{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:19Z","timestamp":1742913979378,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319420912"},{"type":"electronic","value":"9783319420929"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42092-9_32","type":"book-chapter","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T06:02:55Z","timestamp":1467266575000},"page":"410-421","source":"Crossref","is-referenced-by-count":1,"title":["Finding Divergent Executions in Asynchronous Programs"],"prefix":"10.1007","author":[{"given":"Mohamed A.","family":"El-Zawawy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"issue":"1","key":"32_CR1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/BF00215626","volume":"5","author":"O Arieli","year":"1996","unstructured":"Arieli, O., Avron, A.: Reasoning with logical bilattices. J. Log. Lang. Inf. 5(1), 25\u201363 (1996)","journal-title":"J. Log. Lang. Inf."},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/978-3-642-33386-6_13","volume-title":"Automated Technology for Verification and Analysis","author":"MF Atig","year":"2012","unstructured":"Atig, M.F., Bouajjani, A., Narayan Kumar, K., Saivasan, P.: Linear-time model-checking for multithreaded programs under scope-bounding. In: Chakraborty, S., Mukund, M. (eds.) ATVA 2012. LNCS, vol. 7561, pp. 152\u2013166. Springer, Heidelberg (2012)"},{"key":"32_CR3","unstructured":"Atig, M.F., Bouajjani, A., Touili, T.: Analyzing asynchronous programs with preemption. In: LIPIcs-Leibniz International Proceedings in Informatics, vol. 2. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik (2008)"},{"issue":"12","key":"32_CR4","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1016\/j.ic.2007.05.002","volume":"205","author":"M Backes","year":"2007","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12), 1685\u20131720 (2007)","journal-title":"Inf. Comput."},{"issue":"9","key":"32_CR5","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/5.97297","volume":"79","author":"A Benveniste","year":"1991","unstructured":"Benveniste, A., Berry, G.: The synchronous approach to reactive and real-time systems. Proc. IEEE 79(9), 1270\u20131282 (1991)","journal-title":"Proc. IEEE"},{"issue":"2","key":"32_CR6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/0167-6423(92)90005-V","volume":"19","author":"G Berry","year":"1992","unstructured":"Berry, G., Gonthier, G.: The esterel synchronous programming language: design, semantics, implementation. Sci. Comput. Program. 19(2), 87\u2013152 (1992)","journal-title":"Sci. Comput. Program."},{"key":"32_CR7","unstructured":"Birkhoff, G., Birkhoff, G., Birkhoff, G., Birkhoff, G.: Lattice theory. Am. Math. Soc. 25 (1948). New York"},{"issue":"2","key":"32_CR8","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s10009-013-0276-z","volume":"16","author":"A Bouajjani","year":"2014","unstructured":"Bouajjani, A., Emmi, M.: Bounded phase analysis of message-passing programs. Int. J. Softw. Tools Technol. Transf. 16(2), 127\u2013146 (2014)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-662-49665-7_8","volume-title":"Fundamental Approaches to Software Engineering","author":"D Str\u00fcber","year":"2016","unstructured":"Str\u00fcber, D., Rubin, J., Arendt, T., Chechik, M., Taentzer, G., Pl\u00f6ger, J.: RuleMerger: automatic construction of variability-based model transformation rules. In: Stevens, P., et al. (eds.) FASE 2016. LNCS, vol. 9633, pp. 122\u2013140. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49665-7_8"},{"issue":"4","key":"32_CR10","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/BF01784719","volume":"4","author":"F Cristian","year":"1991","unstructured":"Cristian, F.: Reaching agreement on processor-group membrship in synchronous distributed systems. Distrib. Comput. 4(4), 175\u2013187 (1991)","journal-title":"Distrib. Comput."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Czaplicki, E., Chong, S.: Asynchronous functional reactive programming for GUIs. In: ACM SIGPLAN Notices, vol. 48, pp. 411\u2013422. ACM (2013)","DOI":"10.1145\/2491956.2462161"},{"issue":"2","key":"32_CR12","doi-asserted-by":"crossref","first-page":"186","DOI":"10.7763\/LNSE.2013.V1.42","volume":"1","author":"S Dakshinamurthy","year":"2013","unstructured":"Dakshinamurthy, S., Narayanan, V.K.: A component-based approach to verification of formal software models to check safety properties of distributed systems. Lect. Notes Softw. Eng. 1(2), 186 (2013)","journal-title":"Lect. Notes Softw. Eng."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Deligiannis, P., Donaldson, A.F., Ketema, J., Lal, A., Thomson, P.: Asynchronous programming, analysis and testing with state machines. