{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:15Z","timestamp":1763467875326,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540682356"},{"type":"electronic","value":"9783540682370"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68237-0_10","type":"book-chapter","created":{"date-parts":[[2008,6,4]],"date-time":"2008-06-04T05:36:00Z","timestamp":1212557760000},"page":"116-131","source":"Crossref","is-referenced-by-count":26,"title":["Assume-Guarantee Verification for Interface Automata"],"prefix":"10.1007","author":[{"given":"Michael","family":"Emmi","sequence":"first","affiliation":[]},{"given":"Dimitra","family":"Giannakopoulou","sequence":"additional","affiliation":[]},{"given":"Corina S.","family":"P\u0103s\u0103reanu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Alur, R., Cerny, P., Madhusudan, P., Nam, W.: Synthesis of interface specifications for java classes. In: Proc. 32nd POPL (2005)","DOI":"10.1145\/1040305.1040314"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Alur, R., Madhusudan, P., Nam, W.: Symbolic compositional verification by learning assumptions. In: Proc. 17th CAV (2005)","DOI":"10.1007\/11513988_52"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput.\u00a075(2) (1987)","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chaki, S., Strichman, O.: Optimized L* for assume-guarantee reasoning. In: Proc. 13th TACAS (2007)","DOI":"10.1007\/978-3-540-71209-1_22"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Cheung, S.C., Kramer, J.: Checking safety properties using compositional reachability analysis. TOSEM\u00a08(1) (1999)","DOI":"10.1145\/295558.295570"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Long, D.E., McMillan, K.L.: Compositional model checking. In: Proc. 4th LICS (1989)","DOI":"10.1109\/LICS.1989.39190"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Cobleigh, J.M., Avrunin, G.S., Clarke, L.A.: Breaking up is hard to do: An investigation of decomposition for assume-guarantee reasoning. In: ISSTA (2006)","DOI":"10.1145\/1146238.1146250"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Cobleigh, J.M., Giannakopoulou, D., P\u0103s\u0103reanu, C.S.: Learning assumptions for compositional verification. In: Proc. 9th TACAS (2003)","DOI":"10.1007\/3-540-36577-X_24"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"de Alfaro, L., Henzinger, T.A.: Interface automata. In: Proc. 8th ESEC\/FSE (2001)","DOI":"10.1145\/503209.503226"},{"key":"10_CR10","unstructured":"Gheorghiu, M., Giannakopoulou, D., P\u0103s\u0103reanu, C.S.: Refining interface alphabets for compositional verification. In: Proc. 13th TACAS (2007)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Giannakopoulou, D., P\u0103s\u0103reanu, C.S., Barringer, H.: Assumption generation for software component verification. In: Proc. 17th ASE (2002)","DOI":"10.1109\/ASE.2002.1114984"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Grumberg, O., Long, D.E.: Model checking and modular verification. In: Proc. 2nd CONCUR (1991)","DOI":"10.1007\/3-540-54430-5_93"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R.: Permissive interfaces. In: Proc. 10th ESEC\/FSE (2005)","DOI":"10.1145\/1081706.1081713"},{"key":"10_CR14","unstructured":"Jones, C.B.: Specification and design of (parallel) programs. In: Proc. 9th IFIP Congress (1983)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Krimm, J.-P., Mounier, L.: Compositional state space generation from Lotos programs. In: Proc. 3rd TACAS (1997)","DOI":"10.1007\/BFb0035392"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Letier, E., Kramer, J., Magee, J., Uchitel, S.: Monitoring and control in scenario-based requirements analysis. In: Proc. 27th ICSE (2005)","DOI":"10.1145\/1062455.1062527"},{"key":"10_CR17","unstructured":"Lynch, N., Tuttle, M.: An introduction to input\/output automata. Centrum voor Wiskunde en Informatica\u00a02(3) (1989)"},{"key":"10_CR18","volume-title":"Concurrency: State Models & Java Programs","author":"J. Magee","year":"1999","unstructured":"Magee, J., Kramer, J.: Concurrency: State Models & Java Programs. John Wiley & Sons, Chichester (1999)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Magee, J., Kramer, J., Giannakopoulou, D.: Behaviour analysis of software architectures. In: Proc. 1st WICSA (1999)","DOI":"10.1007\/978-0-387-35563-4_3"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Nam, W., Alur, R.: Learning-based symbolic assume-guarantee reasoning with automatic decomposition. In: Proc. 4th ATVA (2006)","DOI":"10.1007\/11901914_15"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: In transition from global to modular temporal reasoning about programs. In: Logic and Models of Concurrent Systems (1984)","DOI":"10.1007\/978-3-642-82453-1_5"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Schapire, R.E.: Inference of finite automata using homing sequences. In: Proc. 21st STOC (1989)","DOI":"10.1145\/73007.73047"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Veanes, M., Campbell, C., Schulte, W., Tillmann, N.: Online testing with model programs. In: Proc. 10th ESEC\/FSE (2005)","DOI":"10.1145\/1081706.1081751"}],"container-title":["Lecture Notes in Computer Science","FM 2008: Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68237-0_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T15:15:37Z","timestamp":1738250137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68237-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540682356","9783540682370"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68237-0_10","relation":{},"subject":[]}}