{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:47Z","timestamp":1750307987796,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,17]],"date-time":"2006-07-17T00:00:00Z","timestamp":1153094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,17]]},"DOI":"10.1145\/1147403.1147406","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Formal verification of concurrent software"],"prefix":"10.1145","author":[{"given":"Hana","family":"Chockler","sequence":"first","affiliation":[{"name":"Haifa University, Haifa, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eitan","family":"Farchi","sequence":"additional","affiliation":[{"name":"Haifa University, Haifa, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ziv","family":"Glazberg","sequence":"additional","affiliation":[{"name":"Haifa University, Haifa, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benny","family":"Godlin","sequence":"additional","affiliation":[{"name":"Haifa University, Haifa, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yarden","family":"Nir-Buchbinder","sequence":"additional","affiliation":[{"name":"Haifa University, Haifa, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ishai","family":"Rabinovitz","sequence":"additional","affiliation":[{"name":"Mellanox Technologies, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,7,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Explisat: Guiding sat-based software verification with explicit states. Submitted for publication","author":"Barner S.","year":"2005","unstructured":"S. Barner , C. Eisner , Z. Glazberg , D. Kroening , and I. Rabinovitz . Explisat: Guiding sat-based software verification with explicit states. Submitted for publication , 2005 . S. Barner, C. Eisner, Z. Glazberg, D. Kroening, and I. Rabinovitz. Explisat: Guiding sat-based software verification with explicit states. Submitted for publication, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065972"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. Workshop on Logic of Programs","volume":"131","author":"Clarke E.","year":"1981","unstructured":"E. Clarke and E. Emerson . Design and synthesis of synchronization skeletons using branching time temporal logic . In Proc. Workshop on Logic of Programs volume 131 of Lecture Notes in Computer Science pages 52--71. Springer-Verlag , 1981 . E. Clarke and E. Emerson. Design and synthesis of synchronization skeletons using branching time temporal logic. In Proc. Workshop on Logic of Programs volume 131 of Lecture Notes in Computer Science pages 52--71. Springer-Verlag, 1981."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"issue":"1","key":"e_1_3_2_1_6_1","article-title":"Testing multi-threaded Java programs","volume":"41","author":"Edelstein O.","year":"2002","unstructured":"O. Edelstein , E. Farchi , E. Goldin , Y. Nir , G. Ratsaby , and S. Ur . Testing multi-threaded Java programs . IBM System Journal Special Issue on Software Testing 41 ( 1 ), February 2002 . O. Edelstein, E. Farchi, E. Goldin, Y. Nir, G. Ratsaby, and S. Ur. Testing multi-threaded Java programs. IBM System Journal Special Issue on Software Testing 41(1), February 2002.","journal-title":"IBM System Journal Special Issue on Software Testing"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11589976_3"},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/research.microsoft.com\/~thoare\/","author":"Hoare T.","year":"2005","unstructured":"T. Hoare . The verifying compiler. http:\/\/research.microsoft.com\/~thoare\/ , 2005 . T. Hoare. The verifying compiler. http:\/\/research.microsoft.com\/~thoare\/, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/318593.318622"},{"key":"e_1_3_2_1_10_1","volume-title":"Fuzz revisited: A re-examination of the reliability of unix utilities and services","author":"Miller B.","year":"1995","unstructured":"B. Miller , D. Koski , C. Lee , V. Maganty , R. Murthy , A. Natarajan , and J. Steidl . Fuzz revisited: A re-examination of the reliability of unix utilities and services , 1995 . B. Miller, D. Koski, C. Lee, V. Maganty, R. Murthy, A. Natarajan, and J. Steidl. Fuzz revisited: A re-examination of the reliability of unix utilities and services, 1995."},{"key":"e_1_3_2_1_11_1","volume-title":"UK","author":"Mitzenmacher M.","year":"2005","unstructured":"M. Mitzenmacher and E. Upfal . Probability and Computing: Randomized Algorithms and Probabilistic Analysis Cambridge University Press , UK , 2005 . M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis Cambridge University Press, UK, 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.379017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(81)90110-9"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. 5th International Symp. on Programming","volume":"137","author":"Queille J.","year":"1981","unstructured":"J. Queille and J. Sifakis . Specification and verification of concurrent systems in Cesar . In Proc. 5th International Symp. on Programming volume 137 of Lecture Notes in Computer Science pages 337--351. Springer-Verlag , 1981 . J. Queille and J. Sifakis. Specification and verification of concurrent systems in Cesar. In Proc. 5th International Symp. on Programming volume 137 of Lecture Notes in Computer Science pages 337--351. Springer-Verlag, 1981."},{"key":"e_1_3_2_1_15_1","volume-title":"How to Break Software Addison-Wesley","author":"Whittaker J. A.","year":"2003","unstructured":"J. A. Whittaker . How to Break Software Addison-Wesley , 2003 . J. A. Whittaker. How to Break Software Addison-Wesley, 2003."}],"event":{"name":"ISSTA06: International Symposium on Software Testing and Analysis 2006","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Portland Maine USA","acronym":"ISSTA06"},"container-title":["Proceedings of the 2006 workshop on Parallel and distributed systems: testing and debugging"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1147403.1147406","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1147403.1147406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:12Z","timestamp":1750259172000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1147403.1147406"}},"subtitle":["two case studies"],"short-title":[],"issued":{"date-parts":[[2006,7,17]]},"references-count":15,"alternative-id":["10.1145\/1147403.1147406","10.1145\/1147403"],"URL":"https:\/\/doi.org\/10.1145\/1147403.1147406","relation":{},"subject":[],"published":{"date-parts":[[2006,7,17]]},"assertion":[{"value":"2006-07-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}