{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:21:01Z","timestamp":1725456061941},"publisher-location":"Berlin\/Heidelberg","reference-count":63,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"354018581X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/bfb0016350","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T05:39:57Z","timestamp":1132724397000},"page":"127-152","source":"Crossref","is-referenced-by-count":1,"title":["Tools for protocols driven by formal specifications"],"prefix":"10.1007","author":[{"given":"Harry","family":"Rudin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"W. L. Bauerfeld, \u201cProtocol performance prediction,\u201d Proc. International Conference on Communications, IEEE, Boston, Mass., June 20\u201323, 1983, pp. 1311\u20131315."},{"key":"7_CR2","unstructured":"G. v. Bochmann and B. Sarikaya, Eds., Proc. Sixth IFIP Workshop on Protocol Specification, Testing, and Verification, VI, Gray Rocks \u2014 Montreal, June 10\u201313 1986, (to be published by North-Holland, Amsterdam)."},{"key":"7_CR3","first-page":"491","volume-title":"On the analysis of time-constrained protocols by network flow algorithms","author":"T. Bolognesi","year":"1985","unstructured":"T. Bolognesi and H. Rudin, \u201cOn the analysis of time-constrained protocols by network flow algorithms,\u201d Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 491\u2013513."},{"key":"7_CR4","first-page":"171","volume-title":"A tutorial on LOTOS","author":"E. Brinksma","year":"1985","unstructured":"E. Brinksma, \u201cA tutorial on LOTOS,\u201d Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10\u201313 1985, (North-Holland, Amsterdam, 1985), pp. 171\u2013194."},{"key":"7_CR5","unstructured":"C.C.I.T.T., Orange Books, Sixth Plenary Assembly, Vol. VIII.2, Geneva, 1976."},{"key":"7_CR6","unstructured":"C.C.I.T.T., Yellow Books, Seventh Plenary Assembly, Vol. VIII.2, Geneva, 1981."},{"key":"7_CR7","unstructured":"C.C.I.T.T., Red Book, Volume VIII \u2014 Fascile VIII.3, Data Communication Networks Interfaces Recommendations X.20\u2013X.32, VIIIth Plenary Assembly, Torremolinos, October 8\u201319, 1984."},{"key":"7_CR8","unstructured":"C.C.I.T.T., Red Book, Volume VI \u2014 Fascile VI.10, Functional Specification and Description Language (SDL), Recommendation Z.101-Z.104, VIIIth Plenary Assembly, Torremolinos, October 8\u201319, 1984."},{"key":"7_CR9","first-page":"455","volume-title":"The testing of protocols in SNA products","author":"R. M. S. Cork","year":"1983","unstructured":"R. M. S. Cork, \u201cThe testing of protocols in SNA products,\u201d Proc. of the Workshop on Protocol Specification, Testing, and Verification, Ill, R\u00fcschlikon, Switzerland, May 1983, (North-Holland, Amsterdam, 1983) pp. 455\u2013463."},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/0376-5075(82)90112-X","volume":"6","author":"M. Diaz","year":"1982","unstructured":"M. Diaz, \u201cModeling and analysis of communication and cooperation protocols using Petri-net based models,\u201d Computer Networks, Vol. 6, 1982, pp. 419\u2013441.","journal-title":"Computer Networks"},{"key":"7_CR11","unstructured":"M. Diaz, \u201cStatus of using Petri nets for protocols,\u201d Proc. of the International Conference on Communications, Boston, Mass., June 20\u201323, 1983, pp. 1301\u20131305."},{"volume-title":"Proc. of the Fifth International Workshop on Protocol Specification, Testing, and Verification, Moissac-Toulouse, June, 1985","year":"1985","key":"7_CR12","unstructured":"M. Diaz, Ed., Proc. of the Fifth International Workshop on Protocol Specification, Testing, and Verification, Moissac-Toulouse, June, 1985, (North Holland, Amsterdam, 1985)."