{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:17Z","timestamp":1725550877446},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540434771"},{"type":"electronic","value":"9783540460176"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46017-9_13","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T17:12:13Z","timestamp":1269882733000},"page":"170-186","source":"Crossref","is-referenced-by-count":1,"title":["Bottleneck Analysis of a Gigabit Network Interface Card: Formal Verification Approach"],"prefix":"10.1007","author":[{"given":"Hyun-Wook","family":"Jin","sequence":"first","affiliation":[]},{"given":"Ki-Seok","family":"Bang","sequence":"additional","affiliation":[]},{"given":"Chuck","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"Jin-Young","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Ho-jung","family":"Cha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,5,23]]},"reference":[{"unstructured":"D. Anderson, J. Chase, S. Gadde, A. Gallatin, K. Yocum, and M. Feeley, \u201cCheating the I\/O Bottleneck: Network Storage with Trapeze\/Myrinet,\u201d Proceedings of the 1998 USENIX Technical Conference, June 1998.","key":"13_CR1"},{"doi-asserted-by":"crossref","unstructured":"T. E. Anderson, D. E. Culler, D. A. Patterson, and the NOW Team, \u201cA Case for Networks of Workstations: NOW,\u201d IEEE Micro, February 1995.","key":"13_CR2","DOI":"10.1109\/40.342018"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/40.342015","volume":"15","author":"N. J. Boden","year":"1995","unstructured":"N. J. Boden, D. Cohen, R. E. Felderman, A. E. Kulawik, C. L. Seitz, J. N. Seizovic, and W.-K. Su, \u201cMyrinet-A Gigabit-per-Second Local-Area Network,\u201d IEEE-Micro, Vol. 15, No. 1, pp. 29\u201336, February 1995.","journal-title":"IEEE-Micro"},{"doi-asserted-by":"crossref","unstructured":"P. Buonadonna, A. Geweke, and D. Culler, \u201cAn Implementation and Analysis of the Virtual Interface Architecture,\u201d Proceedings of SC\u201998, November 1998.","key":"13_CR4","DOI":"10.1109\/SC.1998.10052"},{"doi-asserted-by":"crossref","unstructured":"D. Dunning, G. Regnier, G. McAlpine, D. Cameron, B. Shubert, A. M. Berry, E. Gronke, and C. Dodd, \u201cThe Virtual Interface Architecture,\u201d IEEE Micro, Vol. 8, pp. 66\u201376, March\u2013April 1998.","key":"13_CR5","DOI":"10.1109\/40.671404"},{"doi-asserted-by":"crossref","unstructured":"T. V. Eicken, A. Basu, V. Buch, and W. Vogels, \u201cU-Net: A User-Level Network Interface for Parallel and Distributed Computing,\u201d Proceedings of 15th ACM SOSP, pp. 40\u201353, December 1995.","key":"13_CR6","DOI":"10.1145\/224056.224061"},{"unstructured":"G. J. Holzmann, Design and Validation of Computer Protocols, Prentice Hall, 1991.","key":"13_CR7"},{"doi-asserted-by":"crossref","unstructured":"G. J. Holzmann, \u201cThe Model Checker SPIN,\u201d IEEE Transactions on Software Engineering, May 1997.","key":"13_CR8","DOI":"10.1109\/32.588521"},{"doi-asserted-by":"crossref","unstructured":"Z. Manna, A. Pnueli, The Temporal Logic of Reactive and Concurrent Systems, Springer-Verlag, 1992.","key":"13_CR9","DOI":"10.1007\/978-1-4612-0931-7"},{"unstructured":"Myricom Inc., LANai 4, http:\/\/www.myri.com , February 1999.","key":"13_CR10"},{"unstructured":"Myricom Inc., Myrinet User\u2019s Guide, http:\/\/www.myri.com , 1996.","key":"13_CR11"},{"doi-asserted-by":"crossref","unstructured":"L. Prylli and B. Tourancheau, \u201cBIP: a new protocol designed for high performance networking on myrinet,\u201d Proceedings of IPPS\/SPDP98, 1998.","key":"13_CR12","DOI":"10.1007\/3-540-64359-1_721"},{"unstructured":"C. Yoo, H.-W. Jin, and S.-C. Kwon, \u201cAsynchronous UDP,\u201d IEICE Transactions on Communications, Vol.E84-B, No.12, December 2001.","key":"13_CR13"}],"container-title":["Lecture Notes in Computer Science","Model Checking Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46017-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T14:47:29Z","timestamp":1558968449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46017-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540434771","9783540460176"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-46017-9_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}