{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:31:45Z","timestamp":1725521505292},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540938996"},{"type":"electronic","value":"9783540939009"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-93900-9_26","type":"book-chapter","created":{"date-parts":[[2008,12,15]],"date-time":"2008-12-15T04:35:59Z","timestamp":1229315759000},"page":"320-334","source":"Crossref","is-referenced-by-count":2,"title":["Extending Symmetry Reduction by Exploiting System Architecture"],"prefix":"10.1007","author":[{"given":"Richard","family":"Trefler","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Wahl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Asanovic, K., et al.: The landscape of parallel computing research: A view from Berkeley. Technical Report UCB\/EECS-2006-183, EECS Department, University of California, Berkeley (2006)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-540-78800-3_34","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T. Wahl","year":"2008","unstructured":"Wahl, T., Blanc, N., Emerson, E.A.: SVISS: Symbolic verification of symmetric systems. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol.\u00a04963, pp. 459\u2013462. Springer, Heidelberg (2008)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Candea, G., Cutler, J., Fox, A.: Improving availability with recursive microreboots: a soft-state system case study. Performance Evaluation (2004)","DOI":"10.1016\/j.peva.2003.07.007"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., German, S., Gopalakrishnan, G.: Transaction based modeling and verification of hardware protocols. In: Formal Methods in Computer-Aided Design (FMCAD) (2007)","DOI":"10.1109\/FAMCAD.2007.20"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Clarke, E., Enders, R., Filkorn, T., Jha, S.: Exploiting symmetry in temporal logic model checking. In: Formal Methods in System Design (FMSD) (1996)","DOI":"10.1007\/BF00625969"},{"key":"26_CR6","unstructured":"Emerson, A., Havlicek, J., Trefler, R.: Virtual symmetry reduction. In: Logic in Computer Science (LICS) (2000)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Emerson, A., Sistla, P.: Symmetry and model checking. Formal Methods in System Design (FMSD) (1996)","DOI":"10.1007\/BF00625970"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/3-540-48153-2_12","volume-title":"Correct Hardware Design and Verification Methods","author":"A. Emerson","year":"1999","unstructured":"Emerson, A., Trefler, R.: From asymmetry to full symmetry: New techniques for symmetry reduction in model checking. In: Pierre, L., Kropf, T. (eds.) CHARME 1999. LNCS, vol.\u00a01703, pp. 142\u2013157. Springer, Heidelberg (1999)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-39724-3_20","volume-title":"Correct Hardware Design and Verification Methods","author":"A. Emerson","year":"2003","unstructured":"Emerson, A., Wahl, T.: On combining symmetry reduction and symbolic representation for efficient model checking. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol.\u00a02860, pp. 216\u2013230. Springer, Heidelberg (2003)"},{"key":"26_CR10","unstructured":"The FlexRay Consortium, FlexRay\u2014The communication system for advanced automotive control applications, http:\/\/www.flexray.com"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Heiner, G., Thurner, T.: Time-triggered architecture for safety-related distributed real-time systems in transportation systems. In: Fault-Tolerant Computing Symposium (FTCS) (1998)","DOI":"10.1109\/FTCS.1998.689491"},{"key":"26_CR12","unstructured":"Ip, N., Dill, D.: Better verification through symmetry. Formal Methods in System Design (FMSD) (1996)"},{"key":"26_CR13","volume-title":"Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics","author":"R. Milner","year":"1990","unstructured":"Milner, R.: Operational and algebraic semantics of concurrent processes. In: Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics. MIT Press, Cambridge (1990)"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-45657-0_9","volume-title":"Computer Aided Verification","author":"A. Pnueli","year":"2002","unstructured":"Pnueli, A., Xu, J., Zuck, L.D.: Liveness with (0,1,\u2009\u221e\u2009)-counter abstraction. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.\u00a02404, p. 107. Springer, Heidelberg (2002)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Sistla, P., Godefroid, P.: Symmetry and reduced symmetry in model checking. Transactions on Programming Languages and Systems (TOPLAS) (2004)","DOI":"10.1145\/1011508.1011511"},{"key":"26_CR16","unstructured":"Somenzi, F.: The CU Decision Diagram Package, release 2.3.1. University of Colorado at Boulder, http:\/\/vlsi.colorado.edu\/~fabio\/CUDD\/"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-540-73368-3_43","volume-title":"Computer Aided Verification","author":"T. Wahl","year":"2007","unstructured":"Wahl, T.: Adaptive symmetry reduction. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol.\u00a04590, pp. 393\u2013405. Springer, Heidelberg (2007)"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/11560548_22","volume-title":"Correct Hardware Design and Verification Methods","author":"O. Wei","year":"2005","unstructured":"Wei, O., Gurfinkel, A., Chechik, M.: Identification and counter abstraction for full virtual symmetry. In: Borrione, D., Paul, W. (eds.) CHARME 2005. LNCS, vol.\u00a03725, pp. 285\u2013300. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-93900-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T04:11:35Z","timestamp":1557979895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-93900-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540938996","9783540939009"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-93900-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}