{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:56:10Z","timestamp":1767848170179,"version":"3.49.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319259413","type":"print"},{"value":"9783319259420","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25942-0_3","type":"book-chapter","created":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T09:32:14Z","timestamp":1444987934000},"page":"35-51","source":"Crossref","is-referenced-by-count":12,"title":["A Comparative Study of BDD Packages for\u00a0Probabilistic Symbolic Model Checking"],"prefix":"10.1007","author":[{"given":"Tom","family":"van Dijk","sequence":"first","affiliation":[]},{"given":"Ernst Moritz","family":"Hahn","sequence":"additional","affiliation":[]},{"given":"David N.","family":"Jansen","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Neele","sequence":"additional","affiliation":[]},{"given":"Mari\u00eblle","family":"Stoelinga","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Turrini","sequence":"additional","affiliation":[]},{"given":"Lijun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TC.1978.1675141","volume":"27","author":"SB Akers","year":"1978","unstructured":"Akers, S.B.: Binary decision diagrams. IEEE Trans. on Computers 27, 509\u2013516 (1978)","journal-title":"IEEE Trans. on Computers"},{"key":"3_CR2","unstructured":"Andersen, H.R.: An introduction to binary decision diagrams. Course Notes on the WWW (1997)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Babar, J., Miner, A.: Meddly: Multi-terminal and edge-valued decision diagram library. In: QEST, pp. 195\u2013196. IEEE Comp. Soc., Los Alamitos (2010)","DOI":"10.1109\/QEST.2010.34"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bahar, R.I., Frohm, E.A., Gaona, C.M., Hachtel, G.D., Macii, E., Pardo, A., Somenzi, F.: Algebraic decision diagrams and their applications. In: ICCAD, pp. 188\u2013191. IEEE Comp. Soc., Los Alamitos (1993)","DOI":"10.1109\/ICCAD.1993.580054"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Baier, C., Clarke, E.M., Hartonas-Garmhausen, V., Kwiatkowska, M., Ryan, M.: Symbolic model checking for probabilistic processes. In: Degano, P., Gorrieri, R., Marchetti-Spaccamela, A. (eds.) ICALP 1997. LNCS, vol. 1256, pp. 430\u2013440. Springer, Heidelberg (1997)","DOI":"10.1007\/3-540-63165-8_199"},{"issue":"4","key":"3_CR6","first-page":"751","volume":"23","author":"C Baier","year":"2013","unstructured":"Baier, C., Hahn, E.M., Haverkort, B.R., Hermanns, H., Katoen, J.-P.: Model checking for performability. MSCS 23(4), 751\u2013795 (2013)","journal-title":"MSCS"},{"key":"3_CR7","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.-P.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"key":"3_CR8","unstructured":"Biere, A.: ABCD. http:\/\/fmv.jku.at\/abcd\/"},{"issue":"8","key":"3_CR9","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"100","author":"RE Bryant","year":"1986","unstructured":"Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Trans. on Computers 100(8), 677\u2013691 (1986)","journal-title":"IEEE Trans. on Computers"},{"issue":"2","key":"3_CR10","first-page":"142","volume":"98","author":"J Burch","year":"1992","unstructured":"Burch, J., Clarke, E., McMillan, K., Dill, D., Hwang, L.: Symbolic model checking: $$10^{20}$$ states and beyond. I&C 98(2), 142\u2013170 (1992)","journal-title":"I&C"},{"issue":"1","key":"3_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. of Cryptology 1(1), 65\u201375 (1988)","journal-title":"J. of Cryptology"},{"key":"3_CR12","unstructured":"Clarke, E.M., Fujita, M., McGeer, P.C., McMillan, K., Yang, J. C.-Y., Zhao, X.: Multi-terminal binary decision diagrams: An efficient data structure for matrix representation. In: IWLS (1993). http:\/\/repository.cmu.edu\/compsci\/453"},{"key":"3_CR13","unstructured":"Cohen, H., Whaley, J., Wildt, J., Gorogiannis, N.: BuDDy. http:\/\/sourceforge.net\/p\/buddy\/"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-46419-0_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L Alfaro de","year":"2000","unstructured":"de Alfaro, L., Kwiatkowska, M., Norman, G., Parker, D., Segala, R.: Symbolic model checking of probabilistic processes using MTBDDs and the Kronecker representation. In: Graf, S. (ed.) TACAS 2000. LNCS, vol. 1785, pp. 395\u2013410. Springer, Heidelberg (2000)"},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s00446-003-0102-z","volume":"17","author":"M Duflot","year":"2004","unstructured":"Duflot, M., Fribourg, L., Picaronny, C.: Randomized dining philosophers without fairness assumption. Distributed Computing 17(1), 65\u201376 (2004)","journal-title":"Distributed Computing"},{"issue":"2\u20133","key":"3_CR16","first-page":"149","volume":"10","author":"M Fujita","year":"1997","unstructured":"Fujita, M., McGeer, P.C., Yang, J.C.-Y.: Multi-terminal binary decision diagrams: An efficient data structure for matrix representation. FMSD 10(2\u20133), 149\u2013169 (1997)","journal-title":"FMSD"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-319-06410-9_22","volume-title":"FM 2014: Formal Methods","author":"EM Hahn","year":"2014","unstructured":"Hahn, E.M., Li, Y., Schewe, S., Turrini, A., Zhang, L.: IscasMC: a web-based probabilistic model checker. In: Jones, C., Pihlajasaari, P., Sun, J. (eds.) FM 2014. LNCS, vol. 8442, pp. 312\u2013317. Springer, Heidelberg (2014)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Haverkort, B.R., Hermanns, H., Katoen, J.