{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:27:32Z","timestamp":1747196852201,"version":"3.40.5"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662460801"},{"type":"electronic","value":"9783662460818"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46081-8_14","type":"book-chapter","created":{"date-parts":[[2014,12,11]],"date-time":"2014-12-11T09:25:44Z","timestamp":1418289944000},"page":"245-262","source":"Crossref","is-referenced-by-count":1,"title":["Debugging Process Algebra Specifications"],"prefix":"10.1007","author":[{"given":"Gwen","family":"Sala\u00fcn","sequence":"first","affiliation":[]},{"given":"Lina","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1145\/151646.151651","volume":"15","author":"Y. Afek","year":"1993","unstructured":"Afek, Y., Brown, G., Meritt, M.: Lazy Caching. ACM Transactions on Programming Languages and Systems\u00a015(1), 182\u2013205 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/3-540-48257-1_22","volume-title":"Applied Formal Methods - FM-Trends 98","author":"S. Agerholm","year":"1999","unstructured":"Agerholm, S., Larsen, P.G.: The IFAD VDM Tools: Lightweight Formal Methods. In: Hutter, D., Traverso, P. (eds.) FM-Trends 1998. LNCS, vol.\u00a01641, pp. 326\u2013329. Springer, Heidelberg (1999)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Ammann, P., Offutt, J., Xu, W.: Coverage Criteria for State Based Specifications. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) Formal Methods and Testing. LNCS, vol.\u00a04949, pp. 118\u2013156. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-78917-8_4"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Amyot, D., Logrippo, L.: Structural Coverage for LOTOS - a Probe Insertion Technique. In: Proc. of TestCom 2000, pp. 19\u201334. Kluwer, B. V. (2000)","DOI":"10.1007\/978-0-387-35516-0_2"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-21437-0_10","volume-title":"FM 2011: Formal Methods","author":"F. Boyer","year":"2011","unstructured":"Boyer, F., Gruber, O., Sala\u00fcn, G.: Specifying and Verifying the SYNERGY Reconfiguration Protocol with LOTOS\u00a0NT and CADP. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol.\u00a06664, pp. 103\u2013117. Springer, Heidelberg (2011)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Cai, X., Lyu, M.R.: Software Reliability Modeling with Test Coverage: Experimentation and Measurement with a Fault-Tolerant Software Project. In: Proc. of ISSRE 2007, pp. 17\u201326. IEEE (2007)","DOI":"10.1109\/ISSRE.2007.17"},{"key":"14_CR7","unstructured":"Champelovier, D., Clerc, X., Garavel, H., Guerte, Y., McKinty, C., Powazny, V., Lang, F., Serwe, W., Smeding, G.: Reference Manual of the LOTOS NT to LOTOS Translator, Version 5.4. INRIA\/VASY (2011)"},{"key":"14_CR8","series-title":"IFIP AICT","first-page":"229","volume-title":"Proc. of DAIS 2002","author":"M.A. Cornejo","year":"2002","unstructured":"Cornejo, M.A., Garavel, H., Mateescu, R., Palma, N.D.: Specification and Verification of a Dynamic Reconfiguration Protocol for Agent-Based Applications. In: Zieli\u0144ski, K., Geihs, K., Laurentowski, A. (eds.) Proc. of DAIS 2002. IFIP AICT, vol.\u00a070, pp. 229\u2013242. Springer, Heidelberg (2002)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Etchevers, X., Coupaye, T., Boyer, F., De Palma, N., Sala\u00fcn, G.: Automated Configuration of Legacy Applications in the Cloud. In: Proc. of UCC 2011, pp. 170\u2013177. IEEE Computer Society (2011)","DOI":"10.1109\/UCC.2011.32"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Etchevers, X., Sala\u00fcn, G., Boyer, F., Coupaye, T., De Palma, N.: Reliable Self-deployment of Cloud Applications. In: Proc. of SAC 2014, pp. 1331\u20131338. ACM (2014)","DOI":"10.1145\/2554850.2554951"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Evrard, H., Lang, F.: Formal Verification of Distributed Branching Multiway Synchronization Protocols. In: Beyer, D., Boreale, M. (eds.) FMOODS FORTE 2013. LNCS, vol.