{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:42:32Z","timestamp":1743129752878,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031870538"},{"type":"electronic","value":"9783031870545"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87054-5_4","type":"book-chapter","created":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T03:59:03Z","timestamp":1742443143000},"page":"42-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Finding Universally Quantified Heap Invariants by\u00a0Horn Clause Transformations"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1522-6673","authenticated-orcid":false,"given":"Zafer","family":"Esen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2733-7098","authenticated-orcid":false,"given":"Philipp","family":"R\u00fcmmer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8967-6987","authenticated-orcid":false,"given":"Tjark","family":"Weber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,21]]},"reference":[{"key":"4_CR1","unstructured":"Abdulla, P.A., Bouajjani, A., Cederberg, J., Haziza, F., Ji, R., Rezine, A.: Shape analysis via monotonic abstraction. In: Muscholl, A., Ramanujam, R., Rusinowitch, M., Schwentick, T., Vianu, V. (eds.) Beyond the Finite: New Challenges in Verification and Semistructured Data, 20\u201325 April 2008. Dagstuhl Seminar Proceedings, vol. 08171. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik, Germany (2008). http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2008\/1559\/"},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/S00236-015-0235-0","volume":"53","author":"PA Abdulla","year":"2016","unstructured":"Abdulla, P.A., Hol\u00edk, L., Jonsson, B., Leng\u00e1l, O., Trinh, C.Q., Vojnar, T.: Verification of heap manipulating programs with ordered data by extended forest automata. Acta Informatica 53(4), 357\u2013385 (2016). https:\/\/doi.org\/10.1007\/S00236-015-0235-0","journal-title":"Acta Informatica"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Alt, L., Blicha, M., Hyv\u00e4rinen, A.E.J., Sharygina, N.: SolCMC: solidity compiler\u2019s model checker. In: Shoham, S., Vizel, Y. (eds.) Computer Aided Verification - 34th International Conference, CAV 2022, Haifa, Israel, 7\u201310 August 2022, Proceedings, Part I. Lecture Notes in Computer Science, vol. 13371, pp. 325\u2013338. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13185-1_16","DOI":"10.1007\/978-3-031-13185-1_16"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Baier, D., et al.: Cpachecker 2.3 with strategy selection - (competition contribution). In: Finkbeiner, B., Kov\u00e1cs, L. (eds.) Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, 6\u201311 April 2024, Proceedings, Part III. Lecture Notes in Computer Science, vol. 14572, pp. 359\u2013364. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57256-2_21","DOI":"10.1007\/978-3-031-57256-2_21"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Beyer, D., Keremoglu, M.E.: CPAchecker: a tool for configurable software verification. In: Gopalakrishnan, G., Qadeer, S. (eds.) Computer Aided Verification - 23rd International Conference, CAV 2011, Snowbird, UT, USA, 14\u201320 July 2011. Proceedings. Lecture Notes in Computer Science, vol.\u00a06806, pp. 184\u2013190. Springer, Cham (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_16","DOI":"10.1007\/978-3-642-22110-1_16"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Bj\u00f8rner, N., Gurfinkel, A., McMillan, K.L., Rybalchenko, A.: Horn clause solvers for program verification. In: Beklemishev, L.D., Blass, A., Dershowitz, N., Finkbeiner, B., Schulte, W. (eds.) Fields of Logic and Computation II - Essays Dedicated to Yuri Gurevich on the Occasion of His 75th Birthday. Lecture Notes in Computer Science, vol.\u00a09300, pp. 24\u201351. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23534-9_2","DOI":"10.1007\/978-3-319-23534-9_2"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Bj\u00f8rner, N.S., McMillan, K.L., Rybalchenko, A.: On solving universally quantified Horn clauses. In: Logozzo, F., F\u00e4hndrich, M. (eds.) Static Analysis - 20th International Symposium, SAS 2013, Seattle, WA, USA, 20\u201322 June 2013. Proceedings. Lecture Notes in Computer Science, vol.\u00a07935, pp. 105\u2013125. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-642-38856-9_8","DOI":"10.1007\/978-3-642-38856-9_8"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Blicha, M., Britikov, K., Sharygina, N.: The golem Horn solver. In: Enea, C., Lal, A. (eds.) Computer Aided Verification - 35th International Conference, CAV 2023, Paris, France, 17\u201322 July 2023, Proceedings, Part II. Lecture Notes in Computer Science, vol. 13965, pp. 209\u2013223. