{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:26:25Z","timestamp":1744604785275},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201755"},{"type":"electronic","value":"9783540399797"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39979-7_11","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T14:52:22Z","timestamp":1277218342000},"page":"160-176","source":"Crossref","is-referenced-by-count":9,"title":["Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems"],"prefix":"10.1007","author":[{"given":"Farn","family":"Wang","sequence":"first","affiliation":[]},{"given":"Geng-Dian","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Alur, R., Courcoubetis, C., Dill, D.L.: Model Checking for Real-Time Systems. IEEE LICS (1990)","DOI":"10.1109\/LICS.1990.113766"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0032042","volume-title":"Automata, Languages and Programming","author":"R. Alur","year":"1990","unstructured":"Alur, R., Dill, D.L.: Automata for modelling real-time systems. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol.\u00a0443, pp. 322\u2013335. Springer, Heidelberg (1990)"},{"key":"11_CR3","unstructured":"Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic Model Checking: 1020 States and Beyond. IEEE LICS (1990)"},{"key":"11_CR4","volume-title":"Software Testing Techniques","author":"B. Beizer","year":"1990","unstructured":"Beizer, B.: Software Testing Techniques, 2nd edn. Van Nostrand Rheinhold, New York (1990)","edition":"2"},{"key":"11_CR5","volume-title":"Principles of Verifiable RTL Design, a Functional Coding Style Supporting Verification Processes in Verilog","author":"L. Bening","year":"2001","unstructured":"Bening, L., Foster, H.: Principles of Verifiable RTL Design, a Functional Coding Style Supporting Verification Processes in Verilog, 2nd edn. Kluwer Academic Publishers, Dordrecht (2001)","edition":"2"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/3-540-48683-6_30","volume-title":"Computer Aided Verification","author":"G. Behrmann","year":"1999","unstructured":"Behrmann, G., Larsen, K.G., Pearson, J., Weise, C., Yi, W.: Efficient Timed Reachability Analysis Using Clock Difference Diagrams. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol.\u00a01633, pp. 341\u2013353. Springer, Heidelberg (1999)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Bryant, R.E.: Graph-based Algorithms for Boolean Function Manipulation. IEEE Trans. Comput.\u00a0C-35(8) (1986)","DOI":"10.1109\/TC.1986.1676819"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, K.-T., Krishnakumar, A.S.: Automatic Functional Test Generation Using the Extended Finite State Machine Model. In: Proceedings of the 30th Design Automation Conference, pp. 86\u201391 (June 1993)","DOI":"10.1145\/157485.164585"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/3-540-45319-9_36","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"H. Chockler","year":"2001","unstructured":"Chockler, H., Kupferman, O., Vardi, M.Y.: Coverage Metrics for Temporal Logic Model Checking. In: Margaria, T., Yi, W. (eds.) TACAS 2001. LNCS, vol.\u00a02031, pp. 528\u2013552. Springer, Heidelberg (2001)"},{"key":"11_CR10","unstructured":"Devadas, S., Ghosh, A., Keutzer, K.: An Obervability-Based Code Coverage Metric for Functional Simulation. IEEE ICCAD 1996 (1996)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-52148-8_17","volume-title":"Automatic Verification Methods for Finite State Systems","author":"D.L. Dill","year":"1990","unstructured":"Dill, D.L.: Timing Assumptions and Verification of Finite-state Concurrent Systems. In: Sifakis, J. (ed.) CAV 1989. LNCS, vol.\u00a0407. Springer, Heidelberg (1990)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Dill, D.L.: What\u2019s Between Simulation and Formal Verification? In: Proceedings of DAC1998 (1998)","DOI":"10.1109\/DAC.1998.724491"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Fallah, F., Devadas, S., Keutzer, K.: OCCOM: Efficient Computation of Observability-Based Code Coverage Metrics for Functional Verification. In: Design Automation Conference, pp. 152\u2013157 (1998)","DOI":"10.1145\/277044.277078"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Geist, D., Farkas, M., Landver, A., Lichtenstein, Y., Ur, S., Wolsfthal, Y.: Coverage-Directed Test Generation Using Symbolic Techniques. In: Proceedings of the Int\u2019l Conference on Formal Methods in CAD (November 1996)","DOI":"10.1007\/BFb0031805"},{"key":"11_CR15","unstructured":"Haartsen, J.: Bluetooth Specification, version 1.0, http:\/\/www.bluetooth.com\/"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Nicollin, X., Sifakis, J., Yovine, S.: