{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T23:40:34Z","timestamp":1747525234165,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iccad.2005.1560218","type":"proceedings-article","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T17:52:37Z","timestamp":1135273957000},"page":"1060-1067","source":"Crossref","is-referenced-by-count":4,"title":["Scalable compositional minimization via static analysis"],"prefix":"10.1109","author":[{"given":"F.","family":"Zaraket","sequence":"first","affiliation":[]},{"given":"J.","family":"Baumgartner","sequence":"additional","affiliation":[]},{"given":"A.","family":"Aziz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/177492.177725"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/288548.289082"},{"key":"18","article-title":"Computing reachable control states of systems modeled with uninterpreted functions and infinite memory","author":"isles","year":"1998","journal-title":"Computer-Aided Verification"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0031810","article-title":"Verification using uninterpreted functions and finite instantiations","author":"hojati","year":"1996","journal-title":"Formal Methods in Computer-Aided Design"},{"key":"16","first-page":"218","article-title":"Automatic abstraction and verification of verilog models","author":"andraus","year":"2004","journal-title":"Proceedings 41st Design Automation Conference 2004 DAC"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1109\/43.62792","article-title":"Synchronous logic synthesis: Algorithms for cycle-time minimization","volume":"10","author":"micheli","year":"1991","journal-title":"IEEE Transactions on Computer-Aided Design"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48153-2_12","article-title":"From asymmetry to full symmetry: New techniques for symmetry reduction in model checking","author":"emerson","year":"1999","journal-title":"Correct Hardware Design and Verification Methods"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2004.1382541"},{"key":"12","article-title":"How powerful is retiming?","author":"zhou","year":"1998","journal-title":"Int l Workshop Logic Synthesis"},{"key":"21","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/10722167_12","article-title":"Building circuits from relations","author":"kukula","year":"2000","journal-title":"Computer-Aided Verification"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1991.139995"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/11560548_18","article-title":"Maximal input reduction of sequential netlists via synergistic reparameterization and localization strategies","author":"baumgartner","year":"2005","journal-title":"Correct Hardware Design and Verification Methods"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/43.712098"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1956-045-5"},{"year":"0","key":"25"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48153-2_29"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1990.129940"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378470"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1994.331900"},{"journal-title":"SAT based Abstraction Refinement for Hardware Verification","year":"2003","author":"wang","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45069-6_14"},{"key":"5","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-540-45069-6_15","article-title":"A symbolic approach to predicate abstraction","author":"lahiri","year":"2003","journal-title":"Computer-Aided Verification"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2001.968602"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065700"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44585-4_10","article-title":"Transformation-based verification using generalized retiming","author":"kuehlmann","year":"2001","journal-title":"Computer-Aided Verification"}],"event":{"name":"ICCAD-2005. IEEE\/ACM International Conference on Computer-Aided Design, 2005.","location":"San Jose, CA"},"container-title":["ICCAD-2005. IEEE\/ACM International Conference on Computer-Aided Design, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10431\/33130\/01560218.pdf?arnumber=1560218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T05:12:54Z","timestamp":1555045974000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1560218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccad.2005.1560218","relation":{},"subject":[]}}