{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:59:06Z","timestamp":1764784746131,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030892463"},{"type":"electronic","value":"9783030892470"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89247-0_9","type":"book-chapter","created":{"date-parts":[[2021,10,16]],"date-time":"2021-10-16T17:24:40Z","timestamp":1634405080000},"page":"127-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Deadlock in Packet Switching Networks"],"prefix":"10.1007","author":[{"given":"Anna","family":"Stramaglia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5772-9527","authenticated-orcid":false,"given":"Jeroen J. A.","family":"Keiren","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Zantema","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/2.976921","volume":"35","author":"L Benini","year":"2002","unstructured":"Benini, L., Micheli, G.D.: Networks on chips: a new SoC paradigm. Computer 35(1), 70\u201378 (2002). https:\/\/doi.org\/10.1109\/2.976921","journal-title":"Computer"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-319-08867-9_22","volume-title":"Computer Aided Verification","author":"R Cavada","year":"2014","unstructured":"Cavada, R., et al.: The nuXmv symbolic model checker. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 334\u2013342. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08867-9_22"},{"key":"9_CR3","unstructured":"Cavada, R., et al.: nuXmv 1.1.1 user manual. Technical report (2016)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chen, R.C.: Deadlock prevention in message switched networks. In: Proceedings of the 1974 Annual Conference, vol. 1, p. 306\u2013310. ACM, New York (1974). https:\/\/doi.org\/10.1145\/800182.810417","DOI":"10.1145\/800182.810417"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BFb0025774","volume-title":"Logics of Programs","author":"EM Clarke","year":"1982","unstructured":"Clarke, E.M., Emerson, E.A.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol. 131, pp. 52\u201371. Springer, Heidelberg (1982). https:\/\/doi.org\/10.1007\/BFb0025774"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/3-540-06815-5_147","volume-title":"Rechnerstrukturen und Betriebsprogrammierung","author":"EG Coffman","year":"1974","unstructured":"Coffman, E.G., Elphick, M.J., Shoshani, A.: Deadlock problems in computer system. In: H\u00e4ndler, W., Spies, P.P. (eds.) Rechnerstrukturen und Betriebsprogrammierung. LNCS, vol. 13, pp. 311\u2013325. Springer, Heidelberg (1974). https:\/\/doi.org\/10.1007\/3-540-06815-5_147"},{"key":"9_CR7","volume-title":"Principles and Practices of Interconnection Networks","author":"WJ Dally","year":"2004","unstructured":"Dally, W.J., Towles, B.P.: Principles and Practices of Interconnection Networks. Morgan Kaufmann Publishers Inc., San Francisco (2004)"},{"issue":"8","key":"9_CR8","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/71.532115","volume":"7","author":"J Duato","year":"1996","unstructured":"Duato, J.: A necessary and sufficient condition for deadlock-free routing in cut-through and store-and-forward networks. IEEE Trans. Parallel Distrib. Syst. 7(8), 841\u2013854 (1996). https:\/\/doi.org\/10.1109\/71.532115","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09766-4_314","volume-title":"Routing (Including Deadlock Avoidance)","author":"P L\u00f3pez","year":"2011","unstructured":"L\u00f3pez, P.: Routing (Including Deadlock Avoidance). Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-0-387-09766-4_314"},{"issue":"3","key":"9_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/TCOM.1980.1094666","volume":"28","author":"P Merlin","year":"1980","unstructured":"Merlin, P., Schweitzer, P.: Deadlock avoidance in store-and-forward networks - I: store-and-forward deadlock. IEEE Trans. Commun. 28(3), 345\u2013354 (1980). https:\/\/doi.org\/10.1109\/TCOM.1980.1094666","journal-title":"IEEE Trans. Commun."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Stramaglia, A., Keiren, J., Zantema, H.: Deadlocks in packet switching networks arXiv:2101.06015 [cs.NI] (2021). https:\/\/arxiv.org\/abs\/2101.06015","DOI":"10.1007\/978-3-030-89247-0_9"},{"key":"9_CR12","unstructured":"Stramaglia, A.: Deadlock in packet switching networks. Master\u2019s thesis, Universit\u00e0 degli Studi di Trieste, Dipartimento di Ingegneria e Architettura, Trieste, Italy (2020)"},{"issue":"3","key":"9_CR13","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1137\/0210044","volume":"10","author":"S Toueg","year":"1981","unstructured":"Toueg, S., Ullman, J.D.: Deadlock-free packet switching networks. SIAM J. Comput. 10(3), 594\u2013611 (1981). https:\/\/doi.org\/10.1137\/0210044","journal-title":"SIAM J. Comput."},{"key":"9_CR14","unstructured":"Verbeek, F.: Formal verification of on-chip communication fabrics. Ph.D. thesis, Radboud Universiteit Nijmegen (2013). https:\/\/hdl.handle.net\/2066\/103932"},{"key":"9_CR15","doi-asserted-by":"publisher","unstructured":"Verbeek, F., Schmaltz, J.: Formal specification of networks-on-chips: deadlock and evacuation. In: 2010 Design, Automation Test in Europe Conference Exhibition (DATE 2010), pp. 1701\u20131706, March 2010. https:\/\/doi.org\/10.1109\/DATE.2010.5457089","DOI":"10.1109\/DATE.2010.5457089"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Verbeek, F., Schmaltz, J.: Formal validation of deadlock prevention in networks-on-chips. In: Proceedings of the Eighth International Workshop on the ACL2 Theorem Prover and Its Applications, ACL2 2009, pp. 128\u2013138. ACM, New York, May 2009. https:\/\/doi.org\/10.1145\/1637837.1637858","DOI":"10.1145\/1637837.1637858"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/3-540-17187-8_52","volume-title":"ICDT \u201986","author":"O Wolfson","year":"1986","unstructured":"Wolfson, O.: A new characterization of distributed deadlock in databases. In: Ausiello, G., Atzeni, P. (eds.) ICDT 1986. LNCS, vol. 243, pp. 436\u2013444. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-17187-8_52"},{"issue":"4","key":"9_CR18","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/850752.850753","volume":"17","author":"D Z\u00f6bel","year":"1983","unstructured":"Z\u00f6bel, D.: The deadlock problem: a classifying bibliography. ACM SIGOPS Oper. Syst. Rev. 17(4), 6\u201315 (1983). https:\/\/doi.org\/10.1145\/850752.850753","journal-title":"ACM SIGOPS Oper. Syst. Rev."}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89247-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T22:02:43Z","timestamp":1760565763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89247-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030892463","9783030892470"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89247-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FSEN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamentals of Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fsen2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fsen.ir\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was hosted by IPM.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}