-P.: On the use of model checking techniques for dependability evaluation. In: SRDS, pp. 228\u2013237 (2000)","DOI":"10.1109\/RELDI.2000.885410"},{"issue":"1\u20132","key":"3_CR19","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/S1567-8326(02)00066-8","volume":"56","author":"H Hermanns","year":"2003","unstructured":"Hermanns, H., Kwiatkowska, M., Norman, G., Parker, D., Siegle, M.: On the use of MTBDDs for performability analysis and verification of stochastic systems. J. of Logic and Algebraic Programming 56(1\u20132), 23\u201367 (2003)","journal-title":"J. of Logic and Algebraic Programming"},{"key":"3_CR20","unstructured":"IEEE 802.3-2002. Carrier Sense Multiple Access with Collision Detection (CSMA\/CD) Standard (2002)"},{"issue":"1","key":"3_CR21","first-page":"60","volume":"88","author":"A Itai","year":"1990","unstructured":"Itai, A., Rodeh, M.: Symmetry breaking in distributed networks. I&C 88(1), 60\u201387 (1990)","journal-title":"I&C"},{"key":"3_CR22","unstructured":"Janssen, G.: The Eindhoven BDD package. ftp:\/\/ftp.ics.ele.tue.nl\/pub\/users\/geert\/bdd.tar.gz"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011)"},{"issue":"4","key":"3_CR24","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1002\/j.1538-7305.1959.tb01585.x","volume":"38","author":"CY Lee","year":"1959","unstructured":"Lee, C.Y.: Representation of switching circuits by binary-decision programs. Bell System Technical Journal 38(4), 985\u2013999 (1959)","journal-title":"Bell System Technical Journal"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-319-10431-7_4","volume-title":"Software Engineering and Formal Methods","author":"A Lovato","year":"2014","unstructured":"Lovato, A., Macedonio, D., Spoto, F.: A thread-safe library for binary decision diagrams. In: Giannakopoulou, D., Sala\u00fcn, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 35\u201349. Springer, Heidelberg (2014)"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-39799-8_15","volume-title":"Computer Aided Verification","author":"G Lv","year":"2013","unstructured":"Lv, G., Su, K., Xu, Y.: CacBDD: A BDD package with dynamic cache management. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 229\u2013234. Springer, Heidelberg (2013)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"McMillan, K.L.: Symbolic model checking. Springer (1993)","DOI":"10.1007\/978-1-4615-3190-6"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Meolic, R.: Biddy a multi-platform academic bdd package. J. of Software, 7(6) (2012)","DOI":"10.4304\/jsw.7.6.1358-1366"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/3-540-49519-3_32","volume-title":"Formal Methods in Computer-Aided Design","author":"K Milvang-Jensen","year":"1998","unstructured":"Milvang-Jensen, K., Hu, A.J.: BDDNOW: a parallel BDD package. In: Gopalakrishnan, G.C., Windley, P. (eds.) FMCAD 1998. LNCS, vol. 1522, pp. 501\u2013507. Springer, Heidelberg (1998)"},{"key":"3_CR30","unstructured":"Model Checking Group at Carnegie Mellon University: BDD. http:\/\/www.cs.cmu.edu\/ modelcheck\/bdd.html"},{"key":"3_CR31","unstructured":"PRISM web site. http:\/\/www.prismmodelchecker.org"},{"key":"3_CR32","unstructured":"Ranjan, R.K., Sanghavi, J..: CAL BDD. http:\/\/embedded.eecs.berkeley.edu\/Research\/cal_bdd\/"},{"key":"3_CR33","unstructured":"Somenzi, F.: CUDD: CU decision diagram package release 2.5.0. http:\/\/vlsi.colorado.edu\/ fabio\/CUDD\/"},{"key":"3_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-48778-6_4","volume-title":"Formal Methods for Real-Time and Probabilistic Systems","author":"M Stoelinga","year":"1999","unstructured":"Stoelinga, M., Vaandrager, F.W.: Root contention in IEEE 1394. In: Katoen, J.-P. (ed.) AMAST-ARTS 1999, ARTS 1999, and AMAST-WS 1999. LNCS, vol. 1601, pp. 53\u201374. Springer, Heidelberg (1999)"},{"key":"3_CR35","unstructured":"Vahidi, A.: JDD, a pure Java BDD and Z-BDD library. http:\/\/javaddlib.sourceforge.net\/jdd\/"},{"key":"3_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1007\/978-3-662-46681-0_60","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T Dijk van","year":"2015","unstructured":"van Dijk, T., van de Pol, J.: Sylvan: multi-core decision diagrams. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 677\u2013691. Springer, Heidelberg (2015)"},{"key":"3_CR37","unstructured":"Yang, B., Chen, Y., Bryant, R.E., O\u2019Hallaron, D.R.: Space- and time-efficient BDD construction via working set control. In: ASP-DAC, pp. 423\u2013432, IEEE, Piscataway (1998)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering: Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25942-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T01:50:00Z","timestamp":1748656200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25942-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259413","9783319259420"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25942-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}