{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:33:03Z","timestamp":1725557583941},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540406716"},{"type":"electronic","value":"9783540451389"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45138-9_32","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T18:41:48Z","timestamp":1277232108000},"page":"378-387","source":"Crossref","is-referenced-by-count":0,"title":["Using Transitive\u2013Closure Logic for Deciding Linear Properties of Monoids"],"prefix":"10.1007","author":[{"given":"Christian","family":"Delhomm\u00e9","sequence":"first","affiliation":[]},{"given":"Teodor","family":"Knapik","sequence":"additional","affiliation":[]},{"given":"D. Gnanaraj","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","first-page":"89","volume-title":"Design and Optimization of Compilers","author":"A.V. Aho","year":"1972","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Code optimization and finite Church\u2013Rosser systems. In: Rustin, R. (ed.) Design and Optimization of Compilers, pp. 89\u2013106. Prentice\u2013Hall, Upper Saddle River (1972)"},{"key":"32_CR2","series-title":"Number 146 in Studies in Logic and the Foundations of Mathematics","volume-title":"Rudiments of \u03bc\u2013calculus","author":"A. Arnold","year":"2001","unstructured":"Arnold, A., Niwi\u0144ski, D.: Rudiments of \u03bc\u2013calculus. Number 146 in Studies in Logic and the Foundations of Mathematics. Elsevier, Amsterdam (2001)"},{"key":"32_CR3","unstructured":"Barthelmann, K.: On equational simple graphs. Technical Report 9\/97, Johannes Gutenberg Universit\u00e4t, Mainz (1998)"},{"key":"32_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/3-540-45841-7_49","volume-title":"STACS 2002","author":"A. Blumensath","year":"2002","unstructured":"Blumensath, A.: Axiomatising tree-interpretable structures. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol.\u00a02285, pp. 596\u2013607. Springer, Heidelberg (2002)"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/0304-3975(83)90005-1","volume":"24","author":"R.V. Book","year":"1983","unstructured":"Book, R.V.: Decidable sentences of Church\u2013Rosser congruences. Theoretical Comput. Sci.\u00a024, 301\u2013312 (1983)","journal-title":"Theoretical Comput. Sci."},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/0304-3975(85)90146-X","volume":"39","author":"R.V. Book","year":"1985","unstructured":"Book, R.V., Otto, F.: On the security of name\u2013stamp protocols. Theoretical Comput. Sci.\u00a039, 319\u2013325 (1985)","journal-title":"Theoretical Comput. Sci."},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/0304-3975(85)90161-6","volume":"40","author":"R.V. Book","year":"1985","unstructured":"Book, R.V., Otto, F.: On the verifiability of two\u2013party algebraic protocols. Theoretical Comput. Sci.\u00a040, 101\u2013130 (1985)","journal-title":"Theoretical Comput. Sci."},{"key":"32_CR8","series-title":"Texts and Monographs in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9771-7","volume-title":"String\u2013Rewriting Systems","author":"R.V. Book","year":"1993","unstructured":"Book, R.V., Otto, F.: String\u2013Rewriting Systems. Texts and Monographs in Computer Science. Springer, Heidelberg (1993)"},{"issue":"1","key":"32_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/S0304-3975(01)00089-5","volume":"290","author":"D. Caucal","year":"2003","unstructured":"Caucal, D.: On infinite transition graphs having a decidable monadic second\u2013order theory. Theoretical Comput. Sci.\u00a0290(1), 79\u2013115 (2003)","journal-title":"Theoretical Comput. Sci."},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/3-540-45687-2_14","volume-title":"Mathematical Foundations of Computer Science 2002","author":"D. Caucal","year":"2002","unstructured":"Caucal, D., Knapik, T.: A Chomsky\u2013like hierarchy of infinite graphs. In: Diks, K., Rytter, W. (eds.) MFCS 2002. LNCS, vol.\u00a02420, pp. 177\u2013187. Springer, Heidelberg (2002)"},{"key":"32_CR11","volume-title":"Finite Model Theory","author":"H.-D. Ebbinghaus","year":"1999","unstructured":"Ebbinghaus, H.-D., Flum, J.: Finite Model Theory, 2nd edn. Springer, Heidelberg (1999)","edition":"2"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1002\/malq.19750210112","volume":"21","author":"R. Fagin","year":"1975","unstructured":"Fagin, R.: Monadic generalized spectra. Zeitschrift f\u00fcr Mathematische Logik und Grundlagen der Mathematik\u00a021, 89\u201396 (1975)","journal-title":"Zeitschrift f\u00fcr Mathematische Logik und Grundlagen der Mathematik"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/3-540-63166-6_29","volume-title":"Computer Aided Verification","author":"N. Immerman","year":"1997","unstructured":"Immerman, N., Vardi, M.Y.: Model checking and transitive-closure logic. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol.\u00a01254, pp. 291\u2013302. Springer, Heidelberg (1997)"},{"issue":"3","key":"32_CR14","doi-asserted-by":"crossref","first-page":"305","DOI":"10.3233\/FI-1999-39305","volume":"39","author":"T. Knapik","year":"1999","unstructured":"Knapik, T., Calbrix, H.: Thue specifications and their monadic second\u2013order properties. Fundamenta Informaticae\u00a039(3), 305\u2013325 (1999)","journal-title":"Fundamenta Informaticae"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/10722167_7","volume-title":"Computer Aided Verification","author":"O. Kupferman","year":"2000","unstructured":"Kupferman, O., Vardi, M.Y.: An automata\u2013theoretic approach to reasoning about infinite\u2013state systems. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 36\u201352. Springer, Heidelberg (2000)"},{"key":"32_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/BFb0020796","volume-title":"STACS 91","author":"K. Madlener","year":"1991","unstructured":"Madlener, K., Otto, F.: Decidable sentences for context\u2013free groups. In: Choffrut, C., Jantzen, M. (eds.) STACS 1991. LNCS, vol.\u00a0480, pp. 160\u2013171. Springer, Heidelberg (1991)"},{"key":"32_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/BFb0030841","volume-title":"Computing and Combinatorics","author":"V.A. Oleshchuk","year":"1995","unstructured":"Oleshchuk, V.A.: On public\u2013key cryptosystem based on Church\u2013Rosser string\u2013rewriting systems. In: Du, D.-Z., Li, M. (eds.) COCOON 1995. LNCS, vol.\u00a0959, pp. 264\u2013269. Springer, Heidelberg (1995)"},{"key":"32_CR18","first-page":"34","volume":"10","author":"A. Thue","year":"1914","unstructured":"Thue, A.: Probleme \u00fcber Ver\u00e4nderungen von Zeichenreihen nach gegebenen Regeln. Skr. Vid. Kristiania, I Mat. Natuv. Klasse, 10, 34 (1914)","journal-title":"Skr. Vid. Kristiania, I Mat. Natuv. Klasse"},{"issue":"1\u20132","key":"32_CR19","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0304-3975(01)00185-2","volume":"275","author":"I. Walukiewicz","year":"2002","unstructured":"Walukiewicz, I.: Monadic second\u2013order logic on tree\u2013like structures. Theoretical Comput. Sci.\u00a0275(1\u20132), 311\u2013346 (2002)","journal-title":"Theoretical Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Mathematical Foundations of Computer Science 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45138-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T21:41:54Z","timestamp":1591393314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45138-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406716","9783540451389"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45138-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}