{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T19:10:06Z","timestamp":1746385806006,"version":"3.40.4"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115863"},{"type":"electronic","value":"9783319115870"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11587-0_1","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T06:27:47Z","timestamp":1411108067000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Playing with State-Based Models for Designing Better Algorithms"],"prefix":"10.1007","author":[{"given":"Dominique","family":"M\u00e9ry","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abrial, J.-R.: The B book - Assigning Programs to Meanings. Cambridge University Press (1996)","DOI":"10.1017\/CBO9780511624162"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Abrial, J.-R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press (2010)","DOI":"10.1017\/CBO9781139195881"},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s001650300002","volume":"14","author":"J.-R. Abrial","year":"2003","unstructured":"Abrial, J.-R., Cansell, D., M\u00e9ry, D.: A Mechanically Proved and Incremental Development of IEEE 1394 Tree Identify Protocol. Formal Aspects of Computing\u00a014(3), 215\u2013227 (2003), Article dans revue scientifique avec comit\u00e9 de lecture","journal-title":"Formal Aspects of Computing"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-38613-8_19","volume-title":"Integrated Formal Methods","author":"M.B. Andriamiarina","year":"2013","unstructured":"Andriamiarina, M.B., M\u00e9ry, D., Singh, N.K.: Integrating Proved State-Based Models for Constructing Correct Distributed Algorithms. In: Johnsen, E.B., Petre, L. (eds.) IFM 2013. LNCS, vol.\u00a07940, pp. 268\u2013284. Springer, Heidelberg (2013)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-662-43652-3_9","volume-title":"Abstract State Machines, Alloy, B, TLA, VDM, and Z","author":"M.B. Andriamiarina","year":"2014","unstructured":"Andriamiarina, M.B., M\u00e9ry, D., Singh, N.K.: Analysis of Self-\u22c6 and P2P Systems Using Refinement. In: Ait Ameur, Y., Schewe, K.-D. (eds.) ABZ 2014. LNCS, vol.\u00a08477, pp. 117\u2013123. Springer, Heidelberg (2014)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Andriamiarina, M.B., M\u00e9ry, D., Singh, N.K.: Revisiting Snapshot Algorithms by Refinement-based Techniques (Extended Version). Computer Science and Information Systems (2014)","DOI":"10.2298\/CSIS130122007A"},{"issue":"1","key":"1_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/0022-0000(81)90005-2","volume":"23","author":"R. Back","year":"1979","unstructured":"Back, R.: On correct refinement of programs. Journal of Computer and System Sciences\u00a023(1), 49\u201368 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/11955757_19","volume-title":"B 2007: Formal Specification and Development in B","author":"N. Bena\u00efssa","year":"2006","unstructured":"Bena\u00efssa, N., Cansell, D., M\u00e9ry, D.: Integration of security policy into system modeling. In: Julliand, J., Kouchnarenko, O. (eds.) B 2007. LNCS, vol.\u00a04355, pp. 232\u2013247. Springer, Heidelberg (2006)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-11486-1_24","volume-title":"Perspectives of Systems Informatics","author":"N. Benaissa","year":"2010","unstructured":"Benaissa, N., M\u00e9ry, D.: Cryptographic protocols analysis in Event-B. In: Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. LNCS, vol.\u00a05947, pp. 282\u2013293. Springer, Heidelberg (2010)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Bj\u00f8rner, D., Henson, M.C. (eds.): Logics of Specification Languages. EATCS Textbook in Computer Science. Springer (2007)","DOI":"10.1007\/978-3-540-74107-7"},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.tcs.2006.08.015","volume":"364","author":"D. Cansell","year":"2006","unstructured":"Cansell, D., M\u00e9ry, D.: Formal and incremental construction of distributed algorithms: On the distributed reference counting algorithm. Theor. Comput. Sci.