{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:13:46Z","timestamp":1743048826254,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319175805"},{"type":"electronic","value":"9783319175812"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17581-2_6","type":"book-chapter","created":{"date-parts":[[2015,4,15]],"date-time":"2015-04-15T12:22:36Z","timestamp":1429100556000},"page":"76-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Normalized Form for FIFO Protocols Traces, Application to the Replay of Mode-based Protocols"],"prefix":"10.1007","author":[{"given":"Mamoun","family":"Filali","sequence":"first","affiliation":[]},{"given":"Meriem","family":"Ouederni","sequence":"additional","affiliation":[]},{"given":"Jean-Baptiste","family":"Raclet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,16]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Armstrong, J.: Getting Erlang to talk to the outside world. In: Proceedings of the 2002 ACM SIGPLAN Workshop on Erlang, ERLANG 2002, pp. 64\u201372. ACM, New York (2002)","DOI":"10.1145\/592849.592858"},{"key":"6_CR2","volume-title":"Finite Transition Systems - Semantics of Communicating Systems","author":"A Arnold","year":"1994","unstructured":"Arnold, A.: Finite Transition Systems - Semantics of Communicating Systems. Prentice Hall, Upper Saddle River (1994)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Basu, S., Bultan, T., Ouederni, M.: Deciding choreography realizability. In: Field, J., Hicks, M.(eds.) POPL, pp. 191\u2013202. ACM (2012)","DOI":"10.1145\/2103621.2103680"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Biswas, D., Gazagnaire, T., Genest, B.: Small logs for transactional services: Distinction is much more accurate than (positive) discrimination. In: HASE, pp. 97\u2013106. IEEE Computer Society (2008)","DOI":"10.1109\/HASE.2008.24"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.ic.2005.11.007","volume":"205","author":"A Bouajjani","year":"2007","unstructured":"Bouajjani, A., Muscholl, A., Touili, T.: Permutation rewriting and algorithmic verification. Inf. Comput. 205(2), 199\u2013224 (2007)","journal-title":"Inf. Comput."},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D Brand","year":"1983","unstructured":"Brand, D., Zafiropulo, P.: On communicating finite-state machines. J. ACM 30(2), 323\u2013342 (1983)","journal-title":"J. ACM"},{"key":"6_CR7","volume-title":"Parallel Program Design","author":"K Chandy","year":"1988","unstructured":"Chandy, K., Misra, J.: Parallel Program Design. Addison-Wesley, Reading (1988)"},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/0890-5401(87)90040-X","volume":"73","author":"M Clerbout","year":"1987","unstructured":"Clerbout, M., Latteux, M.: Semi-commutations. Inf. Comput. 73(1), 59\u201374 (1987)","journal-title":"Inf. Comput."},{"volume-title":"The Book of Traces","year":"1995","key":"6_CR9","unstructured":"Diekert, V., Rozenberg, G. (eds.): The Book of Traces. World Scientific, Singapore (1995)"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0020-0190(80)90021-6","volume":"11","author":"E Dijkstra","year":"1980","unstructured":"Dijkstra, E., Scholten, C.: Termination detection for diffusing computations. Inf. Process. Lett. 11(1), 1\u20134 (1980)","journal-title":"Inf. Process. Lett."},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/1218063.1217953","volume":"40","author":"M F\u00e4hndrich","year":"2006","unstructured":"F\u00e4hndrich, M., Aiken, M., Hawblitzel, C., Hodson, O., Hunt, G., Larus, J.R., Levi, S.: Language support for fast and reliable message-based communication in singularity OS. SIGOPS Oper. Syst. Rev. 40(4), 177\u2013190 (2006)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"6_CR12","volume-title":"Distributed Algorithms: An Intuitive Approach","author":"W Fokkink","year":"2013","unstructured":"Fokkink, W.: Distributed Algorithms: An Intuitive Approach. MIT Press, Cambridge (2013)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-16612-9_21","volume-title":"Runtime Verification","author":"G G\u00f6\u00dfler","year":"2010","unstructured":"G\u00f6\u00dfler, G., Le M\u00e9tayer, D., Raclet, J.-B.: Causality analysis in contract violation. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 270\u2013284. Springer, Heidelberg (2010)"},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s004460050003","volume":"13","author":"J-M H\u00e9lary","year":"2000","unstructured":"H\u00e9lary, J.-M., Most\u00e9faoui, A., Netzer, R.H.B., Raynal, M.: Communication-based prevention of useless checkpoints in fistributed computations. Distrib. Comput. 13(1), 29\u201343 (2000)","journal-title":"Distrib. Comput."},{"key":"6_CR15","unstructured":"Java message service. http:\/\/www.oracle.com\/technetwork\/java\/index-jsp-142945.html"},{"issue":"7","key":"6_CR16","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks and the ordering of events in a distributed system. CACM 21(7), 558\u2013565 (1978)","journal-title":"CACM"},{"key":"6_CR17","volume-title":"Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers","author":"L Lamport","year":"2002","unstructured":"Lamport, L.: Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers. Addison-Wesley Longman Publishing Co. Inc, Boston (2002)"},{"issue":"1\u20132","key":"6_CR18","first-page":"7","volume":"5","author":"L Lamport","year":"2011","unstructured":"Lamport, L.: Euclid writes an algorithm: a fairytale. Int. J. Softw. Inf. 5(1\u20132), 7\u201320 (2011)","journal-title":"Int. J. Softw. Inf."},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-71156-8_1","volume-title":"Reliable Systems on Unreliable Networked Platforms","author":"EA Lee","year":"2007","unstructured":"Lee, E.A., Zhao, Y.: Reinventing computing for real time. In: Kordon, F., Sztipanovits, J. (eds.) Monterey Workshop 2005. LNCS, vol. 4322, pp. 1\u201325. Springer, Heidelberg (2007)"},{"issue":"5","key":"6_CR20","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebr. Program. 78(5), 293\u2013303 (2009)","journal-title":"J. Log. Algebr. Program."},{"key":"6_CR21","volume-title":"Distributed Algorithms","author":"NA Lynch","year":"1996","unstructured":"Lynch, N.A.: Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco (1996)"},{"key":"6_CR22","first-page":"361","volume":"2","author":"G von Bochmann","year":"1978","unstructured":"von Bochmann, G.: Finite state description of communication protocols. Comput. Netw. 2, 361\u2013372 (1978)","journal-title":"Comput. Netw."}],"container-title":["Communications in Computer and Information Science","Formal Techniques for Safety-Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17581-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:45:54Z","timestamp":1676936754000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17581-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319175805","9783319175812"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17581-2_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}