\u00a07892, pp. 146\u2013160. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-38592-6_11"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Fraser, G., Weiglhofer, M., Wotawa, F.: Coverage Based Testing with Test Purposes. In: Proc. of QSIC 2008, pp. 199\u2013208. IEEE (2008)","DOI":"10.1109\/QSIC.2008.41"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-642-19835-9_33","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"H. Garavel","year":"2011","unstructured":"Garavel, H., Lang, F., Mateescu, R., Serwe, W.: CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol.\u00a06605, pp. 372\u2013387. Springer, Heidelberg (2011)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Gargantini, A., Heitmeyer, C.: Using Model Checking to Generate Tests from Requirements Specifications. In: Proc. of ESEC\/FSE 1999, vol.\u00a024, pp. 146\u2013162. ACM (1999)","DOI":"10.1145\/318774.318939"},{"issue":"11","key":"14_CR15","first-page":"1050","volume":"7","author":"A. Gargantini","year":"2001","unstructured":"Gargantini, A., Riccobene, E.: ASM-Based Testing: Coverage Criteria and Automatic Test Sequence. Journal of Universal Computer Science\u00a07(11), 1050\u20131067 (2001)","journal-title":"Journal of Universal Computer Science"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Gopinath, R., Jensen, C., Groce, A.: Code Coverage for Suite Evaluation by Developers. In: Proc. of ICSE 2014. ACM (2014)","DOI":"10.1145\/2568225.2568278"},{"key":"14_CR17","unstructured":"Guillemot, R., Logrippo, L.: Derivation of Useful Execution Trees from LOTOS Specifications by using an Interpreter. In: Proc. of FORTE 1988, pp. 311\u2013325. North-Holland Publishing Co. (1988)"},{"issue":"11","key":"14_CR18","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1109\/32.730543","volume":"24","author":"C.L. Heitmeyer","year":"1998","unstructured":"Heitmeyer, C.L., Kirby, J., Labaw, B.G., Archer, M., Bharadwaj, R.: Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications. IEEE Trans. Software Eng.\u00a024(11), 927\u2013948 (1998)","journal-title":"IEEE Trans. Software Eng."},{"key":"14_CR19","unstructured":"ISO\/IEC. Enhancements to LOTOS (E-LOTOS). International Standard 15437: International Organization for Standardization \u2014 Information Technology (2001)"},{"key":"14_CR20","unstructured":"Milner, R.: Communication and Concurrency. Prentice Hall (1989)"},{"key":"14_CR21","unstructured":"Myers, G.J.: The Art of Software Testing, Second Edition. John Wiley & Sons, Inc. (2004)"},{"issue":"2","key":"14_CR22","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1145\/201019.201032","volume":"42","author":"R. Nicola De","year":"1995","unstructured":"De Nicola, R., Vaandrager, F.: Three Logics for Branching Bisimulation. J. ACM\u00a042(2), 458\u2013487 (1995)","journal-title":"J. ACM"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Piwowarski, P., Ohba, M., Caruso, J.: Coverage Measurement Experience during Function Test. In: Proc. of ICSE 1993, pp. 287\u2013301. IEEE (1993)","DOI":"10.1109\/ICSE.1993.346035"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Sala\u00fcn, G., Etchevers, X., Palma, N., Boyer, F., Coupaye, T.: Verification of a Self-configuration Protocol for Distributed Applications in the Cloud. In: Proc. of SAC 2012, pp. 1278\u20131283. ACM (2012)","DOI":"10.1145\/2245276.2231979"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46081-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:37:26Z","timestamp":1747183046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46081-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662460801","9783662460818"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46081-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}