{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:04Z","timestamp":1725558664779},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540242871"},{"type":"electronic","value":"9783540305699"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30569-9_11","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T17:59:08Z","timestamp":1278266348000},"page":"210-228","source":"Crossref","is-referenced-by-count":3,"title":["A Flexible Framework for the Estimation of Coverage Metrics in Explicit State Software Model Checking"],"prefix":"10.1007","author":[{"given":"Edwin","family":"Rodr\u00edguez","sequence":"first","affiliation":[]},{"given":"Matthew B.","family":"Dwyer","sequence":"additional","affiliation":[]},{"given":"John","family":"Hatcliff","sequence":"additional","affiliation":[]},{"family":"Robby","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-44585-4_25","volume-title":"Proceedings of the 13th International Conference on Computer Aided Verification","author":"T. Ball","year":"2001","unstructured":"Ball, T., Rajamani, S.K.: The slam toolkit. In: Proceedings of the 13th International Conference on Computer Aided Verification, pp. 260\u2013264. Springer, Heidelberg (2001)"},{"unstructured":"Binder, R.V.: Testing object-oriented systems: models, patterns, and tools. Addison-Wesley, Longman Publishing Co., Inc. (1999)","key":"11_CR2"},{"unstructured":"Brat, G., Havelund, K., Park, S., Visser, W.: Java PathFinder \u2013 a second generation of a Java model-checker. In: Proceedings of the Workshop on Advances in Verification (July 2000)","key":"11_CR3"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/3-540-44585-4_7","volume-title":"Computer Aided Verification","author":"H. Chockler","year":"2001","unstructured":"Chockler, H., Kupferman, O., Kurshan, R., Vardi, M.: A practical approach to coverage in model checking. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol.\u00a02102, pp. 66\u201378. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Hatcliff, J., Prasad, V.R., Robby: Exploiting object escape and locking information in partial order reductions for concurrent object-oriented programs. Formal Methods in System Designs (2004) (to appear)","key":"11_CR5","DOI":"10.1023\/B:FORM.0000040028.49845.67"},{"unstructured":"Dwyer, M.B., Hatcliff, J., Schmidt, D.: Bandera: Tools for automated reasoning about software system behaviour. ERCIM News\u00a036 (January 1999)","key":"11_CR6"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-24622-0_17","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"D.R. Engler","year":"2004","unstructured":"Engler, D.R., Musuvathi, M.: Static analysis versus software model checking for bug finding. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol.\u00a02937, pp. 191\u2013210. Springer, Heidelberg (2004)"},{"key":"11_CR8","volume-title":"Design Patterns","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns. Addison-Wesley Pub. Co., Reading (1995)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/566172.566175","volume-title":"Proceedings of the International Symposium on Software Testing and Analysis","author":"A. Groce","year":"2002","unstructured":"Groce, A., Visser, W.: Model checking java programs using structural heuristics. In: Proceedings of the International Symposium on Software Testing and Analysis, pp. 12\u201321. ACM Press, New York (2002)"},{"doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. In: Proceedings of the 29th ACM Symposium on Principles of Programming Languages, pp. 58\u201370 (January 2002)","key":"11_CR10","DOI":"10.1145\/503272.503279"},{"issue":"5","key":"11_CR11","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"G.J. Holzmann","year":"1997","unstructured":"Holzmann, G.J.: The model checker SPIN. IEEE Transactions on Software Engineering\u00a023(5), 279\u2013294 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1145\/302405.302710","volume-title":"Proceedings of the 21st international conference on Software engineering","author":"G.J. Holzmann","year":"1999","unstructured":"Holzmann, G.J., Smith, M.H.: A practical method for verifying event-driven software. In: Proceedings of the 21st international conference on Software engineering, pp. 597\u2013607. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1145\/309847.309936","volume-title":"Proceedings of the 36th ACM\/IEEE Design automation conference","author":"Y. Hoskote","year":"1999","unstructured":"Hoskote, Y., Kam, T., Ho, P.-H., Zhao, X.: Coverage estimation for symbolic model checking. In: Proceedings of the 36th ACM\/IEEE Design automation conference, pp. 300\u2013305. ACM Press, New York (1999)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-48153-2_8","volume-title":"Correct Hardware Design and Verification Methods","author":"O. Kupferman","year":"1999","unstructured":"Kupferman, O., Vardi, M.: Vacuity detection in temporal model checking. In: Pierre, L., Kropf, T. (eds.) CHARME 1999. LNCS, vol.\u00a01703, pp. 82\u201398. Springer, Heidelberg (1999)"},{"key":"11_CR15","volume-title":"Concurrent Programming in Java","author":"D. Lea","year":"2000","unstructured":"Lea, D.: Concurrent Programming in Java, 2nd edn. Addison-Wesley, Reading (2000)","edition":"2"},{"unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: JML: a Java modeling language. In: Formal Underpinnings of Java Workshop (October 1998)","key":"11_CR16"},{"unstructured":"Musuvathi, M., Engler, D.R.: Model checking large network protocol implementations. In: Proceedings of The First Symposium on Networked Systems Design and Implementation, pp. 155\u2013168. USENIX Association (2004)","key":"11_CR17"},{"key":"11_CR18","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1145\/337180.337364","volume-title":"Proceedings of the 22nd international conference on Software engineering","author":"J. Penix","year":"2000","unstructured":"Penix, J., Visser, W., Engstrom, E., Larson, A., Weininger, N.: Verification of time partitioning in the deos scheduler kernel. In: Proceedings of the 22nd international conference on Software engineering, pp. 488\u2013497. ACM Press, New York (2000)"},{"doi-asserted-by":"crossref","unstructured":"Robby, M.B.D., Hatcliff, J.: Bogor: An extensible and highly-modular model checking framework. In: Proceedings of the 9th European Software Engineering Conference held jointly with the 11th ACM SIGSOFT Symposium on the Foundations of Software Engineering (2003)","key":"11_CR19","DOI":"10.1145\/940071.940107"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-540-24730-2_31","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E.R. Robby","year":"2004","unstructured":"Robby, E.R., Dwyer, M., Hatcliff, J.: Checking strong specifications using an extensible software model checking framework. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 404\u2013420. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Tkachuk, O., Dwyer, M., Pasareanu, C.: Automated environment generation for software model checking. In: Proceedings of the 18th International Conference on Automated Software Engineering (October 2003)","key":"11_CR21","DOI":"10.1109\/ASE.2003.1240300"},{"doi-asserted-by":"crossref","unstructured":"Tkachuk, O., Dwyer, M.B.: Adapting side effects analysis for modular program model checking. In: Proceedings of the Fourth joint meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (September 2003)","key":"11_CR22","DOI":"10.1145\/940071.940097"},{"issue":"4","key":"11_CR23","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H. Zhu","year":"1997","unstructured":"Zhu, H., Hall, P., May, J.: Software unit test coverage and adequacy. ACM Computing Surveys\u00a029(4), 366\u2013427 (1997)","journal-title":"ACM Computing Surveys"}],"container-title":["Lecture Notes in Computer Science","Construction and Analysis of Safe, Secure, and Interoperable Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30569-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T22:32:29Z","timestamp":1685658749000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30569-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540242871","9783540305699"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30569-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}