{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:06:38Z","timestamp":1725663998282},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540584506"},{"type":"electronic","value":"9783540488033"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58450-1_56","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:11:16Z","timestamp":1330254676000},"page":"391-406","source":"Crossref","is-referenced-by-count":2,"title":["Automating verification by functional abstraction at the system level"],"prefix":"10.1007","author":[{"given":"Klaus","family":"Schneider","sequence":"first","affiliation":[]},{"given":"Ramayya","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Kropf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,8]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi and L. Lamport. Composing specifications. Technical Report 66, System Research Center, 1990.","DOI":"10.1007\/3-540-52559-9_59"},{"key":"26_CR2","unstructured":"S.M. Burns and A.J. Martin. A synthesis method for self-timed VLSI circuits. In Proceedings of the International Conference on Computer Design, 1987."},{"key":"26_CR3","unstructured":"European Design and Test Conference. IEEE Computer Society Press, March 1994."},{"key":"26_CR4","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C.A.R. Hoare","year":"1969","unstructured":"C.A.R. Hoare. An axiomatic approach to computer programming. Communications ACM, 12:576\u2013580, 1969.","journal-title":"Communications ACM"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"C.A.R. Hoare. Communicating sequential processes. Communications ACM, pages 666\u2013677, 1978.","DOI":"10.1145\/359576.359585"},{"key":"26_CR6","unstructured":"HOL User's Group Workshop, number 780 in Lecture Notes in Computer Sciences, Vancouver, Canada, August 1993. Springer Verlag."},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"F. Kr\u00f6ger. Temporal Logic of Programs, volume 8 of EATCS Monographs on Theoretical Computer Science. Springer Verlag, 1987.","DOI":"10.1007\/978-3-642-71549-5_5"},{"key":"26_CR8","unstructured":"A.J. Martin. Synthesis of asynchronous VLSI circuits. In J. Staunstrup, editor, Formal Methods for VLSI Design, 1990."},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"T.F. Melham. Abstraction mechanisms for hardware verification. In G. Birtwistle and P.A. Subrahmanyam, editors, VLSI Specification, Verification and Synthesis. Kluwer, 1988.","DOI":"10.1007\/978-1-4613-2007-4_9"},{"key":"26_CR10","first-page":"766","volume-title":"number 607 in Lecture Notes in Computer Science","author":"K. Schneider","year":"1992","unstructured":"K. Schneider, R. Kumar, and Th. Kropf. The FAUST prover. In D. Kapur, editor, 11th Conference on Automated Deduction, number 607 in Lecture Notes in Computer Science, pages 766\u2013770. Springer Verlag, Albany, New York,1992."},{"key":"26_CR11","unstructured":"K. Schneider, R. Kumar, and Th. Kropf. Hardware verification with firstorder BDD's. In Conference on Computer Hardware Description Languages, 1993."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"K. Schneider, R. Kumar, and Th. Kropf. Alternative proof procedures for finite-state machines in a higher-order environment. In International Workshop on Higher-Order Logic Theorem Proving and its Applications, Vancouver, Canada, 1993.","DOI":"10.1007\/3-540-57826-9_137"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"K. Schneider, T. Kropf, and R. Kumar. Control-path oriented verification of sequential generic circuits with control and data path. In [EDAC94].","DOI":"10.1109\/EDTC.1994.326809"},{"key":"26_CR14","volume-title":"Modelling bit vectors in HOL: the word library","author":"W. Wong","year":"1993","unstructured":"W. Wong. Modelling bit vectors in HOL: the word library. In [HUG93]."}],"container-title":["Lecture Notes in Computer Science","Higher Order Logic Theorem Proving and Its Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58450-1_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:21:31Z","timestamp":1605630091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58450-1_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540584506","9783540488033"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-58450-1_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}