{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:05:32Z","timestamp":1742983532910,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319216898"},{"type":"electronic","value":"9783319216904"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21690-4_7","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T02:08:27Z","timestamp":1436926107000},"page":"103-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Skipping Refinement"],"prefix":"10.1007","author":[{"given":"Mitesh","family":"Jain","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Manolios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"7_CR1","unstructured":"Results of hardware model checking competition (2013). \n                      http:\/\/fmv.jku.at\/hwmcc13\/hwmcc13.pdf"},{"key":"7_CR2","unstructured":"Skipping simulation model. \n                      http:\/\/www.ccs.neu.edu\/home\/jmitesh\/sks"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/3-540-44798-9_33","volume-title":"Correct Hardware Design and Verification Methods","author":"MD Aagaard","year":"2001","unstructured":"Aagaard, M.D., Cook, B., Day, N.A., Jones, R.B.: A framework for microprocessor correctness statements. In: Margaria, T., Melham, T.F. (eds.) CHARME 2001. LNCS, vol. 2144, p. 433. Springer, Heidelberg (2001)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11513988_29","volume-title":"Computer Aided Verification","author":"CW Barrett","year":"2005","unstructured":"Barrett, C.W., Fang, Y., Goldberg, B., Hu, Y., Pnueli, A., Zuck, L.D.: TVOC: a translation validator for optimizing compilers. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 291\u2013295. Springer, Heidelberg (2005)"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/0304-3975(88)90098-9","volume":"59","author":"MC Browne","year":"1988","unstructured":"Browne, M.C., Clarke, E.M., Gr\u00fcmberg, O.: Characterizing finite kripke structures in propositional temporal logic. Theor. Comput. Sci. 59, 115\u2013131 (1988)","journal-title":"Theor. Comput. Sci."},{"key":"7_CR6","unstructured":"Chamarthi, H., Manolios, P.: ACL2s homepage (2015). \n                      http:\/\/acl2s.ccs.neu.edu\/acl2s"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chamarthi, H.R., Dillinger, P.C., Manolios, P.: Data definitions in the ACL2 sedan. In: ACL2. ETPCS (2014)","DOI":"10.4204\/EPTCS.152.3"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-19835-9_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"HR Chamarthi","year":"2011","unstructured":"Chamarthi, H.R., Dillinger, P., Manolios, P., Vroon, D.: The ACL2 sedan theorem proving system. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 291\u2013295. Springer, Heidelberg (2011)"},{"key":"7_CR9","unstructured":"Dockins, R.W.: Operational refinement for compiler correctness. Ph.D. thesis, Princeton University (2012)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/BFb0039066","volume-title":"Theories of Concurrency: Unification and Extension","author":"RJ Glabbeek van","year":"1990","unstructured":"van Glabbeek, R.J.: The linear time - branching time spectrum. In: Baeten, J.C.M., Klop, J.W. (eds.) CONCUR 1990. LNCS, vol. 458, pp. 278\u2013297. Springer, Heidelberg (1990)"},{"key":"7_CR11","unstructured":"Hardin, D.S.: Real-time objects on the bare metal: an efficient hardware realization of the java tm virtual machine. In: ISORC (2001)"},{"key":"7_CR12","volume-title":"Information Processing","author":"L Lamport","year":"1983","unstructured":"Lamport, L.: What good is temporal logic. In: Mason, R.E.A. (ed.) Information Processing. IFIP, North-Holland (1983)"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","volume":"82","author":"L Lamport","year":"1991","unstructured":"Lamport, L., Abadi, M.: The existence of refinement mappings. Theor. Comput. Sci. 82, 253\u2013284 (1991)","journal-title":"Theor. Comput. Sci."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Leroy, X.: A formally verified compiler back-end. J. Autom. Reason. 43, 363\u2013446 (2009)","DOI":"10.1007\/s10817-009-9155-4"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1996.0060","volume":"128","author":"N Lynch","year":"1996","unstructured":"Lynch, N., Vaandrager, F.: Forward and backward simulations:II. timing-based systems. Inf. Comput. 128, 1\u201325 (1996)","journal-title":"Inf. Comput."},{"key":"7_CR16","unstructured":"Manolios, P.: Mechanical verification of reactive systems. Ph.D. thesis, University of Texas (2001)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-540-39724-3_28","volume-title":"Correct Hardware Design and Verification Methods","author":"P Manolios","year":"2003","unstructured":"Manolios, P.: A Compositional theory of refinement for branching time. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 304\u2013318. Springer, Heidelberg (2003)"},{"key":"7_CR18","unstructured":"Manolios, P., Srinivasan, S.K.: A computationally efficient method based on commitment refinement maps for verifying pipelined machines. In: MEMOCODE (2005)"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10817-006-9035-0","volume":"37","author":"P Manolios","year":"2006","unstructured":"Manolios, P., Srinivasan, S.K.: A framework for verifying bit-level pipelined machines based on automated deduction and decision procedures. J. Autom. Reason. 37, 93\u2013116 (2006)","journal-title":"J. Autom. Reason."},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-540-73368-3_35","volume-title":"Computer Aided Verification","author":"P Manolios","year":"2007","unstructured":"Manolios, P., Srinivasan, S.K., Vroon, D.: BAT: the bit-level analysis tool. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 303\u2013306. Springer, Heidelberg (2007)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-38856-9_17","volume-title":"Static Analysis","author":"KS Namjoshi","year":"2013","unstructured":"Namjoshi, K.S., Zuck, L.D.: Witnessing program transformations. In: Logozzo, F., F\u00e4hndrich, M. (eds.) Static Analysis. LNCS, vol. 7935, pp. 304\u2013323. Springer, Heidelberg (2013)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/BFb0015727","volume-title":"Automata Languages and Programming","author":"A Pnueli","year":"1985","unstructured":"Pnueli, A.: Linear and branching structures in the semantics and logics of reactive systems. In: Brauer, W. (ed.) Automata Languages and Programming. LNCS, vol. 194, pp. 15\u201332. Springer, Heidelberg (1985)"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21690-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T20:04:27Z","timestamp":1563825867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21690-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319216898","9783319216904"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21690-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}