{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:09:21Z","timestamp":1762459761478,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223960"},{"type":"electronic","value":"9783030223977"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22397-7_10","type":"book-chapter","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T18:14:14Z","timestamp":1559672054000},"page":"161-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Verification of Concurrent Design Patterns with Data"],"prefix":"10.1007","author":[{"given":"Simon","family":"Bliudze","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ludovic","family":"Henrio","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric","family":"Madelaine","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"issue":"1\/2","key":"10_CR1","first-page":"29","volume":"8","author":"F Alberti","year":"2012","unstructured":"Alberti, F., Ghilardi, S., Pagani, E., Ranise, S., Rossi, G.P.: Universal guards, relativization of quantifiers, and failure models in model checking modulo theories. JSAT 8(1\/2), 29\u201361 (2012). https:\/\/satassociation.org\/jsat\/index.php\/jsat\/article\/view\/93","journal-title":"JSAT"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jlamp.2017.02.003","volume":"89","author":"R. Ameur-Boulifa","year":"2017","unstructured":"Ameur-Boulifa, R., Henrio, L., Kulankhina, O., Madelaine, E., Savu, A.: Behavioural semantics for asynchronous components. J. Log. Algebr. Methods Program. 89, 1\u201340 (2017). https:\/\/doi.org\/10.1016\/j.jlamp.2017.02.003, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352220817300287","journal-title":"Journal of Logical and Algebraic Methods in Programming"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF00262973","volume":"17","author":"A Arnold","year":"1982","unstructured":"Arnold, A.: Synchronised behaviours of processes and rational relations. Acta Inform. 17, 21\u201329 (1982)","journal-title":"Acta Inform."},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-17524-9_6","volume-title":"NASA Formal Methods","author":"L A\u015ftef\u0103noaei","year":"2015","unstructured":"A\u015ftef\u0103noaei, L., Ben Rayana, S., Bensalem, S., Bozga, M., Combaz, J.: Compositional verification of parameterised timed systems. In: Havelund, K., Holzmann, G., Joshi, R. (eds.) NFM 2015. LNCS, vol. 9058, pp. 66\u201381. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17524-9_6"},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s00165-015-0349-8","volume":"18","author":"P Attie","year":"2016","unstructured":"Attie, P., Baranov, E., Bliudze, S., Jaber, M., Sifakis, J.: A general framework for architecture composability. Form. Asp. Comput. 18(2), 207\u2013231 (2016)","journal-title":"Form. Asp. Comput."},{"key":"10_CR6","unstructured":"Baranov, E.: A semantic framework for architecture modelling. Ph.D. thesis, EPFL (2017)"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MS.2011.27","volume":"28","author":"A Basu","year":"2011","unstructured":"Basu, A., et al.: Rigorous component-based system design using the BIP framework. IEEE Softw. 28(3), 41\u201348 (2011). https:\/\/doi.org\/10.1109\/MS.2011.27","journal-title":"IEEE Softw."},{"key":"10_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69061-0","volume-title":"Verification of Object-Oriented Software: The KeY Approach","author":"B Beckert","year":"2007","unstructured":"Beckert, B., H\u00e4hnle, R., Schmitt, P.H.: Verification of Object-Oriented Software: The KeY Approach. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-69061-0"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/978-3-642-02658-4_45","volume-title":"Computer Aided Verification","author":"Saddek Bensalem","year":"2009","unstructured":"Bensalem, S., Bozga, M., Nguyen, T.H., Sifakis, J.: D-finder: a tool for compositional deadlock detection and verification. In: CAV, pp. 614\u2013619 (2009). https:\/\/doi.org\/10.1007\/978-3-642-02658-4_45"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-642-20398-5_32","volume-title":"NASA Formal Methods","author":"S Bensalem","year":"2011","unstructured":"Bensalem, S., Griesmayer, A., Legay, A., Nguyen, T.-H., Sifakis, J., Yan, R.: D-Finder 2: towards efficient correctness of incremental design. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 453\u2013458. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_32"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-24953-7_25","volume-title":"Automated Technology for Verification and Analysis","author":"S Bliudze","year":"2015","unstructured":"Bliudze, S., et al.: Formal verification of infinite-state BIP models. In: Finkbeiner, B., Pu, G., Zhang, L. (eds.) ATVA 2015. LNCS, vol. 9364, pp. 326\u2013343. