{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:17:11Z","timestamp":1726409831646},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642198342"},{"type":"electronic","value":"9783642198359"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19835-9_20","type":"book-chapter","created":{"date-parts":[[2011,3,14]],"date-time":"2011-03-14T15:03:16Z","timestamp":1300114996000},"page":"239-253","source":"Crossref","is-referenced-by-count":0,"title":["Biased Model Checking Using Flows"],"prefix":"10.1007","author":[{"given":"Muralidhar","family":"Talupur","sequence":"first","affiliation":[]},{"given":"Hyojung","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Chen, X., Gopalakrishnan, G.: Bt: a bounded transaction model checking for cache coherence protocols. Technical report UUCS-06-003, School of Computing, University of Utah (2006)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Edelkamp, S., Leue, S., Lluch-Lafuente, A.: Directed Explicit state model checking in validation of Communication protocols. In: Proceedings of STTT (2004)","DOI":"10.1007\/s10009-002-0104-3"},{"key":"20_CR3","unstructured":"Edelkamp, S., Lluch-Lafuente, A., Leue, S.: Protocol Verification with Heuristic Search. In: AAAI Symposium on Model-based validation of Intelligence (2001)"},{"key":"20_CR4","unstructured":"Hajek, J.: Automatically verified data transfer protocols. In: Proceedings of the International Computer Communications Conference (1978)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Musuvathi, M., Burckhardt, S., Kothari, P., Nagarakatte, S.: A randomized scheduler with probabilistic guarantees of finding bugs. In: ASPLOS (2010)","DOI":"10.1145\/1736020.1736040"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Musuvathi, M., Qadeer, S.: Iterative context bounding for systematic testing of multithreaded programs. In: PLDI (2007)","DOI":"10.1145\/1250734.1250785"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"O\u2019Leary, J., Talupur, M., Tuttle, M.R.: Protocol Verification using Flows: An Industrial Experience. In: Proc. FMCAD (2009)","DOI":"10.1109\/FMCAD.2009.5351126"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Qadeer, S., Wu, D.: Kiss: keep it simple and sequential. In: PLDI (2004)","DOI":"10.1145\/996841.996845"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Ravi, K., Somenzi, F.: Hints to accelerate Symbolic Traversal. In: Proceedings of the 10th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification Methods (1999)","DOI":"10.1007\/3-540-48153-2_19"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/3-540-48119-2_13","volume-title":"FM\u201999 - Formal Methods","author":"F. Reffel","year":"1999","unstructured":"Reffel, F., Edelkamp, S.: Error detection with directed symbolic model checking. In: Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 195\u2013211. Springer, Heidelberg (1999)"},{"key":"20_CR11","unstructured":"Talupur, M.: Murphi models of German\u2019s and Flash protocols along with the bugs, \n                    \n                      www.cs.cmu.edu\/~tmurali\/fmcad10"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Talupur, M., Tuttle, M.R.: Going with the Flow: Parameterized Verification using Message Flows. In: Proc. FMCAD (2008)","DOI":"10.1109\/FMCAD.2008.ECP.14"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Yang, C.H., Dill, D.L.: Validation with guided search of the state space. In: Proceedings of the 35th Annual Design Automation Conference (1998)","DOI":"10.1145\/277044.277201"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19835-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T11:24:16Z","timestamp":1558437856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19835-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198342","9783642198359"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19835-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}