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-37703-7_10","DOI":"10.1007\/978-3-031-37703-7_10"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"B\u00f6hme, S., Moskal, M.: Heaps and data structures: a challenge for automated provers. In: Bj\u00f8rner, N.S., Sofronie-Stokkermans, V. (eds.) Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, 31 July\u20135 August 2011. Proceedings. Lecture Notes in Computer Science, vol.\u00a06803, pp. 177\u2013191. Springer, Cham (2011). https:\/\/doi.org\/10.1007\/978-3-642-22438-6_15","DOI":"10.1007\/978-3-642-22438-6_15"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Bouajjani, A., Dragoi, C., Enea, C., Rezine, A., Sighireanu, M.: Invariant synthesis for programs manipulating lists with unbounded data. In: Touili, T., Cook, B., Jackson, P.B. (eds.) Computer Aided Verification, 22nd International Conference, CAV 2010, Edinburgh, UK, 15\u201319 July 2010. Proceedings. Lecture Notes in Computer Science, vol.\u00a06174, pp. 72\u201388. Springer, Cham (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_8","DOI":"10.1007\/978-3-642-14295-6_8"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Britikov, K., Zlatkin, I., Fedyukovich, G., Alt, L., Sharygina, N.: Soltg: a CHC-based solidity test case generator. In: Gurfinkel, A., Ganesh, V. (eds.) Computer Aided Verification - 36th International Conference, CAV 2024, Montreal, QC, Canada, 24\u201327 July 2024, Proceedings, Part I. Lecture Notes in Computer Science, vol. 14681, pp. 466\u2013479. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-65627-9_23","DOI":"10.1007\/978-3-031-65627-9_23"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Ernst, G.: Korn - software verification with Horn clauses (competition contribution). In: Sankaranarayanan, S., Sharygina, N. (eds.) Tools and Algorithms for the Construction and Analysis of Systems - 29th International Conference, TACAS 2023, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Paris, France, 22\u201327 April 2023, Proceedings, Part II. Lecture Notes in Computer Science, vol. 13994, pp. 559\u2013564. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30820-8_36","DOI":"10.1007\/978-3-031-30820-8_36"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Esen, Z., R\u00fcmmer, P.: Reasoning in the theory of heap: Satisfiability and interpolation. In: Fern\u00e1ndez, M. (ed.) Logic-Based Program Synthesis and Transformation - 30th International Symposium, LOPSTR 2020, Bologna, Italy, 7\u20139 September 2020, Proceedings. Lecture Notes in Computer Science, vol. 12561, pp. 173\u2013191. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-68446-4_9","DOI":"10.1007\/978-3-030-68446-4_9"},{"key":"4_CR14","unstructured":"Esen, Z., R\u00fcmmer, P.: An SMT-LIB theory of heaps. In: D\u00e9harbe, D., Hyv\u00e4rinen, A.E.J. (eds.) Proceedings of the 20th Internal Workshop on Satisfiability Modulo Theories co-located with the 11th International Joint Conference on Automated Reasoning (IJCAR 2022) part of the 8th Federated Logic Conference (FLoC 2022), Haifa, Israel, 11\u201312 August 2022. CEUR Workshop Proceedings, vol.\u00a03185, pp. 38\u201353. CEUR-WS.org (2022). https:\/\/ceur-ws.org\/Vol-3185\/paper1180.pdf"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Esen, Z., R\u00fcmmer, P.: Tricera: verifying C programs using the theory of heaps. In: Griggio, A., Rungta, N. (eds.) 22nd Formal Methods in Computer-Aided Design, FMCAD 2022, Trento, Italy, 17\u201321 October 2022, pp. 380\u2013391. IEEE (2022). https:\/\/doi.org\/10.34727\/2022\/isbn.978-3-85448-053-2_45","DOI":"10.34727\/2022\/isbn.978-3-85448-053-2_45"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Fedyukovich, G., Ahmad, M.B.S., Bod\u00edk, R.: Gradual synthesis for static parallelization of single-pass array-processing programs. In: Cohen, A., Vechev, M.T. (eds.) Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2017, Barcelona, Spain, 18\u201323 June 2017, pp. 572\u2013585. ACM (2017). https:\/\/doi.org\/10.1145\/3062341.3062382","DOI":"10.1145\/3062341.3062382"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Giet, J., Ridoux, F., Rival, X.: A product of shape and sequence abstractions. In: Hermenegildo, M.V., Morales, J.F. (eds.) Static Analysis - 30th International Symposium, SAS 2023, Cascais, Portugal, 22\u201324 October 2023, Proceedings. Lecture Notes in Computer Science, vol. 14284, pp. 310\u2013342. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-44245-2_15","DOI":"10.1007\/978-3-031-44245-2_15"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Gurfinkel, A., Kahsai, T., Komuravelli, A., Navas, J.A.: The SeaHorn verification framework. In: Kroening, D., Pasareanu, C.S. (eds.) Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, 18\u201324 July 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol.