{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:00:05Z","timestamp":1725663605019},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564966"},{"type":"electronic","value":"9783540475729"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-56496-9_30","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T06:13:26Z","timestamp":1330236806000},"page":"384-395","source":"Crossref","is-referenced-by-count":0,"title":["A verification procedure via invariant for extended communicating finite-state machines"],"prefix":"10.1007","author":[{"given":"Masahiro","family":"Higuchi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Osamu","family":"Shirakawa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hiroyuki","family":"Seki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mamoru","family":"Fujii","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tadao","family":"Kasami","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,5,30]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D. Brand","year":"1983\u201304","unstructured":"Brand D., and Zafiropulo P.: \u201cOn Communicating Finite-State Machines\u201d, Journal of ACM, vol.30, pp.323\u2013342, 1983\u201304.","journal-title":"Journal of ACM"},{"key":"30_CR2","unstructured":"Kakuda Y., Wakahara Y., and Norigoe M.: \u201cA New Algorithm for Fast Protocol Validation\u201d, Proc. of Compsac-86, pp.228\u2013236, 1986."},{"key":"30_CR3","unstructured":"Yuang M.C., and Kershebaum A.: \u201cParallel Protocol Verification: The Two-Phase Algorithm\u201d, Proc. 9th Intern. Symp. on PSTV, pp.339\u2013353, 1989."},{"key":"30_CR4","unstructured":"ISO: \u201cInformation Processing Systems-Open Systems Interconnection-Estelle: A Formal Description Technique Based on an Extended State Transition Model\u201d, ISO\/DIS 9074, 1987."},{"key":"30_CR5","unstructured":"CCITT: \u201cSpecification and Description Language(SDL)\u201d, Recommendation Z100, 1989."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Gordon M.J.C.: \u201cA Proof Generating System for Higher-Order Logic\u201d in \u201cVLSI Specification, Verification and Synthesis\u201d, Kluwer Academic Publishers, pp.73\u2013128, 1987-01.","DOI":"10.1007\/978-1-4613-2007-4_3"},{"issue":"no.2","key":"30_CR7","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/0140-3664(90)90175-G","volume":"13","author":"B. Sarikaya","year":"1990\u201303","unstructured":"Sarikaya B., Bochmann G.V., and Koukoulidis V.: \u201cMethod of Analysing Extended Finite-State Machine Specifications\u201d, Computer Communications, vol.13, no.2, pp.83\u201392, 1990\u201303.","journal-title":"Computer Communications"},{"key":"30_CR8","unstructured":"Finkel A.: \u201cA New Class of Analyzable CFSMs with Unbounded FIFO Channels\u201d, Proc. 8th Intern. Symp. on PSTV, pp.283\u2013294, 1988."},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Huet G., and Oppen D.:\u201cEquations and Rewrite Rules A Survey\u201d in \u201cFormal Language: Perspectives and Open Problems\u201d, R. Book eds., Academic Press, pp.349\u2013405, 1980.","DOI":"10.1016\/B978-0-12-115350-2.50017-8"},{"key":"30_CR10","unstructured":"ISO: \u201cBasic Connection Oriented Session Protocol Specification\u201d, ISO 8327."},{"key":"30_CR11","unstructured":"Higuchi M., Seki H., and Kasami T.: \u201cA Method of Composing Communication Protocols with Priority Service\u201d, to appear in IEICE Trans. Commun., 1992-10."},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Choi T.Y., and Miller R.E.: \u201cA Decomposition Method for the Analysis and Design of Finite State Protocols\u201d, Proc. of 8th ACM\/IEEE Data Comm. Symp., pp.167\u2013176, 1983.","DOI":"10.1145\/800034.800916"},{"key":"30_CR13","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/12.88459","volume":"40","author":"H. Lin","year":"1991-04","unstructured":"Lin H.: \u201cConstructing Protocols with Alternative Functions\u201d, IEEE Trans. Comput., vol.40, pp.376\u2013386, 1991-04.","journal-title":"IEEE Trans. Comput."},{"key":"30_CR14","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/6110.214400","volume":"3","author":"C. Chow","year":"1985-11","unstructured":"Chow C., Gouda M.G., and Lam S.S.: \u201cA Discipline for Constructing Multiphase Communication Protocols\u201d, ACM Trans. on Computer Systems, vol.3, pp.315\u2013343, 1985-11.","journal-title":"ACM Trans. on Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-56496-9_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:04:04Z","timestamp":1605629044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-56496-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540564966","9783540475729"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-56496-9_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}