},{"issue":"12","key":"7_CR13","first-page":"1346","volume":"71","author":"G. J. Dickson","year":"1983","unstructured":"G. J. Dickson and P. J. Chazal, \u201cStatus of CCITT description techniques and application to protocol specification,\u201d Special issue of the Proc. of the IEEE on OSI, Vol. 71, No. 12, December, 1983, pp. 1346\u20131355.","journal-title":"Special issue of the Proc. of the IEEE on OSI"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"H. C. Folts and R. desJardins, Eds., Special issue of the Proc. of the IEEE on OSI, Vol. 71, No. 12, December, 1983, pp. 1331\u20131448.","DOI":"10.1109\/PROC.1983.12774"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"P. E. Green, Ed., IEEE Trans. Commun., April, 1980, Vol. COM-28, No. 4, pp. 409\u2013677. Later republished as Computer Network Architectures and Protocols (Plenum, New York, 1982).","DOI":"10.1109\/TCOM.1980.1094703"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TCOM.1986.1096529","volume":"COM-34","author":"P. E. Green","year":"1986","unstructured":"P. E. Green, \u201cProtocol conversion,\u201d IEEE Trans. Commun., March, 1986, Vol. COM-34, No. 3, pp. 257\u2013268.","journal-title":"IEEE Trans. Commun."},{"key":"7_CR17","first-page":"3","volume-title":"Attacking a complex distributed algorithm from different sides: an experience with complementary validation tools","author":"R. Groz","year":"1985","unstructured":"R. Groz, C. Jard, and C. Lassudrie, \u201cAttacking a complex distributed algorithm from different sides: an experience with complementary validation tools,\u201d Proc. of the Workshop on Protocol Specification, Testing, and Verification, IV, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 3\u201317."},{"key":"7_CR18","series-title":"NATO ASI Series","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-642-82453-1_3","volume-title":"Logics and Models of Concurrent Systems","author":"B. T. Hailpern","year":"1985","unstructured":"B. T. Hailpern, \u201cTools for verifying network protocols,\u201d Logics and Models of Concurrent Systems, K. R. Apt, Ed., NATO ASI Series, Vol. F13, (Springer Verlag, Berlin, 1985), pp. 57\u201376."},{"key":"7_CR19","first-page":"527","volume-title":"Analyzing the time efficiency of a communication protocol","author":"P. Kritzinger","year":"1985","unstructured":"P. Kritzinger, \u201cAnalyzing the time efficiency of a communication protocol,\u201d Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 527\u2013539."},{"key":"7_CR20","unstructured":"P. Kritzinger, \u201cA performance model of the OSI communication architecture,\u201d IBM Zurich Research Laboratory Research Report RZ 1346, R\u00fcschlikon, Switzerland, Dec. 11, 1984."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"H. Krumm and O. Drobnik, \u201cInteractive verification on the basis of CIL,\u201d Proc. of the ACM SIGCOMM Symposium on Communications Architectures and Protocols, Montreal, June 6\u20138, 1984, pp. 92\u201399.","DOI":"10.1145\/639624.802065"},{"key":"7_CR22","first-page":"343","volume-title":"An illustration of protocol projections","author":"S. S. Lam","year":"1982","unstructured":"S. S. Lam and A. U. Shankar, \u201cAn illustration of protocol projections,\u201d C. A. Sunshine, Ed., Proc. Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17\u201320, 1982, (North Holland, Amsterdam, 1982), pp. 343\u2013360."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"S. S. Lam, \u201cProtocol conversion \u2014 correctness problems,\u201d ACM SIGCOMM '86 Symposium, Stowe, Vermont, Aug. 5\u20137, 1986, pp. 19\u201329.","DOI":"10.1145\/18172.18175"},{"key":"7_CR24","first-page":"611","volume-title":"An evaluation of the ICST test architecture after testing Class-4 Transport","author":"J. Linn","year":"1985","unstructured":"J. Linn, \u201cAn evaluation of the ICST test architecture after testing Class-4 Transport,\u201d Proc. of the Workshop on Protocol Specification, Testing, and Verification, IV, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 611\u2013621."},{"issue":"3","key":"7_CR25","first-page":"277","volume":"13","author":"K. L. Mills","year":"1984","unstructured":"K. L. Mills, \u201cTesting OSI protocols: NBS advances the state of the art,\u201d Data Communications, Vol. 13, No. 3, June, 1984, pp. 277\u2013285.","journal-title":"Data Communications"},{"key":"7_CR26","volume-title":"Lecture Notes in Computer Science","author":"R. Milner","year":"1980","unstructured":"R. Milner, \u201cA calculus of communicating systems,\u201d Lecture Notes in Computer Science, (Springer Verlag, Berlin, 1980.)"