\u00a09206, pp. 343\u2013361. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21690-4_20","DOI":"10.1007\/978-3-319-21690-4_20"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Hojjat, H., R\u00fcmmer, P.: The ELDARICA Horn solver. In: Bj\u00f8rner, N., Gurfinkel, A. (eds.) 2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, 30 October\u20132 November 2018, pp.\u00a01\u20137. IEEE (2018). https:\/\/doi.org\/10.23919\/FMCAD.2018.8603013","DOI":"10.23919\/FMCAD.2018.8603013"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Hol\u00edk, L., Kotoun, M., Peringer, P., Sokov\u00e1, V., Trt\u00edk, M., Vojnar, T.: Predator shape analysis tool suite. In: Bloem, R., Arbel, E. (eds.) Hardware and Software: Verification and Testing - 12th International Haifa Verification Conference, HVC 2016, Haifa, Israel, 14\u201317 November 2016, Proceedings. Lecture Notes in Computer Science, vol. 10028, pp. 202\u2013209. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49052-6_13","DOI":"10.1007\/978-3-319-49052-6_13"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Hol\u00edk, L., Leng\u00e1l, O., Rogalewicz, A., Sim\u00e1cek, J., Vojnar, T.: Fully automated shape analysis based on forest automata. In: Sharygina, N., Veith, H. (eds.) Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, 13\u201319 July 2013. Proceedings. Lecture Notes in Computer Science, vol.\u00a08044, pp. 740\u2013755. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_52","DOI":"10.1007\/978-3-642-39799-8_52"},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/S10703-021-00366-4","volume":"57","author":"H Illous","year":"2021","unstructured":"Illous, H., Lemerre, M., Rival, X.: A relational shape abstract domain. Formal Methods Syst. Des. 57(3), 343\u2013400 (2021). https:\/\/doi.org\/10.1007\/S10703-021-00366-4","journal-title":"Formal Methods Syst. Des."},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Kahsai, T., Kersten, R., R\u00fcmmer, P., Sch\u00e4f, M.: Quantified heap invariants for object-oriented programs. In: Eiter, T., Sands, D. (eds.) LPAR-21, 21st International Conference on Logic for Programming, Artificial Intelligence and Reasoning, Maun, Botswana, 7\u201312 May 2017. EPiC Series in Computing, vol.\u00a046, pp. 368\u2013384. EasyChair (2017). https:\/\/doi.org\/10.29007\/zrct","DOI":"10.29007\/zrct"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Kahsai, T., R\u00fcmmer, P., Sanchez, H., Sch\u00e4f, M.: Jayhorn: a framework for verifying java programs. In: Chaudhuri, S., Farzan, A. (eds.) Computer Aided Verification - 28th International Conference, CAV 2016, Toronto, ON, Canada, 17\u201323 July 2016, Proceedings, Part I. Lecture Notes in Computer Science, vol.\u00a09779, pp. 352\u2013358. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41528-4_19","DOI":"10.1007\/978-3-319-41528-4_19"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Komuravelli, A., Gurfinkel, A., Chaki, S.: SMT-based model checking for recursive programs. In: Biere, A., Bloem, R. (eds.) Computer Aided Verification - 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, 18\u201322 July 2014. Proceedings. Lecture Notes in Computer Science, vol.\u00a08559, pp. 17\u201334. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08867-9_2","DOI":"10.1007\/978-3-319-08867-9_2"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Kuru, I., Gordon, C.S.: Safe deferred memory reclamation with types. In: Caires, L. (ed.) Programming Languages and Systems - 28th European Symposium on Programming, ESOP 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, 6\u201311 April 2019, Proceedings. Lecture Notes in Computer Science, vol. 11423, pp. 88\u2013116. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17184-1_4","DOI":"10.1007\/978-3-030-17184-1_4"},{"issue":"OOPSLA1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3527313","volume":"6","author":"J Li","year":"2022","unstructured":"Li, J., et al.: Linear types for large-scale systems verification. Proc. ACM Program. Lang. 6(OOPSLA1), 1\u201328 (2022). https:\/\/doi.org\/10.1145\/3527313","journal-title":"Proc. ACM Program. Lang."},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Matsushita, Y., Tsukada, T., Kobayashi, N.: Rusthorn: CHC-based verification for rust programs. In: M\u00fcller, P. (ed.) Programming Languages and Systems - 29th European Symposium on Programming, ESOP 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, 25\u201330 April 2020, Proceedings. Lecture Notes in Computer Science, vol. 12075, pp. 484\u2013514. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44914-8_18","DOI":"10.1007\/978-3-030-44914-8_18"},{"key":"4_CR29","unstructured":"McCarthy, J.: Towards a mathematical science of computation. In: Information Processing, Proceedings of the 2nd IFIP Congress 1962, Munich, Germany, 27 August\u20131 September 1962, pp. 21\u201328. North-Holland (1962)"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Nicole, O., Lemerre, M., Rival, X.: Lightweight shape analysis based on physical types. In: Finkbeiner, B., Wies, T. (eds.) Verification, Model Checking, and Abstract Interpretation - 23rd International Conference, VMCAI 2022, Philadelphia, PA, USA, 16\u201318 January 2022, Proceedings. Lecture Notes in Computer Science, vol. 13182, pp. 219\u2013241. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-94583-1_11","DOI":"10.1007\/978-3-030-94583-1_11"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Peringer, P., Sokov\u00e1, V., Vojnar, T.: PredatorHP revamped (not only) for interval-sized memory regions and memory reallocation (competition contribution). In: Biere, A., Parker, D. (eds.) Tools and Algorithms for the Construction and Analysis of Systems - 26th International Conference, TACAS 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Dublin, Ireland, 25\u201330 April 2020, Proceedings, Part II. Lecture Notes in Computer Science, vol. 12079, pp. 408\u2013412. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45237-7_30","DOI":"10.1007\/978-3-030-45237-7_30"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Podelski, A., Wies, T.: Boolean heaps. In: Hankin, C., Siveroni, I. (eds.) Static Analysis, 12th International Symposium, SAS 2005, London, UK, 7\u20139 September 2005, Proceedings. Lecture Notes in Computer Science, vol.\u00a03672, pp. 268\u2013283. Springer, Cham (2005). https:\/\/doi.org\/10.1007\/11547662_19","DOI":"10.1007\/11547662_19"},{"key":"4_CR33","doi-asserted-by":"publisher","unstructured":"Rondon, P.M., Kawaguchi, M., Jhala, R.: Liquid types. In: Gupta, R., Amarasinghe, S.P. (eds.) Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, Tucson, AZ, USA, 7\u201313 June 2008, pp. 159\u2013169. ACM (2008). https:\/\/doi.org\/10.1145\/1375581.1375602","DOI":"10.1145\/1375581.1375602"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Prabhu, S., Fedyukovich, G., Madhukar, K., D\u2019Souza, D.: Specification synthesis with constrained Horn clauses. In: Freund, S.N., Yahav, E. (eds.) PLDI 2021: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, Virtual Event, Canada, 20\u201325 June 2021, pp. 1203\u20131217. ACM (2021). https:\/\/doi.org\/10.1145\/3453483.3454104","DOI":"10.1145\/3453483.3454104"},{"issue":"3","key":"4_CR35","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/514188.514190","volume":"24","author":"S Sagiv","year":"2002","unstructured":"Sagiv, S., Reps, T.W., Wilhelm, R.: Parametric shape analysis via 3-valued logic. ACM Trans. Program. Lang. Syst. 24(3), 217\u2013298 (2002). https:\/\/doi.org\/10.1145\/514188.514190","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Tarski, A.: A lattice-theoretical fixpoint theorem and its applications. Pac. J. Math. 5(2), 285\u2013309 (1955). https:\/\/doi.org\/10.2140\/pjm.1955.5.285","DOI":"10.2140\/pjm.1955.5.285"},{"key":"4_CR37","doi-asserted-by":"publisher","unstructured":"Toubhans, A., Chang, B.E., Rival, X.: Reduced product combination of abstract domains for shapes. In: Giacobazzi, R., Berdine, J., Mastroeni, I. (eds.) Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013, Rome, Italy, 20\u201322 January 2013. Proceedings. Lecture Notes in Computer Science, vol.\u00a07737, pp. 375\u2013395. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-642-35873-9_23","DOI":"10.1007\/978-3-642-35873-9_23"},{"key":"4_CR38","doi-asserted-by":"publisher","unstructured":"Wesley, S., Christakis, M., Navas, J.A., Trefler, R.J., W\u00fcstholz, V., Gurfinkel, A.: Inductive predicate synthesis modulo programs. In: Aldrich, J., Salvaneschi, G. (eds.) 38th European Conference on Object-Oriented Programming, ECOOP 2024, 16\u201320 September 2024, Vienna, Austria. LIPIcs, vol.\u00a0313, pp. 43:1\u201343:30. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2024). https:\/\/doi.org\/10.4230\/LIPICS.ECOOP.2024.43","DOI":"10.4230\/LIPICS.ECOOP.2024.43"}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87054-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T03:59:11Z","timestamp":1742443151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87054-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031870538","9783031870545"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87054-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FSEN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamentals of Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"V\u00e4ster\u00e5s","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fsen2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/fsen-2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}