{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:45:01Z","timestamp":1757454301485,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319192482"},{"type":"electronic","value":"9783319192499"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19249-9_27","type":"book-chapter","created":{"date-parts":[[2015,5,23]],"date-time":"2015-05-23T07:55:31Z","timestamp":1432367731000},"page":"435-452","source":"Crossref","is-referenced-by-count":6,"title":["Counterexamples for Expected Rewards"],"prefix":"10.1007","author":[{"given":"Tim","family":"Quatmann","sequence":"first","affiliation":[]},{"given":"Nils","family":"Jansen","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Dehnert","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Wimmer","sequence":"additional","affiliation":[]},{"given":"Erika","family":"\u00c1brah\u00e1m","sequence":"additional","affiliation":[]},{"given":"Joost-Pieter","family":"Katoen","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Becker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Clarke, E.M.: The birth of model checking. In: Grumberg, O., Veith, H. (eds.) 25MC Festschrift 2008. LNCS, vol.\u00a05000, pp. 1\u201326. Springer, Heidelberg (2008)"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M. Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: Verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol.\u00a06806, pp. 585\u2013591. Springer, Heidelberg (2011)"},{"issue":"10","key":"27_CR3","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1109\/TCAD.2005.852033","volume":"24","author":"G. Norman","year":"2005","unstructured":"Norman, G., Parker, D., Kwiatkowska, M.Z., Shukla, S.K.: Evaluating the reliability of NAND multiplexing with PRISM. IEEE Trans. on CAD of Integrated Circuits and Systems\u00a024(10), 1629\u20131637 (2005)","journal-title":"IEEE Trans. on CAD of Integrated Circuits and Systems"},{"issue":"6","key":"27_CR4","doi-asserted-by":"crossref","first-page":"561","DOI":"10.3233\/JCS-2006-14604","volume":"14","author":"G. Norman","year":"2006","unstructured":"Norman, G., Shmatikov, V.: Analysis of probabilistic contract signing. Journal of Computer Security\u00a014(6), 561\u2013589 (2006)","journal-title":"Journal of Computer Security"},{"issue":"4","key":"27_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1364644.1364651","volume":"35","author":"M.Z. Kwiatkowska","year":"2008","unstructured":"Kwiatkowska, M.Z., Norman, G., Parker, D.: Using probabilistic model checking in systems biology. SIGMETRICS Performance Evaluation Review\u00a035(4), 14\u201321 (2008)","journal-title":"SIGMETRICS Performance Evaluation Review"},{"issue":"1","key":"27_CR6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/2728816.2728827","volume":"2","author":"R. Alur","year":"2015","unstructured":"Alur, R., Henzinger, T., Vardi, M.: Theory in practice for system design and verification. ACM Siglog News\u00a02(1), 46\u201351 (2015)","journal-title":"ACM Siglog News"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/11561163_8","volume-title":"Formal Methods for Components and Objects","author":"G. Behrmann","year":"2005","unstructured":"Behrmann, G., Larsen, K.G., Rasmussen, J.I.: Priced timed automata: Algorithms and applications. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2004. LNCS, vol.\u00a03657, pp. 162\u2013182. Springer, Heidelberg (2005)"},{"key":"27_CR8","unstructured":"Chatterjee, K., Doyen, L., Henzinger, T.A., Raskin, J.F.: Generalized Mean-payoff and Energy Games. In: Proc. of FSTTCS. LIPIcs, vol.\u00a08, pp. 505\u2013516. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik (2010)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Boker, U., Henzinger, T.A., Radhakrishna, A.: Battery transition systems. In: Proc. of POPL, pp. 595\u2013606. ACM Press (2014)","DOI":"10.1145\/2578855.2535875"},{"key":"27_CR10","unstructured":"Howard, R.A.: Dynamic Probabilistic Systems; Volume I: Markov models. John Wiley & Sons (1971)"},{"issue":"4","key":"27_CR11","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1017\/S0960129512000254","volume":"23","author":"C. Baier","year":"2013","unstructured":"Baier, C., Hahn, E.M., Haverkort, B.R., Hermanns, H., Katoen, J.P.: Model checking for performability. Mathematical Structures in Computer Science\u00a023(4), 751\u2013795 (2013)","journal-title":"Mathematical Structures in Computer Science"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-40903-8_8","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"S. Andova","year":"2004","unstructured":"Andova, S., Hermanns, H., Katoen, J.P.: Discrete-time rewards model-checked. In: Larsen, K.G., Niebert, P. (eds.) FORMATS 2003. LNCS, vol.