{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T18:40:19Z","timestamp":1743619219977,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642307287"},{"type":"electronic","value":"9783642307294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30729-4_12","type":"book-chapter","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T08:49:46Z","timestamp":1340786986000},"page":"158-173","source":"Crossref","is-referenced-by-count":6,"title":["Mechanized Extraction of Topology Anti-patterns in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Woehrle","sequence":"first","affiliation":[]},{"given":"Rena","family":"Bakhshi","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Mousavi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.1016\/j.jss.2009.06.035","volume":"82","author":"R. Abreu","year":"2009","unstructured":"Abreu, R., Zoeteweij, P., Golsteijn, R., van Gemund, A.: A practical evaluation of spectrum-based fault localization. Journal of Systems and Software\u00a082(11), 1780\u20131792 (2009)","journal-title":"Journal of Systems and Software"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Bakhshi, R., Endrullis, J., Endrullis, S., Fokkink, W., Haverkort, B.: Automating the mean-field method for large dynamic gossip networks. In: Proc. Conf. on Quantitative Evaluation of SysTems (QEST), pp. 241\u2013250. IEEE Computer Society (2010)","DOI":"10.1109\/QEST.2010.38"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G. Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A Tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol.\u00a03185, pp. 200\u2013236. Springer, Heidelberg (2004)"},{"key":"12_CR4","first-page":"265","volume-title":"Proc. 8th ACM\/IEEE Int\u2019l Conf. on Information Processing in Sensor Networks (IPSN 2009)","author":"J. Beutel","year":"2009","unstructured":"Beutel, J., Gruber, S., Hasler, A., Lim, R., Meier, A., Plessl, C., Talzi, I., Thiele, L., Tschudin, C., Woehrle, M., Yuecel, M.: PermaDAQ: A scientific instrument for precision sensing and data recovery in environmental extremes. In: Proc. 8th ACM\/IEEE Int\u2019l Conf. on Information Processing in Sensor Networks (IPSN 2009), pp. 265\u2013276. ACM\/IEEE, San Francisco, CA, USA (2009)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Cadilhac, M., H\u00e9rault, T., Lassaigne, R., Peyronnet, S., Tixeuil, S.: Evaluating complex MAC protocols for sensor networks with APMC. In: Proc. Workshop on Automated Verification of Critical Syst. (AVoCS 2006). ENTCS, vol.\u00a0185, pp. 33\u201346. Elsevier (2007)","DOI":"10.1016\/j.entcs.2007.05.027"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1029894.1029908","volume-title":"Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering, SIGSOFT 2004\/FSE-12","author":"S. Chaki","year":"2004","unstructured":"Chaki, S., Groce, A., Strichman, O.: Explaining abstract counterexamples. In: Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering, SIGSOFT 2004\/FSE-12, pp. 73\u201382. ACM, New York (2004)"},{"key":"12_CR7","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press (2000)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-39910-0_9","volume-title":"Verification: Theory and Practice","author":"E.M. Clarke","year":"2004","unstructured":"Clarke, E.M., Veith, H.: Counterexamples Revisited: Principles, Algorithms, Applications. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol.\u00a02772, pp. 208\u2013224. Springer, Heidelberg (2004)"},{"issue":"1\/2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/BF00625970","volume":"9","author":"E.A. Emerson","year":"1996","unstructured":"Emerson, E.A., Sistla, A.P.: Symmetry and model checking. Formal Methods in System Design\u00a09(1\/2), 105\u2013131 (1996)","journal-title":"Formal Methods in System Design"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-73210-5_14","volume-title":"Integrated Formal Methods","author":"A. Fehnker","year":"2007","unstructured":"Fehnker, A., van Hoesel, L., Mader, A.: Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol.\u00a04591, pp. 253\u2013272. Springer, Heidelberg (2007)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/BFb0023731","volume-title":"Computer-Aided Verification","author":"P. Godefroid","year":"1991","unstructured":"Godefroid, P.: Using Partial Orders to Improve Automatic Verification Methods. In: Clarke, E., Kurshan, R.P. (eds.) CAV 1990. LNCS, vol.\u00a0531, pp. 176\u2013185. Springer, Heidelberg (1991)"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-44829-2_8","volume-title":"Model Checking Software","author":"A. Groce","year":"2003","unstructured":"Groce, A., Visser, W.: What Went Wrong: Explaining Counterexamples. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol.\u00a02648, pp. 121\u2013135. Springer, Heidelberg (2003)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11691372_29","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Hinton","year":"2006","unstructured":"Hinton, A., Kwiatkowska, M., Norman, G., Parker, D.: PRISM: A Tool for Automatic Verification of Probabilistic Systems. In: Hermanns, H. (ed.) TACAS 2006. LNCS, vol.\u00a03920, pp. 441\u2013444. Springer, Heidelberg (2006)"},{"issue":"1\/2","key":"12_CR14","first-page":"41","volume":"9","author":"C.N. Ip","year":"1996","unstructured":"Ip, C.N., Dill, D.L.: Better verification through symmetry. Formal Methods in System Design\u00a09(1\/2), 41\u201375 (1996)","journal-title":"Formal Methods in System Design"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Kamali, M., Laibinis, L., Petre, L., Sere, K.: Self-recovering sensor-actor networks. In: Mousavi, M.R., Sala\u00fcn, G. (eds.) FOCLASA. EPTCS, vol.