{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T19:58:47Z","timestamp":1762459127274},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405600"},{"type":"electronic","value":"9783642405617"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40561-7_8","type":"book-chapter","created":{"date-parts":[[2013,9,18]],"date-time":"2013-09-18T13:10:29Z","timestamp":1379509829000},"page":"106-121","source":"Crossref","is-referenced-by-count":4,"title":["Rule-Level Verification of Graph Transformations for Invariants Based on Edges\u2019 Transitive Closure"],"prefix":"10.1007","author":[{"given":"Christian","family":"Percebois","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Strecker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hanh Nhi","family":"Tran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Becker, B., Beyer, D., Giese, H., Klein, F., Schilling, D.: Symbolic invariant verification for systems with dynamic structural adaptation. In: Proceedings of the 28th International Conference on Software Engineering, ICSE 2006 pp. 72\u201381. ACM (2006)","DOI":"10.1145\/1134285.1134297"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-21732-6_9","volume-title":"Theory and Practice of Model Transformations","author":"B. Becker","year":"2011","unstructured":"Becker, B., Lambers, L., Dyck, J., Birth, S., Giese, H.: Iterative development of consistency-preserving rule-based refactorings. In: Cabot, J., Visser, E. (eds.) ICMT 2011. LNCS, vol.\u00a06707, pp. 123\u2013137. Springer, Heidelberg (2011)"},{"issue":"5","key":"8_CR3","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1093\/jigpal\/jzp021","volume":"17","author":"M.R.F. Benevides","year":"2009","unstructured":"Benevides, M.R.F., Menasch\u00e9 Schechter, L.: Using modal logics to express and check global graph properties. Logic Journal of IGPL\u00a017(5), 559\u2013587 (2009)","journal-title":"Logic Journal of IGPL"},{"key":"8_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-15240-5_15","volume-title":"Theoretical Computer Science","author":"H.J. Sander Bruggink","year":"2010","unstructured":"Sander Bruggink, H.J., K\u00f6nig, B.: A logic on subobjects and recognizability. In: Calude, C.S., Sassone, V. (eds.) TCS 2010. IFIP Advances in Information and Communication Technology, vol.\u00a0323, pp. 197\u2013212. Springer, Heidelberg (2010)"},{"issue":"1-2","key":"8_CR5","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/FI-2012-705","volume":"118","author":"H. Ehrig","year":"2012","unstructured":"Ehrig, H., Golas, U., Habel, A., Lambers, L., Orejas, F.: M-adhesive transformation systems with nested application conditions. Part 2: Embedding, critical pairs and local confluence. Fundam. Inf.\u00a0118(1-2), 35\u201363 (2012)","journal-title":"Fundam. Inf."},{"issue":"02","key":"8_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1017\/S0960129508007202","volume":"19","author":"A. Habel","year":"2009","unstructured":"Habel, A., Pennemann, K.-H.: Correctness of high-level transformation systems relative to nested conditions. Mathematical Structures in Computer Science\u00a019(02), 245\u2013296 (2009)","journal-title":"Mathematical Structures in Computer Science"},{"key":"8_CR7","unstructured":"Habel, A., Radke, H.: Expressiveness of graph conditions with variables. In: Electronic Communications of the EASST (2010)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-540-30124-0_15","volume-title":"Computer Science Logic","author":"N. Immerman","year":"2004","unstructured":"Immerman, N., Rabinovich, A., Reps, T., Sagiv, M., Yorsh, G.: The boundary between decidability and undecidability for transitive-closure logics. In: Marcinkowski, J., Tarlecki, A. (eds.) CSL 2004. LNCS, vol.\u00a03210, pp. 160\u2013174. Springer, Heidelberg (2004)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Inaba, K., Hidaka, S., Hu, Z., Kato, H., Nakano, K.: Graph-transformation verification using monadic second-order logic. In: Proceeding of the 13th International ACM SIGPLAN Symposium on Symposium on Principles and Practice of Declarative Programming. ACM Press (July 2011)","DOI":"10.1145\/2003476.2003482"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jcss.2004.11.002","volume":"71","author":"M. Koch","year":"2005","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: Graph-based specification of access control policies. J. Comput. Syst. Sci.\u00a071(1), 1\u201333 (2005)","journal-title":"J. Comput. Syst. Sci."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.entcs.2008.04.042","volume":"211","author":"B. K\u00f6nig","year":"2008","unstructured":"K\u00f6nig, B., Kozioura, V.: Augur 2 \u2014 a new version of a tool for the analysis of graph transformation systems. Electron. Notes Theor. Comput. Sci.\u00a0211, 201\u2013210 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-00255-7_18","volume-title":"Integrated Formal Methods","author":"Z. Langari","year":"2009","unstructured":"Langari, Z., Trefler, R.: Application of graph transformation in verification of dynamic systems. In: Leuschel, M., Wehrheim, H. (eds.) IFM 2009. LNCS, vol.\u00a05423, pp. 261\u2013276. Springer, Heidelberg (2009)"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s00165-009-0116-9","volume":"22","author":"F. Orejas","year":"2010","unstructured":"Orejas, F., Ehrig, H., Prange, U.: Reasoning with graph constraints. Formal Aspects of Computing\u00a022, 385\u2013422 (2010)","journal-title":"Formal Aspects of Computing"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-540-87405-8_20","volume-title":"Graph Transformations","author":"K.-H. Pennemann","year":"2008","unstructured":"Pennemann, K.-H.: Resolution-like theorem proving for high-level conditions. In: Ehrig, H., Heckel, R., Rozenberg, G., Taentzer, G. (eds.) ICGT 2008. LNCS, vol.\u00a05214, pp. 289\u2013304. Springer, Heidelberg (2008)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/978-3-642-15928-2_35","volume-title":"Graph Transformations","author":"H. Radke","year":"2010","unstructured":"Radke, H.: Correctness of graph programs relative to hr\u2009+\u2009 conditions. In: Ehrig, H., Rensink, A., Rozenberg, G., Sch\u00fcrr, A. (eds.) ICGT 2010. LNCS, vol.\u00a06372, pp. 410\u2013412. Springer, Heidelberg (2010)"},{"key":"8_CR16","unstructured":"Strecker, M.: Interactive and automated proofs for graph transformations. Technical report, IRIT\/Universit\u00e9 de Toulouse (2012), http:\/\/www.irit.fr\/~Martin.Strecker\/Publications\/proofs_graph_transformations.html"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-34176-2_15","volume-title":"Applications of Graph Transformations with Industrial Relevance","author":"M. Strecker","year":"2012","unstructured":"Strecker, M.: Locality in reasoning about graph transformations. In: Sch\u00fcrr, A., Varr\u00f3, D., Varr\u00f3, G. (eds.) AGTIVE 2011. LNCS, vol.\u00a07233, pp. 169\u2013181. Springer, Heidelberg (2012)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Tran, H.N., Percebois, C.: Towards a rule-level verification framework for property-preserving graph transformations. In: Proceeding of the IEEE ICST Workshop on Verification and Validation of Model Transformations (April 2012)","DOI":"10.1109\/ICST.2012.200"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40561-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T06:59:34Z","timestamp":1596524374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40561-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405600","9783642405617"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40561-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}