{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T09:54:08Z","timestamp":1742378048216,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642158971"},{"type":"electronic","value":"9783642158988"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15898-8_8","type":"book-chapter","created":{"date-parts":[[2010,9,13]],"date-time":"2010-09-13T09:43:47Z","timestamp":1284371027000},"page":"115-131","source":"Crossref","is-referenced-by-count":5,"title":["Correctness of Sensor Network Applications by Software Bounded Model Checking"],"prefix":"10.1007","author":[{"given":"Frank","family":"Werner","sequence":"first","affiliation":[]},{"given":"David","family":"Farag\u00f3","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Motor Industry Research Association. MISRA-C 2004: Guidelines for the Use of the C Language in Critical Systems. Motor Industry Research Association (September 2004)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bla\u00df, E.-O., Wilke, J., Zitterbart, M.: Relaxed Authenticity for Data Aggregation in Wireless Sensor Networks. In: 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), Istanbul, Turkey (September 2008)","DOI":"10.1145\/1460877.1460883"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-05408-2_12","volume-title":"Ambient Intelligence","author":"D. Bucur","year":"2009","unstructured":"Bucur, D., Kwiatkowska, M.: Ambient Intelligence. In: Tscheligi, M., de Ruyter, B., Markopoulus, P., Wichert, R., Mirlacher, T., Meschterjakov, A., Reitberger, W. (eds.) AmI 2009. LNCS, vol.\u00a05859, pp. 101\u2013105. Springer, Heidelberg (2009)"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1145\/1791212.1791274","volume-title":"Proc. 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)","author":"D. Bucur","year":"2010","unstructured":"Bucur, D., Kwiatkowska, M.: Towards Software Verification for TinyOS Applications. In: Proc. 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Computing Laboratory, Oxford University, UK, pp. 400\u2013401. ACM, New York (April 2010)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Calvert, K.L., Griffioen, J., Sehgal, A., Wen, S.: Concast: Design and implementation of a new network service. In: Proceedings of 1999 International Conference on Network Protocols (1999)","DOI":"10.1109\/ICNP.1999.801963"},{"key":"8_CR6","unstructured":"CBMC: Bounded Model Checking for ANSI-C, http:\/\/www.cprover.org\/cbmc\/ (March 2010)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E.M. Clarke","year":"2004","unstructured":"Clarke, E.M., Kroening, D., Lerda, F.: A Tool for Checking ANSI-C Programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 168\u2013176. Springer, Heidelberg (2004)"},{"key":"8_CR8","unstructured":"Cohen, E., Moskal, M., Schulte, W., Tobies, S.: A practical verification methodology for concurrent programs. Technical Report MSR-TR-2009-15, Microsoft Research (February 2009)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-540-24605-3_37","volume-title":"Theory and Applications of Satisfiability Testing","author":"N. E\u00e9n","year":"2004","unstructured":"E\u00e9n, N., S\u00f6rensson, N.: An Extensible SAT-solver. In: Giunchiglia, E., Tacchella, A. (eds.) SAT 2003. LNCS, vol.\u00a02919, pp. 502\u2013518. Springer, Heidelberg (2004)"},{"key":"8_CR10","unstructured":"Emerson Smart Wireless, http:\/\/www2.emersonprocess.com\/en-us\/plantweb\/wireless\/pages\/wirelesshomepage.aspx"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-77966-7_3","volume-title":"Hardware and Software: Verification and Testing","author":"A. Gupta","year":"2008","unstructured":"Gupta, A.: From hardware verification to software verification: Re-use and re-learn. In: Yorav, K. (ed.) HVC 2007. LNCS, vol.\u00a04899, pp. 14\u201315. Springer, Heidelberg (2008)"},{"key":"8_CR12","unstructured":"Ioannis, K., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In: Proceedings of the 13th European Wireless Conference (2007)"},{"key":"8_CR13","unstructured":"Killian, C., Anderson, J.W., Jhala, R., Vahdat, A.: Life, death, and the critical transition: Detecting liveness bugs in systems code. In: Proc. of the 4th Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, USA (2007)"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1145\/1791212.1791234","volume-title":"Proc. 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)","author":"P. Li","year":"2010","unstructured":"Li, P., Regehr, J.: T-Check: Bug Finding for Sensor Networks. In: Proc. 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), School of Computing, University of Utah, USA, pp. 174\u2013185. ACM, New York (April 2010)"},{"key":"8_CR15","volume-title":"Proc. 1st International Workshop on Software Engineering for Sensor Networks (SESENA - Colocated with 32nd ACM\/IEEE International Conference on Software Engineering ICSE)","author":"L. Mottola","year":"2010","unstructured":"Mottola, L., Voigt, T., \u00d6sterlind, F., Eriksson, J., Baresi, L., Ghezzi, C.: Anquiro: Enabling Efficient Static Verification of Sensor Network Software. In: Proc. 1st International Workshop on Software Engineering for Sensor Networks (SESENA - Colocated with 32nd ACM\/IEEE International Conference on Software Engineering ICSE), ACM, New York (2010)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/ASE.2008.29","volume-title":"ASE \u201908: Proceedings of the 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering","author":"H. Post","year":"2008","unstructured":"Post, H., Sinz, C., Kaiser, A., Gorges, T.: Reducing false positives by combining abstract interpretation and bounded model checking. In: ASE \u201908: Proceedings of the 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering, Washington, DC, USA, pp. 188\u2013197. IEEE Computer Society, Los Alamitos (2008)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Rosen, B., Wegman, M., Zadeck, F.: Global value numbers and redundant computations. In: 15th ACM Symposium on principles of Programming Languages, pp. 12\u201327 (1988)","DOI":"10.1145\/73560.73562"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-02652-2_19","volume-title":"Model Checking Software","author":"O. Sharma","year":"2009","unstructured":"Sharma, O., Lewis, J., Miller, A., Dearle, A., Balasubramaniam, D., Morrison, R., Sventek, J.: Model Checking Software. In: P\u0103s\u0103reanu, C.S. (ed.) SPIN Workshop. LNCS, vol.\u00a05578, pp. 223\u2013240. Springer, Heidelberg (2009)"},{"key":"8_CR19","unstructured":"SureCross Wireless Industrial I\/O Sensor Network Applications, http:\/\/www.bannerengineering.com\/en-us\/wireless\/surecross_web_appnotes"},{"key":"8_CR20","unstructured":"TinyOS: An open-source OS for the networked sensor regime (March 2010), http:\/\/www.tinyos.net"},{"key":"8_CR21","unstructured":"Werner, F., Steffen, R.: Modeling Security Aspects of Network Aggregation Protocols. In: 8. GI\/ITG KuVS Fachgespr\u00e4ch Drahtlose Sensornetze, Hamburg, pp. 83\u201386 (August 2009)"},{"key":"8_CR22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1031495.1031498","volume-title":"SENSYS","author":"N. Xu","year":"2004","unstructured":"Xu, N., Rangwala, S., Chintalapudi, K.K., Ganesan, D., Broad, A., Govindan, R., Estrin, D.: A wireless sensor network for structural monitoring. In: SENSYS, pp. 13\u201324. ACM, New York (2004)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Zitterbart, M., Bla\u00df, E.-O.: An Efficient Key Establishment Scheme for Secure Aggregating Sensor Networks. In: ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, pp. 303\u2013310 (March 2006) ISBN 1-59593-272-0","DOI":"10.1145\/1128817.1128863"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15898-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:51:50Z","timestamp":1740509510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15898-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642158971","9783642158988"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15898-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}