{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:08Z","timestamp":1742913908940,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_40","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T14:37:20Z","timestamp":1414247840000},"page":"433-444","source":"Crossref","is-referenced-by-count":1,"title":["A Multiple Refinement Approach in Abstraction Model Checking"],"prefix":"10.1007","author":[{"given":"Phan T. H.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Thang H.","family":"Bui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"40_CR1","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2007.37","volume":"40","author":"T. Menzies","year":"2007","unstructured":"Menzies, T., Owen, D., Richardson, J.: The strangest thing about software. IEEE Computer\u00a040(1), 54\u201360 (2007)","journal-title":"IEEE Computer"},{"key":"40_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-30476-0_17","volume-title":"Automated Technology for Verification and Analysis","author":"K. Qian","year":"2004","unstructured":"Qian, K., Nymeyer, A.: Abstraction-based model checking using heuristical refinement. In: Wang, F. (ed.) ATVA 2004. LNCS, vol.\u00a03299, pp. 165\u2013178. Springer, Heidelberg (2004)"},{"key":"40_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/11527862_22","volume-title":"Abstraction, Reformulation and Approximation","author":"K. Qian","year":"2005","unstructured":"Qian, K., Nymeyer, A., Susanto, S.: Experiments with multiple abstraction heuristics in symbolic verification. In: Zucker, J.-D., Saitta, L. (eds.) SARA 2005. LNCS (LNAI), vol.\u00a03607, pp. 290\u2013304. Springer, Heidelberg (2005)"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/3-540-45139-0_5","volume-title":"Model Checking Software","author":"S. Edelkamp","year":"2001","unstructured":"Edelkamp, S., Lluch Lafuente, A., Leue, S.: Directed explicit model checking with HSF-SPIN. In: Dwyer, M.B. (ed.) SPIN 2001. LNCS, vol.\u00a02057, pp. 57\u201379. Springer, Heidelberg (2001)"},{"unstructured":"Bui, T.H., Dang, P.B.K.: Yet another variable dependency analysis for abstraction guided model checking. In: Proc. SEATUC 2012 (March 2012)","key":"40_CR5"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 154\u2013169. Springer, Heidelberg (2000)"},{"key":"40_CR7","first-page":"1","volume-title":"Proc. the 5th Annual IEEE Symp. on Logic in Computer Science","author":"J.R. Burch","year":"1990","unstructured":"Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic model checking: 1020 states and beyond. In: Proc. the 5th Annual IEEE Symp. on Logic in Computer Science, pp. 1\u201333. IEEE Computer Society Press, Washington, D.C (1990)"},{"doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Grumberg, O., Long, D.E.: Model checking and abstraction. In: Proc. the 19th ACM SIGPLAN-SIGACT Sym. on Principles of Programming Languages, pp. 343\u2013354 (1992)","key":"40_CR8","DOI":"10.1145\/143165.143235"},{"issue":"1","key":"40_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TC.2009.105","volume":"59","author":"F. He","year":"2010","unstructured":"He, F., Song, X., Hung, W.N., Gu, M., Sun, J.: Integrating evolutionary computation with abstraction refinement for model checking. IEEE Transactions on Computers\u00a059(1), 116\u2013126 (2010)","journal-title":"IEEE Transactions on Computers"},{"doi-asserted-by":"crossref","unstructured":"Ball, T., Majumdar, R., Millstein, T., Rajamani, S.K.: Automatic predicate abstraction of C programs. In: Proc. the ACM SIGPLAN 2001 Conf. on Programming Language Design and Implementation, pp. 203\u2013213. ACM Press (2001)","key":"40_CR10","DOI":"10.1145\/381694.378846"},{"doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. In: Proc. the 29th SIGPLAN-SIGACT Symp. on Principles of Programming Languages, pp. 58\u201370. ACM (2002)","key":"40_CR11","DOI":"10.1145\/565816.503279"},{"key":"40_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/3-540-58179-0_69","volume-title":"Computer Aided Verification","author":"D. Peled","year":"1994","unstructured":"Peled, D.: Combining partial order reductions with on-the-fly model-checking. In: Dill, D.L. (ed.) CAV 1994. LNCS, vol.\u00a0818, pp. 377\u2013390. Springer, Heidelberg (1994)"},{"doi-asserted-by":"crossref","unstructured":"E\u00e9n, N., S\u00f6rensson, N.: Temporal induction by incremental SAT solving. In: Strichman, O., Biere, A. (eds.) Electronic Notes in Theoretical Computer Science, vol.\u00a089, Elsevier (2004)","key":"40_CR13","DOI":"10.1016\/S1571-0661(05)82542-3"},{"doi-asserted-by":"crossref","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: Seventh International World-Wide Web Conference, WWW 1998 (1998)","key":"40_CR14","DOI":"10.1016\/S0169-7552(98)00110-X"},{"doi-asserted-by":"crossref","unstructured":"Bui, T.H., Nymeyer, A.: Heuristic sensitivity in guided random-walk based model checking. In: Proc. the 7th IEEE Int. Conf. on Software Engineering and Formal Methods (SEFM 2009), pp. 125\u2013134. IEEE Computer Society (November 2009)","key":"40_CR15","DOI":"10.1109\/SEFM.2009.19"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T17:24:07Z","timestamp":1650475447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}