{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:54:33Z","timestamp":1743152073029,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642548475"},{"type":"electronic","value":"9783642548482"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54848-2_18","type":"book-chapter","created":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T11:35:39Z","timestamp":1404905739000},"page":"267-277","source":"Crossref","is-referenced-by-count":0,"title":["Reasoning about Network Topologies in Space"],"prefix":"10.1007","author":[{"given":"Lenore D.","family":"Zuck","sequence":"first","affiliation":[]},{"given":"Kenneth L.","family":"McMillan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G. Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol.\u00a03185, pp. 200\u2013236. Springer, Heidelberg (2004)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/3-540-49059-0_14","volume-title":"Tools and Algorithms for the Construction of Analysis of Systems","author":"A. Biere","year":"1999","unstructured":"Biere, A., Cimatti, A., Clarke, E., Zhu, Y.: Symbolic model checking without BDDs. In: Cleaveland, W.R. (ed.) TACAS 1999. LNCS, vol.\u00a01579, pp. 193\u2013207. Springer, Heidelberg (1999)"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1525856.1525858","volume":"5","author":"Claude Castelluccia","year":"2009","unstructured":"Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks, pp. 1\u201336","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008773308108","volume":"16","author":"\u00c1.T.. Eir\u00edksson","year":"2000","unstructured":"Eir\u00edksson, \u00c1.T.: The formal design of 1M-gate ASICs. Form. Methods Syst. Des.\u00a016(1), 7\u201322 (2000)","journal-title":"Form. Methods Syst. Des."},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45848-4_26","volume-title":"Graph Drawing","author":"S. Felsner","year":"2002","unstructured":"Felsner, S., Liotta, G., Wismath, S.K.: Straight-line drawings on restricted integer grids in two and three dimensions. In: Mutzel, P., J\u00fcnger, M., Leipert, S. (eds.) GD 2001. LNCS, vol.\u00a02265, pp. 328\u2013342. Springer, Heidelberg (2002)"},{"key":"18_CR6","unstructured":"Feo-Arenis, S., Iskander, M.K., Lee, A.J., Moss\u00e9, D., Zuck, L.D.: Verifying protocols for f6. Inernal document, available upon request (November 2012)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Gobriel, S., Khattab, S., Moss\u00e9, D., Brustoloni, J., Melhem, R.: Ridesharing: Fault tolerant aggregation in sensor networks using corrective actions. In: The 3rd Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 595\u2013604 (2006)","DOI":"10.1109\/SAHCN.2006.288516"},{"issue":"2","key":"18_CR8","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s10009-004-0140-2","volume":"6","author":"M.Z. Kwiatkowska","year":"2004","unstructured":"Kwiatkowska, M.Z., Norman, G., Parker, D.: Probabilistic symbolic model checking with prism: a hybrid approach. STTT\u00a06(2), 128\u2013142 (2004)","journal-title":"STTT"},{"key":"18_CR9","unstructured":"Lee, A.J., Iskander, M.K., Moss\u00e9, D.: Confidentiality-preserving and fault-tolerant in-network aggregation for collaborative wsns. In: Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom (October 2012)"}],"container-title":["Lecture Notes in Computer Science","From Programs to Systems. The Systems perspective in Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54848-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T04:17:35Z","timestamp":1558930655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54848-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642548475","9783642548482"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54848-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}