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24953-7_25"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Bliudze, S., Henrio, L., Madelaine, E.: Verification of concurrent design patterns with data. Technical report, Inria (2019, to appear)","DOI":"10.1007\/978-3-030-22397-7_10"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Bliudze, S., Sifakis, J.: The algebra of connectors\u2013structuring interaction in BIP. In: Proceedings of the 7th ACM & IEEE International Conference on Embedded Software, EMSOFT 2007, pp. 11\u201320. ACM SigBED, Salzburg, October 2007. https:\/\/doi.org\/10.1145\/1289927.1289935","DOI":"10.1145\/1289927.1289935"},{"issue":"10","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/TC.2008.26","volume":"57","author":"S Bliudze","year":"2008","unstructured":"Bliudze, S., Sifakis, J.: The algebra of connectors\u2013structuring interaction in BIP. IEEE Trans. Comput. 57(10), 1315\u20131330 (2008). https:\/\/doi.org\/10.1109\/TC.2008.26","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"10_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10703-010-0091-z","volume":"36","author":"S Bliudze","year":"2010","unstructured":"Bliudze, S., Sifakis, J.: Causal semantics for the algebra of connectors. Form. Methods Syst. Des. 36(2), 167\u2013194 (2010). https:\/\/doi.org\/10.1007\/s10703-010-0091-z","journal-title":"Form. Methods Syst. Des."},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-44618-4_20","volume-title":"CONCUR 2000 \u2014 Concurrency Theory","author":"R Bruni","year":"2000","unstructured":"Bruni, R., de Frutos-Escrig, D., Mart\u00ed-Oliet, N., Montanari, U.: Bisimilarity congruences for open terms and term graphs via tile logic. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, pp. 259\u2013274. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44618-4_20"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Buisson, J., Calvacante, E., Dagnat, F., Leroux, E., Martinez, S.: Coqcots & Pycots: non-stopping components for safe dynamic reconfiguration. In: CBSE 2014: proceedings of the 17th International ACM SIGSOFT Symposium on Component-Based Software Engineering, Lille, France, p. 1, June 2014. https:\/\/hal.archives-ouvertes.fr\/hal-00984365, https:\/\/doi.org\/10.1145\/2602458.2602459","DOI":"10.1145\/2602458.2602459"},{"key":"10_CR18","unstructured":"Calvanese, D., Ghilardi, S., Gianola, A., Montali, M., Rivkin, A.: Verification of data-aware processes via array-based systems (extended version). CoRR abs\/1806.11459 (2018). http:\/\/arxiv.org\/abs\/1806.11459"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-04167-9_10","volume-title":"Formal Methods for Components and Objects","author":"A Cansado","year":"2009","unstructured":"Cansado, A., Madelaine, E.: Specification and verification for grid component-based applications: from models to tools. In: de Boer, F.S., Bonsangue, M.M., Madelaine, E. (eds.) FMCO 2008. LNCS, vol. 5751, pp. 180\u2013203. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04167-9_10"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-319-08867-9_22","volume-title":"Computer Aided Verification","author":"R Cavada","year":"2014","unstructured":"Cavada, R., et al.: The nuXmv symbolic model checker. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 334\u2013342. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08867-9_22"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-319-41540-6_29","volume-title":"Computer Aided Verification","author":"A Champion","year":"2016","unstructured":"Champion, A., Mebsout, A., Sticksel, C., Tinelli, C.: The Kind 2 model checker. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9780, pp. 510\u2013517. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41540-6_29"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Cimatti, A., Griggio, A., Mover, S., Tonetta, S.: IC3 modulo theories via implicit predicate abstraction. CoRR abs\/1310.6847 (2013). http:\/\/arxiv.org\/abs\/1310.6847","DOI":"10.1007\/978-3-642-54862-8_4"},{"issue":"3","key":"10_CR23","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.jlap.2012.01.003","volume":"81","author":"Crystal Chang Din","year":"2012","unstructured":"Din, C.C., Dovland, J., Johnsen, E.B., Owe, O.: Observable behavior of distributed systems: component reasoning for concurrent objects. J. Log. Algebr. Program. 81(3), 227\u2013256 (2012). https:\/\/doi.org\/10.1016\/j.jlap.2012.01.003. The 22nd Nordic Workshop on Programming Theory (NWPT 2010)","journal-title":"The Journal of Logic and Algebraic Programming"},{"key":"10_CR24","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Professional, Boston (1994)"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-71070-7_6","volume-title":"Automated Reasoning","author":"S Ghilardi","year":"2008","unstructured":"Ghilardi, S., Nicolini, E., Ranise, S., Zucchelli, D.: Towards SMT model checking of array-based systems. In: Armando, A., Baumgartner, P., Dowek, G. (eds.) IJCAR 2008. LNCS (LNAI), vol. 5195, pp. 67\u201382. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71070-7_6"},{"issue":"2","key":"10_CR26","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/0304-3975(94)00172-F","volume":"138","author":"M Hennessy","year":"1995","unstructured":"Hennessy, M., Lin, H.: Symbolic bisimulations. Theor. Comput. Sci. 138(2), 353\u2013389 (1995)","journal-title":"Theor. Comput. Sci."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Henrio, L., Madelaine, E., Zhang, M.: pNets: an expressive model for parameterised networks of processes. In: 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2015). IEEE (2015)","DOI":"10.1109\/PDP.2015.70"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-662-49665-7_5","volume-title":"Fundamental Approaches to Software Engineering","author":"L Henrio","year":"2016","unstructured":"Henrio, L., Kulankhina, O., Li, S., Madelaine, E.: Integrated environment for verifying and\u00a0running distributed components. In: Stevens, P., W\u0105sowski, A. (eds.) FASE 2016. LNCS, vol. 9633, pp. 66\u201383. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49665-7_5"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-39570-8_12","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"L Henrio","year":"2016","unstructured":"Henrio, L., Madelaine, E., Zhang, M.: A theory for the composition of concurrent processes. In: Albert, E., Lanese, I. (eds.) FORTE 2016. LNCS, vol. 9688, pp. 175\u2013194. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39570-8_12"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/3-540-61604-7_47","volume-title":"CONCUR \u201996: Concurrency Theory","author":"H Lin","year":"1996","unstructured":"Lin, H.: Symbolic transition graph with assignment. In: Montanari, U., Sassone, V. (eds.) CONCUR 1996. LNCS, vol. 1119, pp. 50\u201365. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61604-7_47"},{"key":"10_CR31","unstructured":"Lin, H.: Model checking value-passing processes. In: 8th Asia-Pacific Software Engineering Conference (APSEC 2001). Macau, December 2001"},{"key":"10_CR32","doi-asserted-by":"publisher","unstructured":"Marmsoler, D.: Towards a theory of architectural styles. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp. 823\u2013825. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2635868.2661683","DOI":"10.1145\/2635868.2661683"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-319-89363-1_9","volume-title":"Fundamental Approaches to Software Engineering","author":"D Marmsoler","year":"2018","unstructured":"Marmsoler, D.: Hierarchical specification and verification of architectural design patterns. In: Russo, A., Sch\u00fcrr, A. (eds.) FASE 2018. LNCS, vol. 10802, pp. 149\u2013168. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89363-1_9"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Mavridou, A., Stachtiari, E., Bliudze, S., Ivanov, A., Katsaros, P., Sifakis, J.: Architecture-based design: A satellite on-board software case study. In: 13th International Conference on Formal Aspects of Component Software (FACS 2016) (2016)","DOI":"10.1007\/978-3-319-57666-4_16"},{"issue":"3","key":"10_CR35","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0304-3975(83)90114-7","volume":"25","author":"R Milner","year":"1983","unstructured":"Milner, R.: Calculi for synchrony and asynchrony. TCS 25(3), 267\u2013310 (1983). https:\/\/doi.org\/10.1016\/0304-3975(83)90114-7","journal-title":"TCS"},{"key":"10_CR36","unstructured":"Qin, X., Bliudze, S., Madelaine, E., Zhang, M.: Using SMT engine to generate symbolic automata. In: 18th International Workshop on Automated Verification of Critical Systems (AVOCS 2018). Electronic Communications of the EASST (2018)"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-28766-9_10","volume-title":"Trustworthy Global Computing","author":"W Qiang","year":"2016","unstructured":"Qiang, W., Bliudze, S.: Verification of component-based systems via predicate abstraction and simultaneous set reduction. In: Ganty, P., Loreti, M. (eds.) TGC 2015. LNCS, vol. 9533, pp. 147\u2013162. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-28766-9_10"}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22397-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:03:14Z","timestamp":1685836994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22397-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223960","9783030223977"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22397-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COORDINATION","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Coordination Languages and Models","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kongens Lyngby","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coordination2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.discotec.org\/2019\/coordination","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}