{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:52:28Z","timestamp":1729641148701,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/memcod.2005.1487897","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T17:52:28Z","timestamp":1122486748000},"page":"79-88","source":"Crossref","is-referenced-by-count":4,"title":["Verification of parameterized hierarchical state machines using action language verifier"],"prefix":"10.1109","author":[{"given":"T.","family":"Yavuz-Kahveci","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.","family":"Bultan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/10722167_8","article-title":"Automatic verification of parameterized cache coherence protocols","author":"delzanno","year":"2000","journal-title":"Proceedings of the 12th International Conference on Computer Aided Verification"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/32.708566"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/302405.302460"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/325478.325480"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ASE.2001.989834"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/337180.337219"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/332740.332746"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1142\/S0129054103001911"},{"key":"12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/978-3-540-27813-9_25","article-title":"Widening arithmetic automata","author":"bartzis","year":"2004","journal-title":"Proc Int Conf Computer Aided Verification"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"20","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/s100090100049","article-title":"Constraint-based deductive model checking","volume":"3","author":"delzanno","year":"2001","journal-title":"Int J Softw Tools for Technol Transfer"},{"year":"1998","author":"harel","journal-title":"Modeling Reactive Systems with Statecharts The STATEMATE Approach","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/32.317428"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1007\/3-540-45657-0_32"},{"key":"25","first-page":"1","article-title":"On the construction of automata from linear arithmetic constraints","author":"wolper","year":"2000","journal-title":"Proceedings of the 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"year":"2004","author":"yavuz-kahveci","journal-title":"Specification and Automated Verification of Concurrent Software Systems","key":"26"},{"key":"27","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/566172.566199","article-title":"Specification, verification, and synthesis of concurrency control components","author":"yavuz-kahveci","year":"2002","journal-title":"Proceedings of the 2002 International Symposium on Software Testing and Analysis"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1007\/s10009-002-0091-4"},{"key":"29","first-page":"335","article-title":"A library for composite symbolic representations","author":"yavuz-kahveci","year":"2001","journal-title":"Proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"year":"0","journal-title":"FAST Fast Acceleration of Symbolic Transition Systems","key":"3"},{"year":"0","journal-title":"BRAIN Backward Reachability Analysis with Integers","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/978-3-540-45069-6_26"},{"year":"0","journal-title":"ALV Action Language Verifier","key":"1"},{"key":"7","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/10722167_23","article-title":"Efficient reachability analysis of hierarchical reactive machines","author":"alur","year":"2000","journal-title":"Proceedings of the 12th International Conference on Computer Aided Verification"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/325694.325746"},{"year":"0","journal-title":"OMG's UML 1 5 Specification","key":"5"},{"year":"0","journal-title":"LASH The Lie?ge Automata-based Symbolic Handler","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/3-540-36577-X_28"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/978-3-540-45069-6_12"}],"event":{"acronym":"MEMCOD-05","name":"Third ACM & amp; IEEE International Conference on Formal Methods and Models for Co-Design","location":"Verona, Italy"},"container-title":["Proceedings. Second ACM and IEEE International Conference on Formal Methods and Models for Co-Design, 2005. MEMOCODE '05."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9956\/32009\/01487897.pdf?arnumber=1487897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T03:18:11Z","timestamp":1626232691000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1487897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/memcod.2005.1487897","relation":{},"subject":[]}}