{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:08:05Z","timestamp":1760202485611},"reference-count":23,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":3942,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[2002,10]]},"DOI":"10.1016\/s0304-3975(01)00268-7","type":"journal-article","created":{"date-parts":[[2002,10,7]],"date-time":"2002-10-07T20:25:18Z","timestamp":1034022318000},"page":"165-189","source":"Crossref","is-referenced-by-count":30,"title":["Counter Machines and Verification Problems"],"prefix":"10.1016","volume":"289","author":[{"given":"Oscar H.","family":"Ibarra","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianwen","family":"Su","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhe","family":"Dang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tevfik","family":"Bultan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard A.","family":"Kemmerer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/S0304-3975(01)00268-7_BIB1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1006\/inco.1996.0053","article-title":"Verifying programs with unreliable channels","volume":"127","author":"Abdulla","year":"1996","journal-title":"Inform. Comput."},{"issue":"2","key":"10.1016\/S0304-3975(01)00268-7_BIB2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","article-title":"A theory of timed automata","volume":"126","author":"Alur","year":"1994","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB3","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/S0022-0000(74)80027-9","article-title":"Reversal-bounded multipushdown machines","volume":"8","author":"Baker","year":"1974","journal-title":"J. Comput. System Sci."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB4","doi-asserted-by":"crossref","unstructured":"A. Bouajjani, J. Esparza, O. Maler, Reachability analysis of pushdown automata: application to model-checking, Proc. Internat. Conf. on Concurrency (CONCUR 1997), Lecture Notes in Computer Science, Vol. 1243, Springer, Berlin, 1997, pp. 135\u2013150.","DOI":"10.1007\/3-540-63141-0_10"},{"key":"10.1016\/S0304-3975(01)00268-7_BIB5","unstructured":"G. Cece, A. Finkel, Programs with quasi-stable channels are effectively recognizable, Proc. 9th Internat. Conf. on Computer Aided Verification (CAV 1997), Lecture Notes in Computer Science, Vol. 1254, Springer, Berlin, 1997, pp. 304\u2013315."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB6","doi-asserted-by":"crossref","unstructured":"H. Comon, Y. Jurski, Multiple counters automata, safety analysis and Presburger arithmetic, Proc. 10th Internat. Conf. on Computer Aided Verification (CAV 1998), Lecture Notes in Computer Science, Vol. 1855, Springer, Berlin, 1998, pp. 268\u2013279.","DOI":"10.1007\/BFb0028751"},{"key":"10.1016\/S0304-3975(01)00268-7_BIB7","doi-asserted-by":"crossref","unstructured":"Z. Dang, Binary reachability analysis of timed pushdown automata with dense clocks, Proc. 13th Internat. Conf. on Computer Aided Verification (CAV 2001), Lecture Notes in Computer Science, Vol. 2102, Springer, Berlin, 2001, pp. 506\u2013518.","DOI":"10.1007\/3-540-44585-4_48"},{"key":"10.1016\/S0304-3975(01)00268-7_BIB8","doi-asserted-by":"crossref","unstructured":"Z. Dang, O.H. Ibarra, T. Bultan, R.A. Kemmerer, J. Su, Binary reachability analysis of discrete pushdown timed automata, Proc. 12th Internat. Conf. on Computer Aided Verification (CAV 2000), Lecture Notes in Computer Science, Vol. 1427, Springer, Berlin, 2000, pp. 69\u201384.","DOI":"10.1007\/10722167_9"},{"issue":"2","key":"10.1016\/S0304-3975(01)00268-7_BIB9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s002360050074","article-title":"Decidability of model checking for infinite-state concurrent systems","volume":"34","author":"Esparza","year":"1997","journal-title":"Acta Inform."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB10","doi-asserted-by":"crossref","unstructured":"A. Finkel, G. Sutre, Decidability of reachability problems for classes of two counter automata, Proc. 17th Internat. Conf. on Theoretical Aspects of Computer Science (STACS 2000), Lecture Notes in Computer Science, Vol. 1770, Springer, Berlin, 2000, pp. 346\u2013357.","DOI":"10.1007\/3-540-46541-3_29"},{"key":"10.1016\/S0304-3975(01)00268-7_BIB11","first-page":"333","article-title":"Bounded Algol-like languages","volume":"113","author":"Ginsburg","year":"1964","journal-title":"Trans. Amer. Math. Soc."