{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T14:35:43Z","timestamp":1777559743327,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540799795","type":"print"},{"value":"9783540799801","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79980-1_6","type":"book-chapter","created":{"date-parts":[[2008,7,28]],"date-time":"2008-07-28T15:55:42Z","timestamp":1217260542000},"page":"67-82","source":"Crossref","is-referenced-by-count":5,"title":["Towards an Efficient Implementation of Tree Automata Completion"],"prefix":"10.1007","author":[{"given":"Emilie","family":"Balland","sequence":"first","affiliation":[]},{"given":"Yohan","family":"Boichut","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Genet","sequence":"additional","affiliation":[]},{"given":"Pierre-Etienne","family":"Moreau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"RAVAJ project (ANR-06-SETI-014)\u2013 Rewriting and Approximations for Java Applications Verification, http:\/\/www.irisa.fr\/lande\/genet\/RAVAJ\/index.html"},{"key":"6_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139172752","volume-title":"Term Rewriting and All That","author":"F. Baader","year":"1998","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, Cambridge (1998)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-73449-9_5","volume-title":"Term Rewriting and Applications","author":"E. Balland","year":"2007","unstructured":"Balland, E., Brauner, P., Kopetz, R., Moreau, P.-E., Reilles, A.: Tom: Piggybacking rewriting on java. In: Baader, F. (ed.) RTA 2007. LNCS, vol.\u00a04533, pp. 36\u201347. Springer, Heidelberg (2007)"},{"key":"6_CR4","unstructured":"Balland, E., Moreau, P.-E.: Optimizing pattern matching compilation by program transformation. In: 3rd Workshop on Software Evolution through Transformations (SeTra 2006). Electronic Communications of EASST (2006) ISSN 1863-2122"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-73449-9_6","volume-title":"Term Rewriting and Applications","author":"Y. Boichut","year":"2007","unstructured":"Boichut, Y., Genet, T., Jensen, T., Le Roux, L.: Rewriting Approximations for Fast Prototyping of Static Analyzers. In: Baader, F. (ed.) RTA 2007. LNCS, vol.\u00a04533, pp. 48\u201362. Springer, Heidelberg (2007)"},{"key":"6_CR6","unstructured":"Boichut, Y., H\u00e9am, P.-C., Kouchnarenko, O.: Automatic Verification of Security Protocols Using Approximations. Research Report RR-5727, INRIA-Lorraine - CASSIS Project (October 2005)"},{"issue":"11","key":"6_CR7","first-page":"1618","volume":"12","author":"M. Clavel","year":"2006","unstructured":"Clavel, M., Palomino, M., Riesco, A.: Introducing the ITP tool: a tutorial. J. UCS\u00a012(11), 1618\u20131650 (2006)","journal-title":"J. UCS"},{"key":"6_CR8","unstructured":"Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Lugiez, D., Tison, S., Tommasi, M.: Tree automata techniques and applications (2002), http:\/\/www.grappa.univ-lille3.fr\/tata\/"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Dershowitz, N., Jouannaud, J.-P.: Rewrite Systems. In: Handbook of Theoretical Computer Science, ch.6, vol.\u00a0B. Elsevier Science Publishers B. V (North-Holland) (1990) Also as: Research report 478, LRI","DOI":"10.1016\/B978-0-444-88074-1.50011-1"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-44829-2_16","volume-title":"Model Checking Software","author":"S. Eker","year":"2003","unstructured":"Eker, S., Meseguer, J., Sridharanarayanan, A.: The Maude LTL Model Checker and its Implementation. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol.\u00a02648, pp. 230\u2013234. Springer, Heidelberg (2003)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1007\/978-3-540-27813-9_46","volume-title":"Computer Aided Verification","author":"A. Farzan","year":"2004","unstructured":"Farzan, A., Chen, C., Meseguer, J., Rosu, G.: Formal analysis of java programs in javafan. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol.\u00a03114, pp. 501\u2013505. Springer, Heidelberg (2004)"},{"issue":"3-4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10817-004-6246-0","volume":"33","author":"G. Feuillade","year":"2004","unstructured":"Feuillade, G., Genet, T., Tong, V.V.T.: Reachability Analysis over Term Rewriting Systems. JAR\u00a033(3-4), 341\u2013383 (2004)","journal-title":"JAR"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/BFb0052368","volume-title":"Rewriting Techniques and Applications","author":"T. Genet","year":"1998","unstructured":"Genet, T.: Decidable approximations of sets of descendants and sets of normal forms. In: Nipkow, T. (ed.) RTA 1998. LNCS, vol.\u00a01379, pp. 151\u2013165. Springer, Heidelberg (1998)"},{"key":"6_CR14","series-title":"LNAI","volume-title":"Proc. 17th CADE Conf.","author":"T. Genet","year":"2000","unstructured":"Genet, T., Klay, F.: Rewriting for Cryptographic Protocol Verification. In: Proc. 17th CADE Conf. LNCS (LNAI), vol.\u00a01831. Springer, Heidelberg (2000)"},{"key":"6_CR15","unstructured":"Genet, T., Tang-Talpin, Y.-M., Tong, V.V.T.: Verification of Copy Protection Cryptographic Protocol using Approximations of Term Rewriting Systems. In: Proceedings of Workshop on Issues in the Theory of Security (2003)"},{"key":"6_CR16","unstructured":"Genet, T., Tong, V.V.T.: Timbuk 2.0 \u2013 a Tree Automata Library. IRISA \/ Universit\u00e9 de Rennes 1 (2000), http:\/\/www.irisa.fr\/lande\/genet\/timbuk\/"},{"key":"6_CR17","doi-asserted-by":"crossref","first-page":"157","DOI":"10.3233\/FI-1995-24127","volume":"24","author":"R. Gilleron","year":"1995","unstructured":"Gilleron, R., Tison, S.: Regular tree languages and rewrite systems. Fundamenta Informaticae\u00a024, 157\u2013175 (1995)","journal-title":"Fundamenta Informaticae"},{"key":"6_CR18","series-title":"Lecture Notes in Artificial Intelligence","first-page":"1","volume-title":"Automated Reasoning","author":"J. Meseguer","year":"2004","unstructured":"Meseguer, J., Rosu, G.: Rewriting logic semantics: From language specifications to formal analysis tools. In: Basin, D., Rusinowitch, M. (eds.) IJCAR 2004. LNCS (LNAI), vol.\u00a03097, pp. 1\u201344. Springer, Heidelberg (2004)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-540-25979-4_9","volume-title":"Proc. 15th RTA Conf.","author":"T. Takai","year":"2004","unstructured":"Takai, T.: A Verification Technique Using Term Rewriting Systems and Abstract Interpretation. In: Proc. 15th RTA Conf., Aachen, Germany. LNCS, vol.\u00a03091, pp. 119\u2013133. Springer, Heidelberg (2004)"},{"key":"6_CR20","unstructured":"Thomson. Smartright technical white paper v1.0. Technical report, (October 2001), http:\/\/www.smartright.org"}],"container-title":["Lecture Notes in Computer Science","Algebraic Methodology and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79980-1_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:20:43Z","timestamp":1606184443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79980-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540799795","9783540799801"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79980-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}