993","unstructured":"D. Srivastava. Subsumption and indexing in constraint query languages withlinear arithmetic constraints. Annals of Math. and Artificial Intelligence, 8:315\u2013343, 1993.","journal-title":"Annals of Math. and Artificial Intelligence"},{"key":"6_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45319-9_5","volume-title":"Proceedings of the 7th Intl. Conference on Tools and Algorithms for the Construction and Analysis of Systems","author":"T. Yavuz-Kahveci","year":"2001","unstructured":"T. Yavuz-Kahveci, M. Tuncer, and T. Bultan. Composite symbolic library. In Proceedings of the 7th Intl. Conference on Tools and Algorithms for the Construction and Analysis of Systems, volume 2031 of LNCS, April 2001."}],"container-title":["Lecture Notes in Computer Science","Frontiers of Combining Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45988-X_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T01:17:06Z","timestamp":1737076626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45988-X_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540433811","9783540459880"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45988-x_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}