{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:16:49Z","timestamp":1758266209210,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":77,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642034657"},{"type":"electronic","value":"9783642034664"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03466-4_1","type":"book-chapter","created":{"date-parts":[[2009,8,3]],"date-time":"2009-08-03T07:20:54Z","timestamp":1249284054000},"page":"1-35","source":"Crossref","is-referenced-by-count":8,"title":["Static Analysis of Concurrent Programs Using Ordinary Differential Equations"],"prefix":"10.1007","author":[{"given":"Zuohua","family":"Ding","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/258077.258078","volume":"6","author":"R. Allen","year":"1997","unstructured":"Allen, R., Garlan, D.: A formal basis for architectural connection. ACM Transactions on Software Engineering and Methodology\u00a06(3), 213\u2013249 (1997)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"1_CR2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971392","volume-title":"Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations","author":"U.M. Ascher","year":"1998","unstructured":"Ascher, U.M., Petzold, L.R.: Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations. Society for Industrial & Applied Mathematis, Philadelphia (1998)"},{"issue":"11","key":"1_CR3","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/32.106975","volume":"17","author":"G.S. Avrunin","year":"1991","unstructured":"Avrunin, G.S., Buy, U.A., Corbett, J.C., Dillon, L.K., Wileden, J.C.: Automated Analysis of Concurrent Systems with the Constrained Expression Toolset. IEEE Transactions on Software Engineering\u00a017(11), 1204\u20131222 (1991)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1145\/6513.6516","volume":"4","author":"D.Z. Badal","year":"1986","unstructured":"Badal, D.Z.: The Distributed Deadlock Detection Algorithm. ACM Transactions on Computer Systems\u00a04(4), 320\u2013377 (1986)","journal-title":"ACM Transactions on Computer Systems"},{"key":"1_CR5","volume-title":"Principles of Concurrent and Distributed Programming","author":"M. Ben-Ari","year":"2006","unstructured":"Ben-Ari, M.: Principles of Concurrent and Distributed Programming, 2nd edn. Addison-Wesley, Reading (2006)","edition":"2"},{"key":"1_CR6","first-page":"403","volume-title":"Proceedings of the 28th Design Automation Conference","author":"J.R. Burch","year":"1991","unstructured":"Burch, J.R., Clarke, E.M., Long, D.E.: Representing circuts more efficiently in symbolic model checking, In. In: Proceedings of the 28th Design Automation Conference, pp. 403\u2013407. IEEE Computer Society Press, Los Alamltos (1991)"},{"issue":"8","key":"1_CR7","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1109\/71.706047","volume":"9","author":"A. Boukerche","year":"1998","unstructured":"Boukerche, A., Tropper, C.: A Distributed Graph Algorithm for the Detection of Local Cycles and Knots. IEEE Trans. Parallel and Distributed Systems\u00a09(8), 748\u2013757 (1998)","journal-title":"IEEE Trans. Parallel and Distributed Systems"},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/0890-5401(92)90017-A","volume":"9","author":"J. Burch","year":"1992","unstructured":"Burch, J., Clarke, E., McMillan, K., Dill, D., Hwang, L.: Symbolic Model Checking: 1020 States and Beyond. Information and Computation\u00a09(2), 142\u2013170 (1992)","journal-title":"Information and Computation"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1145\/357360.357365","volume":"1","author":"K.M. Chandy","year":"1983","unstructured":"Chandy, K.M., Misra, J., Haas, L.M.: Distributed Deadlock Detection. ACM Transactions on Computer Systems\u00a01(2), 144\u2013156 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"5","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1145\/186025.186051","volume":"16","author":"E.M. Clarke","year":"1994","unstructured":"Clarke, E.M., Grumberg, O., Long, D.E.: Model Checking and Abstraction. ACM Transactions on Programming Language Systems\u00a016(5), 