Symbolic Model Checking for Real-Time Systems. In: IEEE LICS 1992 (1992)","DOI":"10.1109\/LICS.1992.185551"},{"key":"11_CR17","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice Hall, Englewood Cliffs (1985)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Hoskote, Y., Moundanos, D., Abraham, J.: Automatic Extraction of the Control Flow Machine and Application to Evaluating Coverage of Verification Vectors. In: Proceedings of ICCD, pp. 532\u2013537 (October 1995)","DOI":"10.1109\/ICCD.1995.528919"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Hoskote, Y., Moundanos, D., Abraham, J.A.: Automatic Extraction of the control flow machine and application to evaluating coverage of verification vectors. In: Proceedings of the Int\u2019l Conference on Computer Design, pp. 532\u2013537 (October 1995)","DOI":"10.1109\/ICCD.1995.528919"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Hoskote, Y., Kam, T., Ho, P.-H., Zhao, X.: Coverage estimation for symbolic model checking. In: Proceedings of DAC1999, pp. 300\u2013305 (1999)","DOI":"10.1145\/309847.309936"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Larsen, K.G., Pettersson, P., Yi, W.: Model-Checking for Real-Time Systems. In: Proceedings of the 10th International Conference on Fundamentals of Computation Theory, Dresden, Germany. LNCS, vol.\u00a0965, pp. 62\u201388. Horst Reichel (1995)","DOI":"10.1007\/3-540-60249-6_41"},{"key":"11_CR22","unstructured":"Mike, B., Daniel, G., Alan, H., Yaron, W., Gerard, M., Ralph, S.: A Study in Coverage-Driven Test Generation. In: Proceedings of DAC 1999, pp. 970\u2013975 (1999)"},{"key":"11_CR23","unstructured":"Pettersson, P., Larsen, K.G.: UPPAAL2k. In: Bulletin of the European Association for Theoretical Computer Science, vol.\u00a070, pp. 40\u201344 (2000)"},{"key":"11_CR24","volume-title":"System-on-a-chip Verification, Methodology and Techniques","author":"P. Rashinkar","year":"2001","unstructured":"Rashinkar, P., Paterson, P., Singh, L.: System-on-a-chip Verification, Methodology and Techniques. Kluwer Academic Publishers, Dordrecht (2001)"},{"issue":"2","key":"11_CR25","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/BF01383966","volume":"6","author":"C.-J.H. Seger","year":"1995","unstructured":"Seger, C.-J.H., Bryant, R.E.: Formal Verification by Symbolic Evaluation of Partially-Ordered Trajectories. Formal Methods in System Designs\u00a06(2), 147\u2013189 (1995)","journal-title":"Formal Methods in System Designs"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-46419-0_12","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F. Wang","year":"2000","unstructured":"Wang, F.: Efficient Data-Structure for Fully Symbolic Verification of Real-Time Software Systems. In: Schwartzbach, M.I., Graf, S. (eds.) TACAS 2000. LNCS, vol.\u00a01785, p. 157. Springer, Heidelberg (2000)"},{"key":"11_CR27","unstructured":"Wang, F.: Symbolic Verification of Complex Real-Time Systems with Clock-Restriction Diagram. In: Proceedings of FORTE, Cheju Island, Korea (2001) (to appear)"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/3-540-36384-X_17","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"F. Wang","year":"2002","unstructured":"Wang, F.: Efficient Verification of Timed Automata with BDD-like Data-Structures. In: Zuck, L.D., Attie, P.C., Cortesi, A., Mukhopadhyay, S. (eds.) VMCAI 2003. LNCS, vol.\u00a02575, pp. 189\u2013205. Springer, Heidelberg (2002) (to appear)"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-540-24686-2_37","volume-title":"Real-Time and Embedded Computing Systems and Applications","author":"F. Wang","year":"2004","unstructured":"Wang, F., Hwang, G.-D., Yu, F.: Symbolic Simulation of Real-Time Concurrent Systems. In: Chen, J., Hong, S. (eds.) RTCSA 2003. LNCS, vol.\u00a02968, pp. 595\u2013617. Springer, Heidelberg (2004) (to appear)"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Yovine, S.: Kronos: A Verification Tool for Real-Time Systems. International Journal of Software Tools for Technology Transfer\u00a01(1\/2) (October 1997)","DOI":"10.1007\/s100090050009"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Networked and Distributed Systems - FORTE 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39979-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T05:36:39Z","timestamp":1559194599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39979-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201755","9783540399797"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39979-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}