\u00a030, pp. 47\u201361 (2010)","DOI":"10.4204\/EPTCS.30.4"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-71209-1_9","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J.-P. Katoen","year":"2007","unstructured":"Katoen, J.-P., Kemna, T., Zapreev, I., Jansen, D.N.: Bisimulation Minimisation Mostly Speeds Up Probabilistic Model Checking. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 87\u2013101. Springer, Heidelberg (2007)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-73368-3_37","volume-title":"Computer Aided Verification","author":"J.-P. Katoen","year":"2007","unstructured":"Katoen, J.-P., Klink, D., Leucker, M., Wolf, V.: Three-Valued Abstraction for Continuous-Time Markov Chains. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol.\u00a04590, pp. 311\u2013324. Springer, Heidelberg (2007)"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/1460412.1460423","volume-title":"SenSys 2008: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems","author":"M.M.H. Khan","year":"2008","unstructured":"Khan, M.M.H., Le, H.K., Ahmadi, H., Abdelzaher, T.F., Han, J.: Dustminer: troubleshooting interactive complexity bugs in sensor networks. In: SenSys 2008: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 99\u2013112. ACM, New York (2008)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: Game-based abstraction for markov decision processes. In: Proc. Conf. on Quantitative Evaluation of SysTems (QEST), pp. 157\u2013166. IEEE Computer Society (2006)","DOI":"10.1109\/QEST.2006.19"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Laplante, S., Lassaigne, R., Magniez, F., Peyronnet, S., de Rougemont, M.: Probabilistic abstraction for model checking: An approach based on property testing. In: Proc. IEEE Symp. on Logic in Comput. Sci. (LICS 2002), pp. 30\u201339. IEEE Computer Society (2002)","DOI":"10.1109\/LICS.2002.1029815"},{"key":"12_CR21","unstructured":"Levis, P., Patel, N., Culler, D., Shenker, S.: Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, vol.\u00a01, p. 2. USENIX Association (2004)"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/1644038.1644057","volume-title":"Proc. ACM Conf. on Embedded Networked Sensor Systems, SenSys 2009","author":"K. Lorincz","year":"2009","unstructured":"Lorincz, K., Chen, B.-R., Challen, G.W., Chowdhury, A.R., Patel, S., Bonato, P., Welsh, M.: Mercury: a wearable sensor network platform for high-fidelity motion analysis. In: Proc. ACM Conf. on Embedded Networked Sensor Systems, SenSys 2009, pp. 183\u2013196. ACM, New York (2009)"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-540-69170-9_17","volume-title":"Distributed Computing in Sensor Systems","author":"M.M.H. Khan","year":"2008","unstructured":"Khan, M.M.H., Abdelzaher, T., Gupta, K.K.: Towards Diagnostic Simulation in Sensor Networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol.\u00a05067, pp. 252\u2013265. Springer, Heidelberg (2008)"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1809111.1809122","volume-title":"Proc. ICSE Workshop on Software Engineering for Sensor Network Applications (SESENA)","author":"L. Mottola","year":"2010","unstructured":"Mottola, L., Voigt, T., \u00d6sterlind, F., Eriksson, J., Baresi, L., Ghezzi, C.: Anquiro: enabling efficient static verification of sensor network software. In: Proc. ICSE Workshop on Software Engineering for Sensor Network Applications (SESENA), pp. 32\u201337. ACM, New York (2010)"},{"key":"12_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/3-540-56922-7_34","volume-title":"Computer Aided Verification","author":"D. Peled","year":"1993","unstructured":"Peled, D.: All From One, One For All: on Model Checking Using Representatives. In: Courcoubetis, C. (ed.) CAV 1993. LNCS, vol.\u00a0697, pp. 409\u2013423. Springer, Heidelberg (1993)"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/3-540-44862-4_95","volume-title":"Computational Science \u2013 ICCS 2003","author":"A.S. Rodionov","year":"2003","unstructured":"Rodionov, A.S., Choo, H.: On Generating Random Network Structures: Trees. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003, Part II. LNCS, vol.\u00a02658, pp. 879\u2013887. Springer, Heidelberg (2003)"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/BFb0023729","volume-title":"Computer-Aided Verification","author":"A. Valmari","year":"1991","unstructured":"Valmari, A.: A Stubborn Attack on State Explosion. In: Clarke, E., Kurshan, R.P. (eds.) CAV 1990. LNCS, vol.\u00a0531, pp. 156\u2013165. Springer, Heidelberg (1991)"},{"key":"12_CR28","unstructured":"van Hoesel, L., Havinga, P.: A lightweight medium access protocol (LMAC) for wireless sensor networks: Reducing preamble transmissions and transceiver state switches. In: Proc. Workshop on Networked Sensing Systems (INSS), pp. 205\u2013208. Society of Instrument and Control Engineers, SICE (2004)"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A. Zeller","year":"2002","unstructured":"Zeller, A., Hildebrandt, R.: Simplifying and isolating failure-inducing input. IEEE Trans. Softw. Eng.\u00a028, 183\u2013200 (2002)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30729-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T18:21:22Z","timestamp":1743618082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30729-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642307287","9783642307294"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30729-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}