1512\u20131542 (1994)","journal-title":"ACM Transactions on Programming Language Systems"},{"key":"1_CR11","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"1_CR12","volume-title":"Proceedings of 8th Computer Aided Verification Conference","author":"E. Clarke","year":"1996","unstructured":"Clarke, E., McMillan, K., Campos, S., Hartonas-Garmhausen, V.: Symbolic Model Checking. In: Proceedings of 8th Computer Aided Verification Conference. Springer, Berlin (1996)"},{"issue":"3","key":"1_CR13","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/32.489078","volume":"22","author":"J.C. Corbett","year":"1996","unstructured":"Corbett, J.C.: Evaluating Deadlock Detection Methods for Concurrent Software. IEEE Transactions on Software Engineering\u00a022(3), 161\u2013180 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/BF01384316","volume":"6","author":"J.C. Corbett","year":"1995","unstructured":"Corbett, J.C., Avrunin, G.S.: Using integer programming to verify general safety and liveness properties. Formal Methods in System Desin\u00a06, 97\u2013123 (1995)","journal-title":"Formal Methods in System Desin"},{"key":"1_CR15","unstructured":"David, R., Alla, H.: Continuous Petri nets. In: Proceedings of 8th European Workshop on Application and Theory of Petri nets, Zaragoza, Spain, pp. 275\u2013294 (1987)"},{"key":"1_CR16","unstructured":"David, R., Alla, H.: Autonomous and timed continuous Petri nets. In: Proceedings of 11th Int. Conf. on Application and Theory of Petri nets, Paris, France, pp. 367\u2013381 (1990)"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF00289519","volume":"2","author":"E.W. Dijkstra","year":"1971","unstructured":"Dijkstra, E.W.: Hierarchical Ordering of Sequential Processes. Acta Informat\u00a02, 115\u2013138 (1971)","journal-title":"Acta Informat"},{"issue":"1","key":"1_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0020-0190(80)90021-6","volume":"11","author":"E.W. Dijkstra","year":"1980","unstructured":"Dijkstra, E.W., Scholten, C.S.: Termination Detection for Diffusing Computations. Information Processing Letters\u00a011(1), 1\u20134 (1980)","journal-title":"Information Processing Letters"},{"key":"1_CR19","volume-title":"Proceedings of FTDCS 2008","author":"Z. Ding","year":"2008","unstructured":"Ding, Z., Xiao, L., Hu, J.: Performance analysis of service composition using ordinary differential equations. In: Proceedings of FTDCS 2008, Kunming, China, October 21-23. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"1_CR20","volume-title":"COMPSAC 2008","author":"Z. Ding","year":"2008","unstructured":"Ding, Z., Zhang, K.: Performance analysis of concurrent programs using ordinary differential equations. In: COMPSAC 2008, Turku, Finland, July 28-August 1. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"4057","DOI":"10.1016\/j.ins.2008.06.020","volume":"178","author":"Z. Ding","year":"2008","unstructured":"Ding, Z., Zhang, K., Hua, J.: A Rigorous Approach Towards Test Case Generation. Information Sciences\u00a0178, 4057\u20134079 (2008)","journal-title":"Information Sciences"},{"issue":"4","key":"1_CR22","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1145\/201024.201038","volume":"3","author":"S. Duri","year":"1994","unstructured":"Duri, S., Buy, U., Devarapalli, R., Shatz, S.M.: Application and Experimental Evaluation of State Space Reduction Methods for Deadlock Analysis in Ada. ACM Transactions on Software Engneering and Methodology\u00a03(4), 340\u2013380 (1994)","journal-title":"ACM Transactions on Software Engneering and Methodology"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Clarke, L.A.: Data flow analysis for verifying properties of concurrent programs. In: Proc. Second Symp. Foundations of Software Enginemng, pp. 62\u201375 (1994)","DOI":"10.1145\/195274.195295"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/11767589_11","volume-title":"Petri Nets and Other Models of Concurrency - ICATPN 2006","author":"D. Gilbert","year":"2006","unstructured":"Gilbert, D., Heiner, M.: From Petri nets to differential equations-an integrative approach for biochemical network analysis. In: Donatelli, S., Thiagarajan, P.S. (eds.) ICATPN 2006. LNCS, vol.