{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:40:55Z","timestamp":1743028855958,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319214009"},{"type":"electronic","value":"9783319214016"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21401-6_17","type":"book-chapter","created":{"date-parts":[[2015,7,24]],"date-time":"2015-07-24T10:13:46Z","timestamp":1437732826000},"page":"256-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle\/HOL and Z3"],"prefix":"10.1007","author":[{"given":"Filip","family":"Mari\u0107","sequence":"first","affiliation":[]},{"given":"Predrag","family":"Jani\u010di\u0107","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Malikovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,25]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-25379-9_12","volume-title":"Certified Programs and Proofs","author":"M Armand","year":"2011","unstructured":"Armand, M., Faure, G., Gr\u00e9goire, B., Keller, C., Th\u00e9ry, L., Werner, B.: A modular integration of SAT\/SMT solvers to coq through proof witnesses. In: Jouannaud, J.-P., Shao, Z. (eds.) CPP 2011. LNCS, vol. 7086, pp. 135\u2013150. Springer, Heidelberg (2011)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/11812289_4","volume-title":"Mathematical Knowledge Management","author":"C Ballarin","year":"2006","unstructured":"Ballarin, C.: Interpretation of locales in isabelle: theories and proof contexts. In: Borwein, J.M., Farmer, W.M. (eds.) MKM 2006. LNCS (LNAI), vol. 4108, pp. 31\u201343. Springer, Heidelberg (2006)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-14052-5_14","volume-title":"Interactive Theorem Proving","author":"S B\u00f6hme","year":"2010","unstructured":"B\u00f6hme, S., Weber, T.: Fast LCF-style proof reconstruction for Z3. In: Kaufmann, M., Paulson, L.C. (eds.) ITP 2010. LNCS, vol. 6172, pp. 179\u2013194. Springer, Heidelberg (2010)"},{"issue":"5","key":"17_CR4","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/0020-0190(78)90004-2","volume":"7","author":"I Bratko","year":"1978","unstructured":"Bratko, I.: Proving correctness of strategies in the AL1 assertional language. Inform. Process. Lett. 7(5), 223\u2013230 (1978)","journal-title":"Inform. Process. Lett."},{"key":"17_CR5","unstructured":"Edelkamp, S.: Symbolic exploration in two-player games: preliminary results. In: AIPS 2002 Workshop on Planning via Model-Checking (2002)"},{"key":"17_CR6","unstructured":"FIDE. The FIDE Handbook, chapter E.I. The Laws of Chess (2004). Available for download from the FIDE website"},{"key":"17_CR7","unstructured":"Hurd, J.: Formal verification of chess endgame databases. In: Theorem Proving in Higher Order Logics: Emerging Trends, Oxford University CLR Report (2005)"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-12993-3_20","volume-title":"Advances in Computer Games","author":"J Hurd","year":"2010","unstructured":"Hurd, J., Haworth, G.: Data assurance in opaque computations. In: van den Herik, H.J., Spronck, P. (eds.) ACG 2009. LNCS, vol. 6048, pp. 221\u2013231. Springer, Heidelberg (2010)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Jani\u010di\u0107, P.: URSA: a system for uniform reduction to SAT. Logical Methods Comput. Sci. 8(3:30) (2012)","DOI":"10.2168\/LMCS-8(3:30)2012"},{"issue":"2","key":"17_CR10","doi-asserted-by":"crossref","first-page":"81","DOI":"10.3233\/ICG-2013-36203","volume":"36","author":"M Malikovi\u0107","year":"2013","unstructured":"Malikovi\u0107, M., Jani\u010di\u0107, P.: Proving correctness of a KRK chess endgame strategy by SAT-based constraint solving. ICGA J. 36(2), 81\u201399 (2013)","journal-title":"ICGA J."},{"issue":"1","key":"17_CR11","first-page":"59","volume":"5","author":"M Malikovi\u0107","year":"2010","unstructured":"Malikovi\u0107, M., \u010cubrilo, M.: What were the last moves? Int. Rev. Comput. Softw. 5(1), 59\u201370 (2010)","journal-title":"Int. Rev. Comput. Softw."},{"key":"17_CR12","unstructured":"Malikovi\u0107, M., \u010cubrilo, M., Jani\u010di\u0107, P.: Formalization of a strategy for the KRK chess endgame. In: Conference on Information and Intelligent Systems (2012)"},{"issue":"3","key":"17_CR13","first-page":"131","volume":"9","author":"K Thompson","year":"1986","unstructured":"Thompson, K.: Retrograde analysis of certain endgames. ICCA J. 9(3), 131\u2013139 (1986)","journal-title":"ICCA J."}],"container-title":["Lecture Notes in Computer Science","Automated Deduction - CADE-25"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21401-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T13:26:14Z","timestamp":1676467574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21401-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319214009","9783319214016"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21401-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}