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 154\u2013164. ACM (2015)","DOI":"10.1145\/2737924.2737996"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Desai, A., Garg, P., Madhusudan, P.: Natural proofs for asynchronous programs using almost-synchronous reductions. In: ACM SIGPLAN Notices, vol. 49, pp. 709\u2013725. ACM (2014)","DOI":"10.1145\/2660193.2660211"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"El-Zawawy, M.A.: An efficient layer-aware technique for developing asynchronous context-oriented software (ACOS). In: 2015 15th International Conference on Computational Science and Its Applications (ICCSA), pp. 14\u201320. IEEE (2015)","DOI":"10.1109\/ICCSA.2015.9"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"El-Zawawy, M.A.: A robust framework for asynchronous operations on a functional object-oriented model. In: 2015 International Conference on Cloud Computing (ICCC), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/CLOUDCOMP.2015.7149623"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"El-Zawawy, M.A., Alanazi, M.N.: An efficient binary technique for trace simplifications of concurrent programs. In: 2014 IEEE 6th International Conference on Adaptive Science & Technology (ICAST), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/ICASTECH.2014.7068106"},{"key":"32_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/978-3-662-46669-8_22","volume-title":"Programming Languages and Systems","author":"M Emmi","year":"2015","unstructured":"Emmi, M., Ganty, P., Majumdar, R., Rosa-Velardo, F.: Analysis of asynchronous programs with event-based synchronization. In: Vitek, J. (ed.) ESOP 2015. LNCS, vol. 9032, pp. 535\u2013559. Springer, Heidelberg (2015)"},{"key":"32_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/978-3-642-33125-1_29","volume-title":"Static Analysis","author":"M Emmi","year":"2012","unstructured":"Emmi, M., Lal, A.: Finding non-terminating executions in distributed asynchronous programs. In: Min\u00e9, A., Schmidt, D. (eds.) SAS 2012. LNCS, vol. 7460, pp. 439\u2013455. Springer, Heidelberg (2012)"},{"issue":"2","key":"32_CR20","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/0743-1066(91)90014-G","volume":"11","author":"M Fitting","year":"1991","unstructured":"Fitting, M.: Bilattices and the semantics of logic programming. J. Log. Program. 11(2), 91\u2013116 (1991)","journal-title":"J. Log. Program."},{"issue":"1","key":"32_CR21","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2160910.2160915","volume":"34","author":"P Ganty","year":"2012","unstructured":"Ganty, P., Majumdar, R.: Algorithmic verification of asynchronous programs. ACM Trans. Program. Lang. Syst. (TOPLAS) 34(1), 6 (2012)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Ganty, P., Majumdar, R., Rybalchenko, A.: Verifying liveness for asynchronous programs. In: ACM SIGPLAN Notices, vol. 44, pp. 102\u2013113. ACM (2009)","DOI":"10.1145\/1594834.1480895"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Jhala, R., Majumdar, R.: Interprocedural analysis of asynchronous programs. In: ACM SIGPLAN Notices, vol. 42, pp. 339\u2013350. ACM (2007)","DOI":"10.1145\/1190216.1190266"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Jung, A., Rivieccio, U.: Kripke semantics for modal bilattice logic. In: 2013 28th Annual IEEE\/ACM Symposium on Logic in Computer Science (LICS), pp. 438\u2013447. IEEE (2013)","DOI":"10.1109\/LICS.2013.50"},{"key":"32_CR25","volume-title":"General Topology","author":"JL Kelley","year":"1975","unstructured":"Kelley, J.L.: General Topology. Springer Science & Business Media, New York (1975)"},{"key":"32_CR26","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8237-7","volume-title":"Real-Time Systems: Design Principles for Distributed Embedded Applications","author":"H Kopetz","year":"2011","unstructured":"Kopetz, H.: Real-Time Systems: Design Principles for Distributed Embedded Applications. Springer Science & Business Media, New York (2011)"},{"key":"32_CR27","doi-asserted-by":"crossref","unstructured":"Liskov, B., Shrira, L.: Promises: linguistic support for efficient asynchronous procedure calls in distributed systems. In: ACM Proceedings, vol. 23 (1988)","DOI":"10.1145\/53990.54016"},{"key":"32_CR28","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: Proceedings of 2001 IEEE Symposium on Security and Privacy S&P 2001, pp. 184\u2013200. IEEE (2001)","DOI":"10.1109\/SECPRI.2001.924298"},{"issue":"3","key":"32_CR29","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1090\/S0002-9947-1937-1501905-7","volume":"41","author":"MH Stone","year":"1937","unstructured":"Stone, M.H.: Applications of the theory of Boolean rings to general topology. Trans. Am. Math. Soc. 41(3), 375\u2013481 (1937)","journal-title":"Trans. Am. Math. Soc."},{"key":"32_CR30","doi-asserted-by":"crossref","unstructured":"Wilson, R.P., Lam, M.S.: Efficient context-sensitive pointer analysis for C programs. In: ACM Proceedings, vol. 30 (1995)","DOI":"10.1145\/207110.207111"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42092-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T08:47:36Z","timestamp":1568105256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42092-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420912","9783319420929"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42092-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}