{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T16:48:05Z","timestamp":1759682885384},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213147"},{"type":"electronic","value":"9783540247326"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24732-6_5","type":"book-chapter","created":{"date-parts":[[2010,7,27]],"date-time":"2010-07-27T20:14:47Z","timestamp":1280261687000},"page":"57-75","source":"Crossref","is-referenced-by-count":19,"title":["Fast and Accurate Bitstate Verification for SPIN"],"prefix":"10.1007","author":[{"given":"Peter C.","family":"Dillinger","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Manolios","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"5_CR1","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"unstructured":"Broder, A., Mitzenmacher, M.: Network applications of Bloom filters: A survey. In: Proc. of the 40th Annual Allerton Conference on Communication, Control, and Computing, pp. 636\u2013646 (2002)","key":"5_CR2"},{"key":"5_CR3","first-page":"87","volume-title":"Computer Hardware Description Languages and their Applications","author":"C.N. Ip","year":"1993","unstructured":"Ip, C.N., Dill, D.L.: Better verification through symmetry. In: Agnew, D., Claesen, L., Camposano, R. (eds.) Computer Hardware Description Languages and their Applications, Ottawa, Canada, pp. 87\u2013100. Elsevier Science Publishers B.V., Amsterdam (1993)"},{"key":"5_CR4","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen, T.H., Stein, C., Rivest, R.L., Leiserson, C.E.: Introduction to Algorithms. McGraw-Hill Higher Education, New York (2001)"},{"unstructured":"Dillinger, P.C.: 3SPIN Home Page, http:\/\/www.cc.gatech.edu\/~peterd\/3spin\/","key":"5_CR5"},{"doi-asserted-by":"crossref","unstructured":"Godefroid, P., Wolper, P.: A partial approach to model checking. In: Logic in Computer Science, pp. 406\u2013415 (1991)","key":"5_CR6","DOI":"10.1109\/LICS.1991.151664"},{"key":"5_CR7","volume-title":"Handbook of Algorithms and Data Structures","author":"G.H. Gonnet","year":"1984","unstructured":"Gonnet, G.H.: Handbook of Algorithms and Data Structures. Addison-Wesley, Reading (1984)"},{"unstructured":"Holzmann, G., Peled, D.: Partial order reduction of the state space. In: First SPIN Workshop, Montr\u00e8al, Quebec (1995)","key":"5_CR8"},{"doi-asserted-by":"crossref","unstructured":"Holzmann, G.J.: Algorithms for automated protocol validation. Technical Report 69:32-44, AT&T Technical Journal (1990)","key":"5_CR9","DOI":"10.1002\/j.1538-7305.1990.tb00101.x"},{"key":"5_CR10","first-page":"301","volume-title":"Proc. 15th Int. Conf on Protocol Specification, Testing, and Verification, INWG\/IFIP","author":"G.J. Holzmann","year":"1995","unstructured":"Holzmann, G.J.: An analysis of bitstate hashing. In: Proc. 15th Int. Conf on Protocol Specification, Testing, and Verification, INWG\/IFIP, Warsaw, Poland, pp. 301\u2013314. Chapman & Hall, Boca Raton (1995)"},{"key":"5_CR11","volume-title":"The Spin Model Checker: Primer and Reference Manual","author":"G.J. Holzmann","year":"2003","unstructured":"Holzmann, G.J.: The Spin Model Checker: Primer and Reference Manual. Addison-Wesley, Boston (2003)"},{"unstructured":"Jenkins, B.: (1996), http:\/\/burtleburtle.net\/bob\/c\/lookup2.c","key":"5_CR12"},{"unstructured":"Jenkins, B.: Algorithm alley: Hash functions. Dr. Dobb\u2019s Journal (September 1997)","key":"5_CR13"},{"key":"5_CR14","series-title":"Sorting and Searching","volume-title":"The Art of Computer Programming","author":"D.E. Knuth","year":"1997","unstructured":"Knuth, D.E.: The Art of Computer Programming, 2nd edn. Sorting and Searching, vol.\u00a03. Addison Wesley Longman Publishing Co., Inc., Amsterdam (1997)","edition":"2"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Correct Hardware Design and Verification Methods","author":"U. Stern","year":"1995","unstructured":"Stern, U., Dill, D.L.: Improved probilistic verification by hash compaction. In: Camurati, P.E., Eveking, H. (eds.) CHARME 1995. LNCS, vol.\u00a0987, Springer, Heidelberg (1995)"},{"doi-asserted-by":"crossref","unstructured":"Stern, U., Dill, D.L.: A new scheme for memory-efficient probabilistic verification. In: Joint Int. Conf. on Formal Description Techn. for Distr. Systems and Comm. Protocols, and Protocol Spec., Testing, and Verification, pp. 333\u2013348 (1996)","key":"5_CR16","DOI":"10.1007\/978-0-387-35079-0_21"},{"doi-asserted-by":"crossref","unstructured":"Wolper, P., Leroy, D.: Reliable hashing without collision detection. In: 5th International Conference on Computer Aided Verification, pp. 59\u201370 (1993)","key":"5_CR17","DOI":"10.1007\/3-540-56922-7_6"}],"container-title":["Lecture Notes in Computer Science","Model Checking Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24732-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T15:29:43Z","timestamp":1559316583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24732-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213147","9783540247326"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24732-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}