\u00a0364(3), 318\u2013337 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Cansell, D., M\u00e9ry, D.: The Event-B Modelling Method: Concepts and Case Studies, pp. 33\u2013140. Springer (2007), See [10]","DOI":"10.1007\/978-3-540-74107-7_3"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/11955757_13","volume-title":"B 2007: Formal Specification and Development in B","author":"D. Cansell","year":"2006","unstructured":"Cansell, D., M\u00e9ry, D., Rehm, J.: Time Constraint Patterns for Event B Development. In: Julliand, J., Kouchnarenko, O. (eds.) B 2007. LNCS, vol.\u00a04355, pp. 140\u2013154. Springer, Heidelberg (2006)"},{"key":"1_CR14","unstructured":"Chandy, K.M., Misra, J.: Parallel Program Design A Foundation. Addison-Wesley Publishing Company (1988) ISBN 0-201-05866-9"},{"key":"1_CR15","unstructured":"Dijkstra, E.W.: A Discipline of Programming. Prentice-Hall (1976)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-73210-5_16","volume-title":"Integrated Formal Methods","author":"S. Hallerstede","year":"2007","unstructured":"Hallerstede, S., Hoang, T.S.: Qualitative probabilistic modelling in event-b. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol.\u00a04591, pp. 293\u2013312. Springer, Heidelberg (2007)"},{"issue":"3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1145\/177492.177726","volume":"16","author":"L. Lamport","year":"1994","unstructured":"Lamport, L.: A temporal logic of actions. Transactions on Programming Languages and Systems\u00a016(3), 872\u2013923 (1994)","journal-title":"Transactions on Programming Languages and Systems"},{"key":"1_CR18","unstructured":"Lamport, L.: Specifying Systems: The TLA\u2009+\u2009\u2009+ Language and Tools for Hardware and Software Engineers. Addison-Wesley (2002)"},{"issue":"2-3","key":"1_CR19","first-page":"197","volume":"3","author":"D. M\u00e9ry","year":"2009","unstructured":"M\u00e9ry, D.: Refinement-Based Guidelines for Algorithmic Systems. International Journal of Software and Informatics\u00a03(2-3), 197\u2013239 (2009)","journal-title":"International Journal of Software and Informatics"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-38613-8_15","volume-title":"Integrated Formal Methods","author":"D. M\u00e9ry","year":"2013","unstructured":"M\u00e9ry, D., Poppleton, M.: Formal Modelling and Verification of Population Protocols. In: Johnsen, E.B., Petre, L. (eds.) IFM 2013. LNCS, vol.\u00a07940, pp. 208\u2013222. Springer, Heidelberg (2013)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"M\u00e9ry, D., Rosemary, M.: Transforming EVENT B Models into Verified C# Implementations. In: Lisitsa, A., Nemytykh, A. (eds.) VPT 2013 - First International Workshop on Verification and Program Transformation, Saint Petersburg, Russie, F\u00e9d\u00e9ration De. EPIC, vol.\u00a016, pp. 57\u201373 (2013)","DOI":"10.29007\/9wm9"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-642-24550-3_30","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"D. M\u00e9ry","year":"2011","unstructured":"M\u00e9ry, D., Singh, N.K.: Analysis of DSR Protocol in Event-B. In: D\u00e9fago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol.\u00a06976, pp. 401\u2013415. Springer, Heidelberg (2011)"},{"key":"1_CR23","unstructured":"Morgan, C.: Programming from Specifications. Prentice Hall International Series in Computer Science. Prentice Hall (1990)"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/BF00268134","volume":"6","author":"S. Owicki","year":"1976","unstructured":"Owicki, S., Gries, D.: An axiomatic proof technique for parallel programs i. Acta Informatica\u00a06, 319\u2013340 (1976)","journal-title":"Acta Informatica"},{"key":"1_CR25","unstructured":"Tounsi, M., Mosbah, M., M\u00e9ry, D.: Proving Distributed Algorithms by Combining Refinement and Local Computations. Electronic Communications of the EASST\u00a035 (November 2011) ISSN 1863\u20132122"}],"container-title":["Lecture Notes in Computer Science","Model and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11587-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T18:29:07Z","timestamp":1746383347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11587-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115863","9783319115870"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11587-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}