{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:54:53Z","timestamp":1725803693609},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105567"},{"type":"electronic","value":"9783319105574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10557-4_3","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T08:12:24Z","timestamp":1409127144000},"page":"11-18","source":"Crossref","is-referenced-by-count":0,"title":["Safety Verification of Multiple Autonomous Systems by Formal Approach"],"prefix":"10.1007","author":[{"given":"Kozo","family":"Okano","sequence":"first","affiliation":[]},{"given":"Toshifusa","family":"Sekizawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"3_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R. Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Journal of Theoretical Computer Science\u00a0126(2), 183\u2013235 (1994)","journal-title":"Journal of Theoretical Computer Science"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-27755-2_3","volume-title":"Lectures on Concurrency and Petri Nets","author":"J. Bengtsson","year":"2004","unstructured":"Bengtsson, J., Yi, W.: Timed Automata: Semantics, Algorithms and Tools. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) ACPN 2003. LNCS, vol.\u00a03098, pp. 87\u2013124. Springer, Heidelberg (2004)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-61474-5_73","volume-title":"Computer Aided Verification","author":"J. Bengtsson","year":"1996","unstructured":"Bengtsson, J., Griffioen, W.O.D., Kristoffersen, K.J., Larsen, K.G., Larsson, F., Pettersson, P., Yi, W.: Verification of an Audio Protocol with bus collision using UPPAAL. In: Alur, R., Henzinger, T.A. (eds.) CAV 1996. LNCS, vol.\u00a01102, pp. 244\u2013256. Springer, Heidelberg (1996)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/BFb0054178","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M. Lindahl","year":"1998","unstructured":"Lindahl, M., Pettersson, P., Yi, W.: Formal Design and Analysis of a Gear Controller. In: Steffen, B. (ed.) TACAS 1998. LNCS, vol.\u00a01384, pp. 281\u2013297. Springer, Heidelberg (1998)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-39893-6_30","volume-title":"Formal Methods and Software Engineering","author":"B. Bordbar","year":"2003","unstructured":"Bordbar, B., Okano, K.: Verification of Timeliness QoS Properties in Multimedia Systems. In: Dong, J.S., Woodcock, J. (eds.) ICFEM 2003. LNCS, vol.\u00a02885, pp. 523\u2013540. Springer, Heidelberg (2003)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-642-16265-7_2","volume-title":"Integrated Formal Methods","author":"J. Fitzgerald","year":"2010","unstructured":"Fitzgerald, J., Larsen, P.G., Pierce, K., Verhoef, M., Wolff, S.: Collaborative Modelling and Co-simulation in the Development of Dependable Embedded Systems. In: M\u00e9ry, D., Merz, S. (eds.) IFM 2010. LNCS, vol.\u00a06396, pp. 12\u201326. Springer, Heidelberg (2010)"},{"key":"3_CR7","unstructured":"LeJOS, Java for LEGO Mindstorms, \n                    \n                      http:\/\/lejos.sourceforge.net"},{"issue":"3","key":"3_CR8","first-page":"147","volume":"5","author":"K. Okano","year":"2013","unstructured":"Okano, K., Sekizawa, T., Shimba, H., Kawai, H., Hanada, K., Sasaki, Y., Kusumoto, S.: Verification of Safety Properties of a Program for Line Tracing Robot using a Timed Automaton Model. International Journal of Informatics Society\u00a05(3), 147\u2013155 (2013)","journal-title":"International Journal of Informatics Society"},{"key":"3_CR9","unstructured":"Magee, J., Kramer, J.: Concurrency: State Models and Java Programs, 2nd edn. John Wiley and Sons (April 2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10557-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T00:36:14Z","timestamp":1548894974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10557-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319105567","9783319105574"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10557-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}