{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:00:57Z","timestamp":1725663657592},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551799"},{"type":"electronic","value":"9783540467632"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/3-540-55179-4_19","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T09:51:18Z","timestamp":1330249878000},"page":"192-202","source":"Crossref","is-referenced-by-count":27,"title":["Bounded-memory algorithms for verification on-the-fly"],"prefix":"10.1007","author":[{"given":"Claude","family":"Jard","sequence":"first","affiliation":[]},{"given":"Thierry","family":"J\u00e9ron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,29]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"G.V. Bochmann. Finite state description of communication protocols. Computer Networks, 2, October 1978.","DOI":"10.1016\/0376-5075(78)90015-6"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"A. Bouajjani, J.-C. Fernandez, and N. Halbwachs. Minimal model generation. In Workshop on Computer Aided Verification DIMACS 90, June 1990.","DOI":"10.1090\/dimacs\/003\/08"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"E.M. Clarke and O. Grumberg. Avoiding the state explosion problem in temporal logic model checking algorithms. 6th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Vancouver, Canada, August 1987.","DOI":"10.1145\/41840.41865"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"C. Courcoubetis, M. Vardi, P. Wolper, and M. Yannakakis. Memory efficient algorithms for the verification of temporal properties. In Workshop on Computer Aided Verification, DIMACS 90, June 1990.","DOI":"10.1090\/dimacs\/003\/15"},{"key":"19_CR5","unstructured":"J.-C. Fernandez and L. Mounier. Verifying bisimulation on the fly. In Third International Conference on Formal Description Techniques, FORTE'90, Madrid, November 1990."},{"key":"19_CR6","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0304-3975(85)90014-3","volume":"35","author":"A. Finkel","year":"1985","unstructured":"A. Finkel and G. Memmi. An introduction to fifo nets \u2014 monogeneous nets: a subclass of fifo nets. Theoretical Computer Science, 35:191\u2013214, 1985.","journal-title":"Theoretical Computer Science"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"P. Godefroid and P. Wolper. A partial approach to model checking. In 6th IEEE Symposium on Logic in Computer Science, Amsterdam, July 1991.","DOI":"10.1109\/LICS.1991.151664"},{"key":"19_CR8","unstructured":"S. Graf and B. Steffen. Compositional minimization of finite state processes. In Workshop on Computer Aided Verification DIMACS 90, June 1990."},{"issue":"10","key":"19_CR9","doi-asserted-by":"crossref","first-page":"2413","DOI":"10.1002\/j.1538-7305.1985.tb00010.x","volume":"64","author":"G. Holzmann","year":"1985","unstructured":"G. Holzmann. Tracing protocols. ATT Technical Journal, 64(10):2413\u20132434, 1985.","journal-title":"ATT Technical Journal"},{"key":"19_CR10","unstructured":"G.J. Holzmann. Algorithms for automated protocol validation. In Proceedings of the International Workshop on Automatic Verification Methods for Finite State Systems, Grenoble, France, June 1989."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"G.J. Holzmann. Automated protocol validation in ARGOS, assertion proving and scatter searching. IEEE trans. on Software Engineering, Vol 13, No 6, June 1987.","DOI":"10.1109\/TSE.1987.233206"},{"key":"19_CR12","unstructured":"ISO 9074. Estelle: a Formal Description Technique based on an Extented State Transition Model. ISO TC97\/SC21\/WG6.1, 1986."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"C. Jard, R. Groz, and J.F. Monin. Development of VEDA: a prototyping tool for distributed algorithms. In IEEE Trans. on Software Engin., March 1988.","DOI":"10.1109\/32.4654"},{"key":"19_CR14","unstructured":"C. Jard, R. Groz, and J-F. Monin. V\u00e9da: a software simulator for the validation of protocol specifications. In COMNET'85, Hungary, October 1985."},{"key":"19_CR15","first-page":"275","volume-title":"On-line model-checking for finite linear temporal logic specifications","author":"C. Jard","year":"1989","unstructured":"C. Jard and T. J\u00e9ron. On-line model-checking for finite linear temporal logic specifications. In Proceedings of the International Workshop on Automatic Verification Methods for Finite State Systems, Grenoble, France, June 1989. Springer-Verlag, LNCS #407, pages 275\u2013285."},{"key":"19_CR16","unstructured":"T. J\u00e9ron. Contribution \u00e0 la validation des protocoles: test d'infinitude et v\u00e9rification \u00e0 la vol\u00e9e. Ph.D Thesis, University of Rennes I, May 1991."},{"key":"19_CR17","first-page":"322","volume-title":"Testing for unboundedness of fifo channels","author":"T. J\u00e9ron","year":"1991","unstructured":"T. J\u00e9ron. Testing for unboundedness of fifo channels. In STACS 91: Symposium on Theoretical Aspects of Computer Science, Hamburg, Germany, February 1991. Springer-Verlag, LNCS #480, pages 322\u2013333."},{"key":"19_CR18","unstructured":"R. Martin and G. Memmi. Sp\u00e9cification et validation de syst\u00e8mes temps r\u00e9el \u00e0 l'aide de r\u00e9seaux de P\u00e9tri \u00e0 files. Technical Report 3, Revue Tech. Thomson-CSF, Sept. 1981."},{"key":"19_CR19","unstructured":"J.-M. Pageot and C. Jard. Experience in guiding simulation. Protocol Specification, Testing and Verification, VIII, IFIP, 207\u2013218, June 1988."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"A. Pnueli. Applications of temporal logic to the specification and verification of reactive systems: a survey of current trends. LNCS #224, Current Trends in Concurrency, 510\u2013584, 1986.","DOI":"10.1007\/BFb0027047"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"A. Valmari. A stubborn attack on state explosion. In Workshop on Computer Aided Verification DIMACS 90, June 1990.","DOI":"10.1090\/dimacs\/003\/04"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"C.H. West. General techniques for communication protocols. IBM J. Res. Develop., 22, july 1978.","DOI":"10.1147\/rd.224.0393"},{"key":"19_CR23","volume-title":"Protocol validation by random state exploration","author":"C. H. West","year":"1986","unstructured":"C. H. West. Protocol validation by random state exploration. In 6th IFIP International Workshop on Protocol Specification, Testing and Verification, Montr\u00e9al, Gray rock, North Holland, June 1986."}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-55179-4_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:57:55Z","timestamp":1605646675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-55179-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540551799","9783540467632"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-55179-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1992]]}}}