{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T19:50:08Z","timestamp":1769975408693,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662460801","type":"print"},{"value":"9783662460818","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46081-8_8","type":"book-chapter","created":{"date-parts":[[2014,12,11]],"date-time":"2014-12-11T04:25:44Z","timestamp":1418271944000},"page":"135-152","source":"Crossref","is-referenced-by-count":6,"title":["Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction"],"prefix":"10.1007","author":[{"given":"Peter","family":"Backes","sequence":"first","affiliation":[]},{"given":"Jan","family":"Reineke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"CTIT Workshop Proceedings","first-page":"107","volume-title":"TTC 2010","author":"P. Backes","year":"2010","unstructured":"Backes, P., Reineke, J.: A graph transformation case study for the topology analysis of dynamic communication systems. In: TTC 2010. CTIT Workshop Proceedings, vol.\u00a0WP10-03, pp. 107\u2013118. University of Twente, Enschede (2010)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Hsu, A., Eskafi, F., Sachs, S., Varaiya, P.: Design of platoon maneuver protocols for IVHS. Technical report, Institute of Transportation Studies, UC Berkeley (1991)","DOI":"10.23919\/ACC.1991.4791861"},{"key":"8_CR3","series-title":"CTIT Workshop Proceedings","first-page":"127","volume-title":"TTC 2010","author":"P. Backes","year":"2010","unstructured":"Backes, P., Reineke, J.: Abstract topology analysis of the join phase of the merge protocol (using astra). In: TTC 2010. CTIT Workshop Proceedings, vol.\u00a0WP10-03, pp. 127\u2013133. University of Twente, Enschede (2010)"},{"key":"8_CR4","unstructured":"Backes, P.: Topology analysis of dynamic communication systems. Diploma thesis, Saarland University (March 2008)"},{"key":"8_CR5","unstructured":"Kozyura, V., K\u00f6nig, B.: Augur 2\u2014A tool for the analysis of (attributed) graph transformation systems using approximative unfolding techniques (April 2008)"},{"key":"8_CR6","unstructured":"Zambon, E.: Abstract graph transformation: Theory and practice. PhD thesis, University of Twente (2013)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45832-8_4","volume-title":"Graph Transformation","author":"P. Baldan","year":"2002","unstructured":"Baldan, P., K\u00f6nig, B.: Approximating the behaviour of graph transformation systems. In: Corradini, A., Ehrig, H., Kreowski, H.-J., Rozenberg, G. (eds.) ICGT 2002. LNCS, vol.\u00a02505, pp. 14\u201329. Springer, Heidelberg (2002)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"K\u00f6nig, B., Kozioura, V.: Augur 2\u2014a new version of a tool for the analysis of graph transformation systems. In: Bruni, R., Varr\u00f3, D. (eds.) GT-VMT 2006. ENTCS, vol.\u00a02011, pp. 201\u2013210 (2008)","DOI":"10.1016\/j.entcs.2008.04.042"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-74061-2_16","volume-title":"Static Analysis","author":"J. Bauer","year":"2007","unstructured":"Bauer, J., Wilhelm, R.: Static analysis of dynamic communication systems by partner abstraction. In: Riis Nielson, H., Fil\u00e9, G. (eds.) SAS 2007. LNCS, vol.\u00a04634, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Rensink, A., Distefano, D.: Abstract graph transformation. In: SVV 2005. ENTCS, vol.\u00a0157, pp. 39\u201359 (May 2006)","DOI":"10.1016\/j.entcs.2006.01.022"},{"key":"8_CR11","unstructured":"Boneva, I., Kreiker, J., Kurb\u00e1n, M., Rensink, A., Zambon, E.: Graph abstraction and abstract graph transformations (amended version). Technical Report TR-CTIT-12-26, University of Twente, Enschede, The Netherlands (October 2012)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/11609773_9","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"E. Clarke","year":"2006","unstructured":"Clarke, E., Talupur, M., Veith, H.: Environment abstraction for parameterized verification. In: Emerson, E.A., Namjoshi, K.S. (eds.) VMCAI 2006. LNCS, vol.\u00a03855, pp. 126\u2013141. Springer, Heidelberg (2006)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-540-69738-1_17","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Cherem","year":"2007","unstructured":"Cherem, S., Rugina, R.: Maintaining doubly-linked list invariants in shape analysis with local reasoning. In: Cook, B., Podelski, A. (eds.) VMCAI 2007. LNCS, vol.\u00a04349, pp. 234\u2013250. Springer, Heidelberg (2007)"},{"key":"8_CR14","unstructured":"Bauer, J., Boneva, I., Rensink, A.: Graph abstraction by daisy patterns. Privately circulated (May 2009)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-78800-3_3","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M. Saksena","year":"2008","unstructured":"Saksena, M., Wibling, O., Jonsson, B.: Graph grammar modeling and verification of ad hoc routing protocols. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol.\u00a04963, pp. 18\u201332. Springer, Heidelberg (2008)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-70545-1_37","volume-title":"Computer Aided Verification","author":"J. Berdine","year":"2008","unstructured":"Berdine, J., Lev-Ami, T., Manevich, R., Ramalingam, G., Sagiv, M.: Thread quantification for concurrent shape analysis. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 399\u2013413. Springer, Heidelberg (2008)"},{"issue":"3","key":"8_CR17","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/514188.514190","volume":"24","author":"M. Sagiv","year":"2002","unstructured":"Sagiv, M., Reps, T., Wilhelm, R.: Parametric shape analysis via 3-valued logic. ACM Trans. Program. Lang. Syst.\u00a024(3), 217\u2013298 (2002)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-69166-2_24","volume-title":"Static Analysis","author":"R. Manevich","year":"2008","unstructured":"Manevich, R., Lev-Ami, T., Sagiv, M., Ramalingam, G., Berdine, J.: Heap decomposition for concurrent shape analysis. In: Alpuente, M., Vidal, G. (eds.) SAS 2008. LNCS, vol.\u00a05079, pp. 363\u2013377. Springer, Heidelberg (2008)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-642-27940-9_29","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"D. Zufferey","year":"2012","unstructured":"Zufferey, D., Wies, T., Henzinger, T.A.: Ideal abstractions for well-structured transition systems. In: Kuncak, V., Rybalchenko, A. (eds.) VMCAI 2012. LNCS, vol.\u00a07148, pp. 445\u2013460. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46081-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T06:02:30Z","timestamp":1566108150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46081-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662460801","9783662460818"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46081-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}