\u00a02791, pp. 88\u2013104. Springer, Heidelberg (2004)"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-07317-0_3","volume-title":"Formal Methods for Executable Software Models","author":"E. \u00c1brah\u00e1m","year":"2014","unstructured":"\u00c1brah\u00e1m, E., Becker, B., Dehnert, C., Jansen, N., Katoen, J.-P., Wimmer, R.: Counterexample generation for discrete-time Markov models: An introductory survey. In: Bernardo, M., Damiani, F., H\u00e4hnle, R., Johnsen, E.B., Schaefer, I. (eds.) SFM 2014. LNCS, vol.\u00a08483, pp. 65\u2013121. Springer, Heidelberg (2014)"},{"issue":"1","key":"27_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TSE.2009.57","volume":"36","author":"H. Aljazzar","year":"2010","unstructured":"Aljazzar, H., Leue, S.: Directed explicit state-space search in the generation of counterexamples for stochastic model checking. IEEE Trans. on Software Engineering\u00a036(1), 37\u201360 (2010)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-24372-1_33","volume-title":"Automated Technology for Verification and Analysis","author":"N. Jansen","year":"2011","unstructured":"Jansen, N., \u00c1brah\u00e1m, E., Katelaan, J., Wimmer, R., Katoen, J.-P., Becker, B.: Hierarchical counterexamples for discrete-time Markov chains. In: Bultan, T., Hsiung, P.-A. (eds.) ATVA 2011. LNCS, vol.\u00a06996, pp. 443\u2013452. Springer, Heidelberg (2011)"},{"key":"27_CR16","unstructured":"Gurobi Optimization, Inc.: Gurobi optimizer reference manual (2013), \n                        http:\/\/www.gurobi.com"},{"key":"27_CR17","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking. The MIT Press (2008)"},{"key":"27_CR18","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman & Co Ltd. (1979)"},{"key":"27_CR19","unstructured":"Schrijver, A.: Theory of Linear and Integer Programming. Wiley (1986)"},{"issue":"2","key":"27_CR20","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TSE.2009.5","volume":"35","author":"T. Han","year":"2009","unstructured":"Han, T., Katoen, J.P., Damman, B.: Counterexample generation in probabilistic model checking. IEEE Trans. on Software Engineering\u00a035(2), 241\u2013257 (2009)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.tcs.2014.06.020","volume":"549","author":"R. Wimmer","year":"2014","unstructured":"Wimmer, R., Jansen, N., \u00c1brah\u00e1m, E., Katoen, J.P., Becker, B.: Minimal counterexamples for linear-time probabilistic verification. Theoretical Computer Science\u00a0549, 61\u2013100 (2014)","journal-title":"Theoretical Computer Science"},{"issue":"1","key":"27_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Trans. on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Trans. on Information and System Security"},{"issue":"2","key":"27_CR23","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/0020-0190(90)90107-9","volume":"35","author":"T. Herman","year":"1990","unstructured":"Herman, T.: Probabilistic self-stabilization. Information Processing Letters\u00a035(2), 63\u201367 (1990)","journal-title":"Information Processing Letters"},{"issue":"6","key":"27_CR24","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM\u00a028(6), 637\u2013647 (1985)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","FM 2015: Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19249-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T09:03:28Z","timestamp":1676451808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19249-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319192482","9783319192499"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19249-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}