\u00a04024, pp. 181\u2013200. Springer, Heidelberg (2006)"},{"key":"1_CR25","volume-title":"Application and Theory of Petri Nets, Informatik Fachberichte","author":"U. Goltz","year":"1982","unstructured":"Goltz, U., Reisig, W.: Weighted Synchronic Distance. In: Application and Theory of Petri Nets, Informatik Fachberichte, vol.\u00a052. Springer, Heidelberg (1982)"},{"issue":"11","key":"1_CR26","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1109\/32.553699","volume":"22","author":"M.B. Dwyer","year":"1996","unstructured":"Dwyer, M.B., Clarke, L.A.: A compact Petri Net Representation and Its Implications for Analysis. IEEE Transactions on Software Engineering\u00a022(11), 794\u2013811 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Pirottin, D.: Refining Dependendes Improves Partial- Order verification Methods. In: Courcoubetis (ed.) Proc. Fifth lnt\u2019l conf: Computer Aided Verfication, Elounda, Greece, pp. 438\u2013449 (1993)","DOI":"10.1007\/3-540-56922-7_36"},{"key":"1_CR28","unstructured":"Hale, J.K.: Ordinary Differential Equations. Interscience, New York (1969)"},{"key":"1_CR29","volume-title":"Solving Ordinary Differential Equations(I), Nonstiff Problems","author":"E. Hairer","year":"1993","unstructured":"Hairer, E., N\u03c6rsett, S.P., Wanner, G.: Solving Ordinary Differential Equations(I), Nonstiff Problems, 2nd edn. Springer, Heidelberg (1993)","edition":"2"},{"issue":"2","key":"1_CR30","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MS.1985.230351","volume":"2","author":"D. Helmbold","year":"1985","unstructured":"Helmbold, D., Luckham, D.: Debugging Ada tasking programs. IEEE Software\u00a02(2), 47\u201357 (1985)","journal-title":"IEEE Software"},{"key":"1_CR31","unstructured":"Herrmann, J.W., Lin, E.: Petri Nets: Tutorial and Applications. In: The 32th Annual Symposium of the Washington Operations Research-Management Science Council, Washington, D.C., November 5 (1997)"},{"issue":"8","key":"1_CR32","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"C.A.R. Hoare","year":"1978","unstructured":"Hoare, C.A.R.: Communicating sequential processes. Communication of ACM\u00a021(8), 666\u2013677 (1978)","journal-title":"Communication of ACM"},{"issue":"3","key":"1_CR33","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/356603.356607","volume":"4","author":"R.C. Holt","year":"1972","unstructured":"Holt, R.C.: Some Deadlock Properties on Computer Systems. ACM Compuling Surveys\u00a04(3), 179\u2013196 (1972)","journal-title":"ACM Compuling Surveys"},{"key":"1_CR34","unstructured":"Holzmann, G.J.: Basic Spin Manual (1980), http:\/\/cm.bell-labs.com\/netlib\/spin\/whatispin.html"},{"issue":"1","key":"1_CR35","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1145\/77606.77611","volume":"12","author":"S.T. Huang","year":"1990","unstructured":"Huang, S.T.: A Distributed Deadlock Detection Algorithm for CSP-Like Communication. ACM Transactions on Programming Languages and Systems\u00a012(1), 102\u2013122 (1990)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"12","key":"1_CR36","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1145\/355588.365137","volume":"7","author":"J. Intievergelt","year":"1964","unstructured":"Intievergelt, J.: Parallel methods for integrating ordinary differential equations. Communications of the ACM\u00a07(12), 731\u2013733 (1964)","journal-title":"Communications of the ACM"},{"issue":"3","key":"1_CR37","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1145\/293677.293681","volume":"20","author":"E. Juan","year":"1998","unstructured":"Juan, E., Tsai, J.J.P., Murata, T.: Compositional verification of concurrent systems using Petri-nets-based condensation rules. ACM Transactions on Programming Languages and Systems\u00a020(3), 917\u2013979 (1998)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"8","key":"1_CR38","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/32.57622","volume":"16","author":"G.M. Karam","year":"1990","unstructured":"Karam, G.M., Buhr, R.J.: Starvation and Critical Race Analyzers For Ada. IEEE Transactions on Software Engineering\u00a016(8), 829\u2013843 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1_CR39","unstructured":"Kim, Y.M., Lai, T.H., Soundarajan, N.: Efficient Distributed Deadlock Detection and Resolution Using Probes, Tokens, and Barriers. In: Proc. Int\u2019l Conf. Parallel and Distributed Systems, pp. 584\u2013591 (1997)"},{"issue":"9","key":"1_CR40","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TSE.2004.51","volume":"30","author":"S. Lee","year":"2004","unstructured":"Lee, S.: Fast, Centralized Detection and Resolution of Distributed Deadlocks in the Generalized Model. IEEE Transactions on Software Engineering\u00a030(9), 561\u2013573 (2004)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Lin, B.: Efficient Compilation of Process-based Concurrent Programs Without Run-time Scheduling. In: Proceedings of Design, Automation, and Test in Europe (DATE), Paris, pp. 211\u2013217 (1998)","DOI":"10.1109\/DATE.1998.655859"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Long, D.L., Clarke, L.A.: Task Interaction Graphs for Concurrency Analysis. In: Proc. 11th lntl. Conf. Software Eng, Pittsburgh, Penn, pp. 44\u201352 (1989)","DOI":"10.1145\/74587.74592"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Lunze, J., Nixdorf, B., Richter, H.: Hybrid modelling of continuous-variable systems with application to supervisory control. In: Proceedings of the European Control Conference 1997, Brussels, Belgium (1997)","DOI":"10.23919\/ECC.1997.7082292"},{"issue":"1","key":"1_CR44","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/0096-0551(85)90010-4","volume":"10","author":"D. Mandrioli","year":"1985","unstructured":"Mandrioli, D., Zicari, R., Ghezzi, C., Tisato, F.: Modeling the Ada Task System by Petri nets. Computer Languages\u00a010(1), 43\u201361 (1985)","journal-title":"Computer Languages"},{"key":"1_CR45","unstructured":"Masticola, S.P., Ryder, E.G.: Static Infinite Wait Anomaly Detection in Polynomial Time. In: Proceedings of 1990 International Conference on Parallel Processing, vol.\u00a02, pp. 78\u201387 (1990)"},{"key":"1_CR46","unstructured":"Math Department, East China Normal University: Mathematics Analysis (I)(II), 3rd edn. High education Press, China (2001)"},{"key":"1_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3190-6","volume-title":"Symbolic Model Checking","author":"K.L. McMillan","year":"1993","unstructured":"McMillan, K.L.: Symbolic Model Checking. Kluwer Academic Publishers, Boston (1993)"},{"issue":"4","key":"1_CR48","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1145\/69622.357190","volume":"4","author":"J. Misra","year":"1982","unstructured":"Misra, J., Chandy, K.M.: A Distributed Graph Algorithm: Knot Detection. ACM Transactions on Programming Languages and Systems\u00a04(4), 678\u2013686 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"1_CR49","unstructured":"Molloy, M.K.: Fast bounds for stochastic Petri nets. In: International Workshop on Timed Petri Nets, Torino, July 1985, pp. 244\u2013249 (1985)"},{"issue":"10","key":"1_CR50","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TSE.1987.232850","volume":"12","author":"E.T. Morgan","year":"1987","unstructured":"Morgan, E.T., Razouk, R.R.: Interactive State Space Analysis of Concurrent Systems. IEEE Transitions on Software Engineering\u00a012(10), 1080\u20131091 (1987)","journal-title":"IEEE Transitions on Software Engineering"},{"issue":"4","key":"1_CR51","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/TSE.1986.6312900","volume":"SE-12","author":"N. Natarajan","year":"1986","unstructured":"Natarajan, N.: A Distributed Scheme for Detecting Communication Deadlocks. IEEE Transactions on Software Engineering\u00a0SE-12(4), 531\u2013537 (1986)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"1_CR52","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/267896.267904","volume":"22","author":"G. Naumovich","year":"1997","unstructured":"Naumovich, G., Avrunin, G., Clarke, L.: Applying Static Analysis to Software Architectures. ACM SIGSOFT Notes\u00a022(6), 77\u201393 (1997)","journal-title":"ACM SIGSOFT Notes"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Ng, W.K., Ravishankar, C.V.: On-Line Detection and Resolution of Communication Deadlocks. In: Proc. 27th Ann. Hawaii Int\u2019l Conf. System Science, pp. 524\u2013533 (1994)","DOI":"10.1109\/HICSS.1994.323231"},{"issue":"5","key":"1_CR54","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/32.286423","volume":"20","author":"M. Notomi","year":"1994","unstructured":"Notomi, M., Murata, T.: Hierarchical Reachability Graph of Bounded Petri Nets for Concurrent-Software Analysis. IEEE Transactions on Software Engineering\u00a020(5), 325\u2013336 (1994)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"1_CR55","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/319702.319717","volume":"7","author":"R. Obermarck","year":"1982","unstructured":"Obermarck, R.: Distributed Deadlock Detection Algorithm. ACM Trans. Database Syst.\u00a07(2), 187\u2013208 (1982)","journal-title":"ACM Trans. Database Syst."},{"key":"1_CR56","unstructured":"PAT, http:\/\/www.comp.nus.edu.sg\/~pat\/"},{"issue":"9","key":"1_CR57","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1016\/0005-1098(94)90007-8","volume":"30","author":"P. Peleties","year":"1994","unstructured":"Peleties, P., DeCarlo, R.: Analysis of hybrid systems using symbolic dynamics and Petri nets. Automatica\u00a030(9), 1421\u20131427 (1994)","journal-title":"Automatica"},{"key":"1_CR58","volume-title":"Operating System Concepts","author":"J.L. Peterson","year":"1983","unstructured":"Peterson, J.L., Silberschatz, A.: Operating System Concepts. Addison-Wesley, Reading (1983)"},{"issue":"2","key":"1_CR59","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/210134.210180","volume":"4","author":"M. Pezz\u00e9","year":"1995","unstructured":"Pezz\u00e9, M., Taylor, R.N., Young, M.: Graph Models for Reachability Analysis. ACM Transactions on Software Engmeermg and Methodology\u00a04(2), 171\u2013213 (1995)","journal-title":"ACM Transactions on Software Engmeermg and Methodology"},{"issue":"1","key":"1_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01407862","volume":"19","author":"J.H. Reif","year":"1990","unstructured":"Reif, J.H., Smolka, S.A.: Data flow analysis of distributed communicating processes. Journal of Parallel Programming\u00a019(1), 1\u201330 (1990)","journal-title":"Journal of Parallel Programming"},{"issue":"7","key":"1_CR61","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/0950-5849(91)90092-P","volume":"33","author":"P. Rontogiannis","year":"1991","unstructured":"Rontogiannis, P., Pavlides, G., Levy, A.: Distributed Algorithm for Communication Deadlock Detection. Information and Software Technology\u00a033(7), 483\u2013488 (1991)","journal-title":"Information and Software Technology"},{"key":"1_CR62","volume-title":"Real Analysis","author":"H.L. Royden","year":"1988","unstructured":"Royden, H.L.: Real Analysis, 3rd edn. Macmillan Publishing Co., New York (1988)","edition":"3"},{"key":"1_CR63","unstructured":"Scheibler, D.: A Software Tool for Design and Simulation of Continuous Petri Nets (in German), Master Thesis, BTU Cottbus, Dep. of CS (2006)"},{"issue":"4","key":"1_CR64","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/71.80172","volume":"1","author":"S.M. Shatz","year":"1990","unstructured":"Shatz, S.M., Mai, K., Black, C., Tu, S.: Design and Implementation of A Petri Net-based Toolkit for Ada Tasking analysis. IEEE Trans. Par. Dist. Syst.\u00a01(4), 424\u2013441 (1990)","journal-title":"IEEE Trans. Par. Dist. Syst."},{"key":"1_CR65","doi-asserted-by":"crossref","unstructured":"Shih, C.