},{"issue":"9","key":"7_CR27","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1109\/TC.1982.1676110","volume":"C-31","author":"M. K. Molloy","year":"1982","unstructured":"M. K. Molloy, \u201cPerformance analysis using stochastic Petri nets,\u201d IEEE Trans. Computers, Vol. C-31, No. 9, pp. 913\u2013917, Sept. 1982.","journal-title":"IEEE Trans. Computers"},{"key":"7_CR28","unstructured":"S. Nash, \u201cAutomated implementation of SNA communication protocols,\u201d Proc. of the International Conference on Communications, Boston, Mass., June 20\u201323, 1983, pp. 1316\u20131322."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"K. Okumura, \u201cA formal protocol conversion method,\u201d ACM SIGCOMM '86 Symposium, Stowe, Vermont, Aug. 5\u20137, 1986, pp. 30\u201337.","DOI":"10.1145\/18172.18176"},{"key":"7_CR30","unstructured":"Protocol Development Corporation, \u201cEstelle development system: functional specification,\u201d Brookline, Mass., 1985."},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/356698.356702","volume":"9","author":"J. L. Peterson","year":"1977","unstructured":"J. L. Peterson, \u201cPetri nets,\u201d Computing Surveys, Vol. 9, September 1977, pp. 223\u2013252.","journal-title":"Computing Surveys"},{"key":"7_CR32","unstructured":"T. Piatkowski, \u201cAn engineering discipline for distributed protocol systems,\u201d Protocol Testing \u2014 Towards Proof? (an INWG\/NPL Workshop) National Physical Laboratory, Teddington, U. K., May 27\u201329, 1981, pp. 177\u2013215."},{"key":"7_CR33","unstructured":"T. Piatkowski, \u201cProtocol engineering,\u201d Proc. of the International Conference on Communications, Boston, Mass., June 20\u201323, 1983, pp. 1328\u20131332."},{"issue":"6","key":"7_CR34","doi-asserted-by":"publisher","first-page":"1348","DOI":"10.1109\/TCOM.1982.1095591","volume":"COM-30","author":"D. P. Pozefsky","year":"1982","unstructured":"Pozefsky, D. P. and F. D. Smith, \u201cA meta-implementation for Systems Network Architecture,\u201d IEEE Trans. Commun., Vol. COM-30, No. 6, June, 1982, pp. 1348\u20131355.","journal-title":"IEEE Trans. Commun."},{"key":"7_CR35","unstructured":"D. Rayner and R. W. S. Hale, Eds., Protocol Testing \u2014 Towards Proof? (an INWG\/NPL Workshop), Vol. 1: Specification and Validation, and Vol. 2: Testing and Certification, National Physical Laboratory, Teddington, U. K., May 27\u201329, 1981."},{"key":"7_CR36","unstructured":"D. Rayner, \u201cProgress in testing protocol implementations,\u201d Proc. International Conference on Communications, Boston, Mass., June 20\u201323, 1983, pp. 1323\u20131327."},{"key":"7_CR37","first-page":"441","volume-title":"Towards standardized OSI conformance tests","author":"D. Rayner","year":"1985","unstructured":"D. Rayner, \u201cTowards standardized OSI conformance tests,\u201d Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10\u201313, 1985, (North-Holland, Amsterdam, 1985), pp. 441\u2013460."},{"key":"7_CR38","first-page":"561","volume-title":"Performance analysis using timed Petri nets","author":"R. R. Razouk","year":"1985","unstructured":"R. R. Razouk and C. V. Phelps, \u201cPerformance analysis using timed Petri nets,\u201d Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 561\u2013576."},{"key":"7_CR39","unstructured":"J. Rubin, \u201cTesting communication protocols using random legal inputs,\u201d Proc. COMNET'85, Budapest, October 1\u20134, 1985, pp. 7-50\u20137-67."},{"issue":"7","key":"7_CR40","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TC.1982.1676060","volume":"C-31","author":"H. Rudin","year":"1982","unstructured":"H. Rudin and C. H. West, \u201cA validation technique for tightly-coupled protocols,\u201d IEEE Trans. Computers, Vol. C-31, No. 7, July, 1982, pp. 630\u2013636.","journal-title":"IEEE Trans. Computers"},{"key":"7_CR41","first-page":"373","volume-title":"Validation of a token-ring protocol","author":"H. Rudin","year":"1982","unstructured":"H. Rudin, \u201cValidation of a token-ring protocol,\u201d in Proc. of the International Symposium on Local Computer Networks, Florence, April, 1982, (North-Holland, Amsterdam, 1982) pp. 373\u2013387."