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB12","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1145\/322139.322152","article-title":"An NP-complete number-theoretic problem","volume":"26","author":"Gurari","year":"1979","journal-title":"J. ACM"},{"key":"10.1016\/S0304-3975(01)00268-7_BIB13","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0022-0000(79)90025-4","article-title":"Simple counter machines and number-theoretic problems","volume":"19","author":"Gurari","year":"1979","journal-title":"J. Comput. System Sci."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB14","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1145\/322047.322058","article-title":"Reversal-bounded multicounter machines and their decision problems","volume":"25","author":"Ibarra","year":"1978","journal-title":"J. ACM"},{"issue":"1","key":"10.1016\/S0304-3975(01)00268-7_BIB15","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1137\/S0097539792240625","article-title":"New decidability results concerning two-way counter machines","volume":"24","author":"Ibarra","year":"1995","journal-title":"SIAM J. Comput."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB16","unstructured":"O.H. Ibarra, J. Su, Z. Dang, T. Bultan, R.A. Kemmerer, Counter machines: decidable properties and applications to verification problems, Proc. 25th Internat. Conf. on Mathematical Foundations of Computer Science (MFCS 2000), Lecture Notes in Computer Science, Vol. 1893, Springer, Berlin, 1998, pp. 426\u2013435."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB17","first-page":"354","article-title":"Enumerable sets are Diophantine","volume":"11","author":"Matijasevic","year":"1970","journal-title":"Soviet Math. Dokl"},{"key":"10.1016\/S0304-3975(01)00268-7_BIB18","doi-asserted-by":"crossref","unstructured":"K.L. McMillan, Symbolic model-checking\u2014an approach to the state explosion problem, Ph.D. Thesis, Department of Computer Science, Carnegie Mellon University, 1992.","DOI":"10.1007\/978-1-4615-3190-6_3"},{"key":"10.1016\/S0304-3975(01)00268-7_BIB19","doi-asserted-by":"crossref","first-page":"437","DOI":"10.2307\/1970290","article-title":"Recursive unsolvability of Post's problem of Tag and other topics in the theory of Turing machines","volume":"74","author":"Minsky","year":"1961","journal-title":"Ann. Math."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB20","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1145\/321356.321364","article-title":"On context-free languages","volume":"13","author":"Parikh","year":"1966","journal-title":"J. ACM"},{"issue":"6\/7","key":"10.1016\/S0304-3975(01)00268-7_BIB21","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/BF01185558","article-title":"Analysis of a class of communicating finite state machines","volume":"29","author":"Peng","year":"1992","journal-title":"Acta Inform."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB22","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/S0022-0000(75)80005-5","article-title":"Deterministic one-counter automata","volume":"10","author":"Valiant","year":"1975","journal-title":"J. Comput. System Sci."},{"key":"10.1016\/S0304-3975(01)00268-7_BIB23","doi-asserted-by":"crossref","unstructured":"P. Wolper, B. Boigelot, Verifying systems with infinite but regular state spaces, in: Proc. 10th Internat. Conf. on Computer Aided Verification (CAV 1998), Lecture Notes in Computer Science, Vol. 1427, Springer, Berlin, 1998, pp. 88\u201397.","DOI":"10.1007\/BFb0028736"}],"container-title":["Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397501002687?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397501002687?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T17:54:08Z","timestamp":1583776448000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0304397501002687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,10]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,10]]}},"alternative-id":["S0304397501002687"],"URL":"https:\/\/doi.org\/10.1016\/s0304-3975(01)00268-7","relation":{},"ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"subject":[],"published":{"date-parts":[[2002,10]]}}}