-S., Stankovic, J.A.: Distributed Deadlock Detection in Ada Runtime Environments (1990)","DOI":"10.1145\/255471.255559"},{"key":"1_CR66","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/2.43525","volume":"22","author":"M. Singhal","year":"1989","unstructured":"Singhal, M.: Deadlock Detection in Distributed Systems. IEEE Computer\u00a022, 37\u201348 (1989)","journal-title":"IEEE Computer"},{"key":"1_CR67","doi-asserted-by":"crossref","unstructured":"Sistla, A.P., Miliades, L., Gyuris, V.: SMC: A symmetry based model checker for verification of liveness properties. In: Proceedings of 9th Computer Aided Verification Conference, Haifa, Israel (1997)","DOI":"10.1007\/3-540-63166-6_49"},{"key":"1_CR68","volume-title":"Fixed Point Theorems","author":"D.R. Smart","year":"1974","unstructured":"Smart, D.R.: Fixed Point Theorems. Cambridge Univ. Press, Cambridge (1974)"},{"issue":"5","key":"1_CR69","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1145\/69586.69587","volume":"26","author":"R. Taylor","year":"1983","unstructured":"Taylor, R.: A general purpose algorithm for analyzing concurrent programs. Communication of ACM\u00a026(5), 362\u2013376 (1983)","journal-title":"Communication of ACM"},{"key":"1_CR70","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1023\/A:1018954709174","volume":"7","author":"J.P. Tsai","year":"1999","unstructured":"Tsai, J.P., Xu, K.: An empirical evaluation of deadlock detection in software architecture specifications. Annals of Software Engineering\u00a07, 95\u2013126 (1999)","journal-title":"Annals of Software Engineering"},{"key":"1_CR71","unstructured":"Tu, S., Shatz, S.M., Murata, T.: Theory and Application of Petri Net Reduction for Ada-Tasking Deadlock Analysls. Tech. Report 91-15, EECS Dept., Univ. of Illinois, Chicago (1991)"},{"key":"1_CR72","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/BFb0023729","volume-title":"Computer-Aided Verification","author":"A. Valmari","year":"1991","unstructured":"Valmari, A.: A stubborn attack on state explosion. In: Clarke, E., Kurshan, R.P. (eds.) CAV 1990. LNCS, vol.\u00a0531, pp. 156\u2013165. Springer, Heidelberg (1991)"},{"issue":"3","key":"1_CR73","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.entcs.2006.10.052","volume":"175","author":"X. Wang","year":"2007","unstructured":"Wang, X., Kwiatkowska, M.: Compositional state space reduction using untangled actions. Electronic Notes in Computer Science\u00a0175(3), 27\u201346 (2007)","journal-title":"Electronic Notes in Computer Science"},{"issue":"12","key":"1_CR74","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/32.58770","volume":"5","author":"B.E. Wojcik","year":"1989","unstructured":"Wojcik, B.E., Wojcik, Z.M.: Sufficient Condition for a Communication Deadlock and Distributed Deadlock Detection. IEEE Transactions on Software Engineering\u00a05(12), 1587\u20131595 (1989)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1_CR75","first-page":"178","volume-title":"Roc. Symp. Testing, Analysis, and Verfication (TAV4)","author":"W.J. Yeh","year":"1991","unstructured":"Yeh, W.J., Young, M.: Compositional Reachabhty Analysls Uslng procesS Algebra. In: Roc. Symp. Testing, Analysis, and Verfication (TAV4), pp. 178\u2013187. ACM SIGSOFT, New York (1991)"},{"key":"1_CR76","doi-asserted-by":"crossref","unstructured":"Young, M., Taylor, R.N., Forester, K., Brodbeck, D.: Integrated Concurrency Analysis In A Software Development Environment. In: Proceedings of the ACM SIGSOFT 1989 3rd Symposium on Software Testing, Analysis and Verification. Software Engineering Notes, vol.\u00a014(8), pp. 200\u2013209 (1989)","DOI":"10.1145\/75309.75331"},{"key":"1_CR77","doi-asserted-by":"crossref","unstructured":"Zhou, J., Tai, K.C.: Deadlock Analysis of Synchronous Message-Passing Programs. In: Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 62\u201369 (1999)","DOI":"10.1109\/PDSE.1999.779739"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing - ICTAC 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03466-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:12:41Z","timestamp":1739290361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03466-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642034657","9783642034664"],"references-count":77,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03466-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}