{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T18:40:59Z","timestamp":1648579259476},"reference-count":25,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessors and Microsystems"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1016\/s0141-9331(03)00127-3","type":"journal-article","created":{"date-parts":[[2003,8,12]],"date-time":"2003-08-12T16:45:47Z","timestamp":1060706747000},"page":"69-76","source":"Crossref","is-referenced-by-count":1,"title":["Formula-based abstractions and symbolic execution for model checking programs"],"prefix":"10.1016","volume":"28","author":[{"given":"Antonella","family":"Santone","sequence":"first","affiliation":[]},{"given":"Gigliola","family":"Vaglini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0141-9331(03)00127-3_BIB1","series-title":"In Proceedings of the 13th International Conference on Computer Aided Verification (CAV 2001)","article-title":"The SLAM toolkit","volume":"vol. 2102","author":"Ball","year":"2001"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB2","series-title":"The SLAM Project: Debugging System Software via Static Analysis","author":"Ball","year":"2002"},{"issue":"3","key":"10.1016\/S0141-9331(03)00127-3_BIB3","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1006\/jcss.1999.1660","article-title":"Selective mu-calculus and formula-based abstractions of transition systems","volume":"59","author":"Barbuti","year":"1999","journal-title":"Journal of Computer and System Sciences"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB4","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/0169-7552(87)90085-7","article-title":"Introduction to ISO specification language LOTOS","volume":"14","author":"Bolognesi","year":"1987","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB5","series-title":"In Proceedings of the 11th International Conference on Computer Aided Verification (CAV 1999)","article-title":"Model checking partial state spaces with 3-valued temporal logics","volume":"vol. 1633","author":"Bruns","year":"1999"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB6","series-title":"In Proceedings of the 11th International Conference on Concurrency Theory (CONCUR 2000)","article-title":"Generalized model checking: reasoning about partial state spaces","volume":"vol. 1877","author":"Bruns","year":"2000"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB7","series-title":"First Leaves: A Tutorial Introduction to Maple V","author":"Char","year":"1992"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB8","series-title":"In Proceedings of the Eighth International Conference on Computer-Aided Verification (CAV\u201996)","article-title":"The NCSU concurrency workbench","volume":"vol. 1102","author":"Cleaveland","year":"1996"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB9","series-title":"Bandera: Extracting Finite-State Models from Java Source Code","author":"Corbett","year":"2000"},{"issue":"7","key":"10.1016\/S0141-9331(03)00127-3_BIB10","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1002\/(SICI)1097-024X(199906)29:7<577::AID-SPE246>3.0.CO;2-V","article-title":"A deadlock detection tool for concurrent Java programs","volume":"29","author":"Demartini","year":"1999","journal-title":"Software Practice and Experience"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB11","series-title":"Using Symbolic Execution for Verifying Safety-Critical Systems","author":"Coen-Porisini","year":"2001"},{"issue":"4","key":"10.1016\/S0141-9331(03)00127-3_BIB12","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/s100090050043","article-title":"Model checking Java programs using Java PathFinder","volume":"2","author":"Havelund","year":"2000","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"issue":"4","key":"10.1016\/S0141-9331(03)00127-3_BIB13","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1023\/A:1026599015809","article-title":"Slicing software for model construction","volume":"13","author":"Hatcliff","year":"2000","journal-title":"Higher-Order and Symbolic Computation"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB14","series-title":"Lazy Abstraction","author":"Henzinger","year":"2002"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB15","doi-asserted-by":"crossref","unstructured":"T.A. Henzinger, R. Jhala, R. Majumdar, G.C. Necula, G. Sutre, Westley Weimer: Temporal-Safety Proofs for Systems Code, CAV 2002: 526\u2013538; E. Brinksma, K.G. Larsen (Eds.), Computer Aided Verification, 14th International Conference, CAV 2002, Copenhagen, Denmark, July 27\u201331, 2002, Proceedings. Lecture Notes in Computer Science 2404 Springer 2002, ISBN 3-540-43997-8.","DOI":"10.1007\/3-540-45657-0_45"},{"issue":"5","key":"10.1016\/S0141-9331(03)00127-3_BIB16","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/32.588521","article-title":"The model checker spin","volume":"23","author":"Holzmann","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB17","series-title":"Software Model Checking: Extracting Verification Models from Source Code","author":"Holzmann","year":"1999"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB18","series-title":"In Proceedings of the Ninth International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2003)","article-title":"Generalized symbolic execution for model checking and testing","volume":"vol. 2619","author":"Khurshid","year":"2003"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB19","series-title":"Symbolic Model Checking","author":"McMillan","year":"1993"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB20","series-title":"Communication and Concurrency","author":"Milner","year":"1989"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB21","series-title":"A Tableau-Based Procedure for Model Checking Programs","author":"Santone","year":"2002"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB22","unstructured":"A. Santone, G. Vaglini, Model Checking Programs, Technical Report, TR-DII 22\/01, September 2001."},{"key":"10.1016\/S0141-9331(03)00127-3_BIB23","series-title":"Local Model Checking of Java Bytecode","author":"Santone","year":"2002"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB24","series-title":"In Concurrency: Theory, Language, and Architecture","article-title":"An introduction to modal and temporal logics for CCS","volume":"vol. 391","author":"Stirling","year":"1989"},{"key":"10.1016\/S0141-9331(03)00127-3_BIB25","series-title":"Model Checking Programs","author":"Visser","year":"2000"}],"container-title":["Microprocessors and Microsystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0141933103001273?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0141933103001273?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T07:08:50Z","timestamp":1585120130000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0141933103001273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["S0141933103001273"],"URL":"https:\/\/doi.org\/10.1016\/s0141-9331(03)00127-3","relation":{},"ISSN":["0141-9331"],"issn-type":[{"value":"0141-9331","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}