{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:02:31Z","timestamp":1762300951469,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031479625"},{"type":"electronic","value":"9783031479632"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47963-2_24","type":"book-chapter","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T21:41:26Z","timestamp":1700689286000},"page":"399-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simplifying Process Parameters by\u00a0Unfolding Algebraic Data Types"],"prefix":"10.1007","author":[{"given":"Anna","family":"Stramaglia","sequence":"first","affiliation":[]},{"given":"Jeroen J. A.","family":"Keiren","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Neele","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,23]]},"reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-44585-4_23","volume-title":"Computer Aided Verification","author":"S Blom","year":"2001","unstructured":"Blom, S., Fokkink, W., Groote, J.F., van Langevelde, I., Lisser, B., van de Pol, J.: $$\\upmu $$CRL: a toolset for analysing algebraic specifications. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 250\u2013254. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44585-4_23"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-540-85762-4_6","volume-title":"Theoretical Aspects of Computing - ICTAC 2008","author":"S Blom","year":"2008","unstructured":"Blom, S., van de Pol, J.: Symbolic reachability for process algebras with recursive data types. In: Fitzgerald, J.S., Haxthausen, A.E., Yenigun, H. (eds.) ICTAC 2008. LNCS, vol. 5160, pp. 81\u201395. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85762-4_6"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-030-17465-1_2","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"O Bunte","year":"2019","unstructured":"Bunte, O., et al.: The mCRL2 toolset for analysing concurrent systems. In: Vojnar, T., Zhang, L. (eds.) TACAS 2019. LNCS, vol. 11428, pp. 21\u201339. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17465-1_2"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-030-58298-2_10","volume-title":"Formal Methods for Industrial Critical Systems","author":"O Bunte","year":"2020","unstructured":"Bunte, O., Gool, L.C.M., Willemse, T.A.C.: Formal verification of OIL component specifications using mCRL2. In: ter Beek, M.H., Ni\u010dkovi\u0107, D. (eds.) FMICS 2020. LNCS, vol. 12327, pp. 231\u2013251. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58298-2_10"},{"issue":"5","key":"24_CR5","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/TCOM.1974.1092259","volume":"22","author":"V Cerf","year":"1974","unstructured":"Cerf, V., Kahn, R.: A protocol for packet network intercommunication. IEEE Trans. Commun. 22(5), 637\u2013648 (1974). https:\/\/doi.org\/10.1109\/TCOM.1974.1092259","journal-title":"IEEE Trans. Commun."},{"key":"24_CR6","unstructured":"Groote, J.F., Lisser, B.: Computer assisted manipulation of algebraic process specifications. Technical report SEN-R0117, CWI (2001). https:\/\/ir.cwi.nl\/pub\/4326\/"},{"key":"24_CR7","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9946.001.0001","volume-title":"Modeling and Analysis of Communicating Systems","author":"JF Groote","year":"2014","unstructured":"Groote, J.F., Mousavi, M.R.: Modeling and Analysis of Communicating Systems. The MIT Press, Cambridge (2014)"},{"issue":"3","key":"24_CR8","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.tcs.2005.06.016","volume":"343","author":"JF Groote","year":"2005","unstructured":"Groote, J.F., Willemse, T.A.C.: Parameterised Boolean equation systems. Theoret. Comput. Sci. 343(3), 332\u2013369 (2005). https:\/\/doi.org\/10.1016\/j.tcs.2005.06.016","journal-title":"Theoret. Comput. Sci."},{"key":"24_CR9","doi-asserted-by":"publisher","unstructured":"Groote, J.F., Willemse, T.A.C.: A symmetric protocol to establish service level agreements. Log. Methods Comput. Sci. 16(3) (2020). https:\/\/doi.org\/10.23638\/LMCS-16(3:19)2020","DOI":"10.23638\/LMCS-16(3:19)2020"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-11936-6_16","volume-title":"Automated Technology for Verification and Analysis","author":"JJA Keiren","year":"2014","unstructured":"Keiren, J.J.A., Wesselink, W., Willemse, T.A.C.: Liveness analysis for parameterised Boolean equation systems. In: Cassez, F., Raskin, J.-F. (eds.) ATVA 2014. LNCS, vol. 8837, pp. 219\u2013234. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11936-6_16"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-319-13338-6_16","volume-title":"Hardware and Software: Verification and Testing","author":"J Meijer","year":"2014","unstructured":"Meijer, J., Kant, G., Blom, S., van de Pol, J.: Read, write and copy dependencies for symbolic model checking. In: Yahav, E. (ed.) HVC 2014. LNCS, vol. 8855, pp. 204\u2013219. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13338-6_16"},{"key":"24_CR12","unstructured":"Neele, T.: (Re)moving quantifiers to simplify parameterised Boolean equation systems. In: ARQNL 2022, vol. 3326, pp. 64\u201380. CEUR-WS (2022)"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-00768-2_22","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S Orzan","year":"2009","unstructured":"Orzan, S., Wesselink, W., Willemse, T.A.C.: Static analysis techniques for parameterised Boolean equation systems. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 230\u2013245. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00768-2_22"},{"issue":"8","key":"24_CR14","doi-asserted-by":"publisher","first-page":"2239","DOI":"10.1016\/j.future.2013.06.004","volume":"29","author":"D Remenska","year":"2013","unstructured":"Remenska, D., Willemse, T.A.C., Verstoep, K., Templon, J., Bal, H.: Using model checking to analyze the system behavior of the LHC production grid. Futur. Gener. Comput. Syst. 29(8), 2239\u20132251 (2013). https:\/\/doi.org\/10.1016\/j.future.2013.06.004","journal-title":"Futur. Gener. Comput. Syst."},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-031-15008-1_7","volume-title":"Formal Methods for Industrial Critical Systems","author":"A Stramaglia","year":"2022","unstructured":"Stramaglia, A., Keiren, J.J.A.: Formal verification of an industrial UML-like model using mCRL2. In: Groote, J.F., Huisman, M. (eds.) FMICS 2022. LNCS, vol. 13487, pp. 86\u2013102. Springer, LNCS (2022). https:\/\/doi.org\/10.1007\/978-3-031-15008-1_7"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-04761-9_5","volume-title":"Automated Technology for Verification and Analysis","author":"J van de Pol","year":"2009","unstructured":"van de Pol, J., Timmer, M.: State space reduction of linear processes using control flow reconstruction. In: Liu, Z., Ravn, A.P. (eds.) ATVA 2009. LNCS, vol. 5799, pp. 54\u201368. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04761-9_5"},{"issue":"6","key":"24_CR17","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s10009-016-0433-2","volume":"19","author":"T Van Dijk","year":"2017","unstructured":"Van Dijk, T., van de Pol, J.: Sylvan: multi-core framework for decision diagrams. Int. J. Softw. Tools Technol. Transf. 19(6), 675\u2013696 (2017). https:\/\/doi.org\/10.1007\/s10009-016-0433-2","journal-title":"Int. J. Softw. Tools Technol. Transf."}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47963-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T21:43:46Z","timestamp":1700689426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47963-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031479625","9783031479632"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47963-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Colloquium on Theoretical Aspects of Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictac2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictac2023.compsust.utec.edu.pe\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}