{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:43:19Z","timestamp":1725615799378},"publisher-location":"London","reference-count":12,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9783540761914"},{"type":"electronic","value":"9781447109976"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/978-1-4471-0997-6_19","type":"book-chapter","created":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T16:07:46Z","timestamp":1317398866000},"page":"241-252","source":"Crossref","is-referenced-by-count":0,"title":["Automated Verification of Safety Requirements using CCS and Binary Decision Diagrams"],"prefix":"10.1007","author":[{"given":"Reiner","family":"Lichtenecker","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Klaus","family":"Gotthardt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"R. Milner: \u201cCommunication and Concurrency\u201d, Prentice Hall International Series in Computer Science, ISBN 0-13-114984-9."},{"key":"19_CR2","first-page":"379","volume-title":"Compilation and verification of lotos specifications","author":"H Garavel","year":"1990","unstructured":"H. Garavel, J. Sifakis: \u201cCompilation and verification of lotos specifications\u201d, in L. Logrippo, R.L. Probert, H. Ural, editors, Procs. 10th International Symposium on Protocol Specification, Testing and Verification, pages 379\u2013394, Amsterdam, June 1990, North-Holland."},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/0169-7552(93)90050-E","volume":"25","author":"JA Manas","year":"1993","unstructured":"J.A. Manas, T. de Miguel, J. Salvachua, A. Azcorra: \u201cTool support to implement LOTOS formal specifications\u201d, Computer Networks and ISDN Systems, 25:815\u2013839, 1993.","journal-title":"Computer Networks and ISDN Systems"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R Milner","year":"1992","unstructured":"R. Milner, J. Parrow, D. Walker: \u201cA calculus of mobile processes\u201d, in Information and Computing 100, 1992, pp. 1\u201377.","journal-title":"Information and Computing"},{"issue":"l","key":"19_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/151646.151648","volume":"15","author":"R Cleaveland","year":"1993","unstructured":"R. Cleaveland, J. Parrow, B. Steffen: \u201cThe concurrency workbench: A semantics-based tool for the verification of concurrent systems\u201d, ACM Transactions on Programming Languages and Systems, 15(l):36\u201372, January 1993.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"19_CR6","volume-title":"Deriving ANSA ware Applications from Formal Specifications","author":"B Kramer","year":"1995","unstructured":"B. Kramer, G. Henze etal. : \u201cDeriving ANSA ware Applications from Formal Specifications\u201d, Proceedings of SDPS\u201995, 1995."},{"issue":"8","key":"19_CR7","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"C-35","author":"RE Bryant","year":"1986","unstructured":"Randal E. Bryant: \u201cGraph-based Algorithms for Boolean function manipulation\u201d, IEEE Trans. Computers, C-35(8): 677 \u2013 691, August 1986.","journal-title":"IEEE Trans. Computers"},{"key":"19_CR8","volume-title":"Symbolic Model Checking: 1020 states and beyond","author":"JR Burch","year":"1989","unstructured":"J.R. Burch, E.M. Clarke, K.L. McMillan, D.L. Dill, J. Hwang: \u201cSymbolic Model Checking: 1020 states and beyond\u201d. Technical Report, Carnegie Mellon University, 1989."},{"key":"19_CR9","volume-title":"Symbolic Model Checking: An approach to the State Explosion Problem","author":"KL McMillan","year":"1992","unstructured":"K. L. McMillan: \u201cSymbolic Model Checking: An approach to the State Explosion Problem.\u201d, PhD thesis, Carnegie Mellon Univeristy, 1992."},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BF02242704","volume":"6","author":"R Enders","year":"1993","unstructured":"R. Enders, T. Filkorn, D. Taubner: \u201cGenerating BDDs for symbolic model checking in CCS\u201d, in Distributed Computing, 1993, 6:155\u2013164.","journal-title":"Distributed Computing"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Fernandez, Kerbrat, Mounier: \u201cSymbolic equivalence checking\u201d, Computer Aided Verification, Proc. 5th Int. Conf., CAV\u201993, Elounda, Greece, June\/July 1993","DOI":"10.1007\/3-540-56922-7_8"},{"key":"19_CR12","volume-title":"Formale Verifikation von Vielfach-ZugrifTsprotokollen in CCS","author":"K Gotthardt","year":"1995","unstructured":"K. Gotthardt, I. Scheler: \u201cFormale Verifikation von Vielfach-ZugrifTsprotokollen in CCS\u201d GI-Fachtagung Softwaretechnik, Braunschweig, 1995"}],"container-title":["Safe Comp 97"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-0997-6_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T05:44:38Z","timestamp":1605678278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-0997-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540761914","9781447109976"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-0997-6_19","relation":{},"subject":[],"published":{"date-parts":[[1997]]}}}