},{"key":"7_CR42","unstructured":"H. Rudin, \u201cAutomated protocol validation: some practical examples,\u201d Proc. Sixth International Conference on Computer Communication, London, September 1982, pp. 919\u2013924."},{"volume-title":"Proc. of the Third International Workshop on Protocol Specification, Testing, and Verification, R\u00fcschlikon, May 31\u2013June 2, 1983","year":"1983","key":"7_CR43","unstructured":"H. Rudin and C. H. West, Eds., Proc. of the Third International Workshop on Protocol Specification, Testing, and Verification, R\u00fcschlikon, May 31\u2013June 2, 1983, (North Holland, Amsterdam, 1983)."},{"key":"7_CR44","first-page":"515","volume-title":"An improved algorithm for estimating protocol performance","author":"H. Rudin","year":"1985","unstructured":"H. Rudin, \u201cAn improved algorithm for estimating protocol performance,\u201d Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 515\u2013525."},{"key":"7_CR45","first-page":"155","volume-title":"Protocols and Complexity in Computer communications","author":"H. Rudin","year":"1986","unstructured":"H. Rudin, \u201cProtocols and Complexity in Computer communications\u201d, Proc. of the 1986 International Zurich Seminar on Digital Communications, Zurich, 11\u201313 March, 1986, (Verlag der Fachvereine an den Schweizerischen Hochschulen und Techniken, Zurich, 1986), pp. 155\u2013161."},{"key":"7_CR46","unstructured":"H. Rudin, \u201cThe dimension of time in protocol specification,\u201d Proc. of the IBM Europe Institute 1986: Networking in Open Systems, Oberlech, Austria, August 18\u201322, 1986, (to be published by Springer Verlag.)"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"K. Sabnani, P. Wolper, and A. Lapone, \u201cAn algorithmic technique for protocol verification,\u201d Proc. GLOBECOM85, New Orleans, La., Dec. 2\u20135, 1985, pp. 3.7.1\u20133.7.7.","DOI":"10.1109\/26.3772"},{"key":"7_CR48","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/TCOM.1980.1094695","volume":"COM-28","author":"G. D. Schultz","year":"1980","unstructured":"G. D. Schultz, D. B. Rose, C. H. West, and J. P. Gray, \u201cExecutable description and validation of SNA,\u201d IEEE Trans. Commun., Vol. COM-28, Apr. 1980, pp. 661\u2013677, also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols, (Plenum, New York, 1982), pp. 671\u2013705.","journal-title":"IEEE Trans. Commun."},{"key":"7_CR49","first-page":"215","volume-title":"On time-dependent communication protocols and their projections","author":"A. U. Shankar","year":"1982","unstructured":"A. U. Shankar and S. S. Lam, \u201cOn time-dependent communication protocols and their projections,\u201d C. A. Sunshine, Ed., Proc. Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17\u201320, 1982, (North Holland, Amsterdam, 1982), pp. 215\u2013235."},{"issue":"7","key":"7_CR50","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.1109\/TCOM.1982.1095652","volume":"COM-30","author":"M. Sherman","year":"1982","unstructured":"M. Sherman and H. Rudin, \u201cUsing automated validation techniques to detect lockups in packet-switched networks,\u201d IEEE Trans. Commun., Vol. COM-30, No. 7, July, 1982, pp. 1762\u20131767.","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"7_CR51","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1147\/rd.271.0068","volume":"27","author":"F. D. Smith","year":"1983","unstructured":"F. D. Smith and C. H. West, \u201cTechnologies for network architecture and implementation,\u201d IBM J. Res. Develop., Vol 27, No. 1, January 1983, pp. 68\u201378.","journal-title":"IBM J. Res. Develop."},{"volume-title":"Communication Protocol Modeling","year":"1981","key":"7_CR52","unstructured":"C. A. Sunshine, Ed., Communication Protocol Modeling, (Artech House, Dedham, Mass., 1981)."},{"volume-title":"Proc. of the Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17\u201320, 1982","year":"1982","key":"7_CR53","unstructured":"C. A. Sunshine, Ed., Proc. of the Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17\u201320, 1982, (North Holland, Amsterdam, 1982)."},{"key":"7_CR54","unstructured":"C. A. Sunshine, \u201cExperience with automated protocol verification,\u201d Proc. of the International Conference on Communications, Boston, Mass., June 20\u201323, 1983, pp. 1306\u20131310."},{"key":"7_CR55","unstructured":"R. Tenney, \u201cStatus of the ISO ad hoc Subgroup B on formal description techniques,\u201d Proc. of the International Conference on Communications, Boston, Mass., June 20\u201323, 1983, pp. 1296\u20131300."},{"key":"7_CR56","first-page":"401","volume-title":"A formal comparison of formal protocol specification techniques","author":"R. C. Venkatraman","year":"1985","unstructured":"R. C. Venkatraman and T. F. Piatkowski, \u201cA formal comparison of formal protocol specification techniques,\u201d Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10\u201313, 1985, (North-Holland, Amsterdam, 1985), pp. 401\u2013420."},{"issue":"12","key":"7_CR57","first-page":"1356","volume":"71","author":"C. A. Vissers","year":"1983","unstructured":"C. A. Vissers, R. L. Tenney, and G. V. Bochmann, \u201cFormal description techniques,\u201d special issue on OSI, Proc. IEEE, Vol. 71, No. 12, December 1983, pp. 1356\u20131364.","journal-title":"special issue on OSI, Proc. IEEE"},{"key":"7_CR58","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1147\/rd.221.0060","volume":"22","author":"C. H. West","year":"1978","unstructured":"C. H. West and P. Zafiropulo, \u201cAutomated validation of a communications protocol: the CCITT X.21 recommendation,\u201d IBM J. Res. Develop., Vol. 22, Jan. 1978, pp. 60\u201371.","journal-title":"IBM J. Res. Develop."},{"key":"7_CR59","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1147\/rd.224.0393","volume":"22","author":"C. H. West","year":"1978","unstructured":"C. H. West, \u201cGeneral technique for communications protocol validation,\u201d IBM J. Res. Develop., Vol. 22, July 1978, pp. 393\u2013404.","journal-title":"IBM J. Res. Develop."},{"key":"7_CR60","unstructured":"C. H. West, \u201cProtocol validation by random state exploration,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, VI, Gray Rocks, Quebec, June 10\u201313, 1986, (to be published by North-Holland, Amsterdam.)"},{"volume-title":"Proc. of the Fourth International Workshop on Protocol Specification, Testing, and Verification, Skytop, June, 1984","year":"1985","key":"7_CR61","unstructured":"Y. Yemini, Ed., Proc. of the Fourth International Workshop on Protocol Specification, Testing, and Verification, Skytop, June, 1984, (North Holland, Amsterdam, 1985)."},{"key":"7_CR62","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1109\/TCOM.1980.1094687","volume":"COM-28","author":"P. Zafiropulo","year":"1980","unstructured":"P. Zafiropulo, C. H. West, H. Rudin, D. D. Cowan, and D. Brand, \u201cTowards analyzing and synthesizing protocols,\u201d IEEE Trans. Commun., Vol. COM-28, April, 1980, pp. 651\u2013660. Also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols (Plenum, New York, 1982), pp. 645\u2013669.","journal-title":"IEEE Trans. Commun."},{"key":"7_CR63","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCOM.1980.1094702","volume":"COM-28","author":"H. Zimmermann","year":"1980","unstructured":"H. Zimmermann, \u201cOSI Reference Model\u2014 the ISO model of architecture for Open Systems Interconnection,\u201d IEEE Trans. Commun., Vol. COM-28, April, 1980, pp. 425\u2013432. Also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols, (Plenum, New York, 1982), pp. 33\u201354.","journal-title":"IEEE Trans. Commun."}],"container-title":["Lecture Notes in Computer Science","Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/BFb0016350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T04:20:20Z","timestamp":1586578820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0016350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["354018581X"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/bfb0016350","relation":{},"subject":[]}}