{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:38:44Z","timestamp":1760708324819,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,12]],"date-time":"2011-07-12T00:00:00Z","timestamp":1310428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP0882961"],"award-info":[{"award-number":["LP0882961"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002956","name":"Defence Research and Development Canada","doi-asserted-by":"publisher","award":["W7701-082453"],"award-info":[{"award-number":["W7701-082453"]}],"id":[{"id":"10.13039\/501100002956","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,12]]},"DOI":"10.1145\/2000378.2000399","type":"proceedings-article","created":{"date-parts":[[2011,7,15]],"date-time":"2011-07-15T12:25:09Z","timestamp":1310732709000},"page":"177-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Symbolic model checking of probabilistic knowledge"],"prefix":"10.1145","author":[{"given":"Xiaowei","family":"Huang","sequence":"first","affiliation":[{"name":"University of New South Wales, Australia"}]},{"given":"Cheng","family":"Luo","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]},{"given":"Ron","family":"van der Meyden","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]}],"member":"320","published-online":{"date-parts":[[2011,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000378.2000408"},{"key":"e_1_3_2_1_2_1","first-page":"99","volume-title":"Proc. 6th Int. Conf. on Formal Engineering Methods","volume":"3308","author":"Baukus K.","year":"2004","unstructured":"K. Baukus and R. van der Meyden. A knowledge based analysis of cache coherence . In Proc. 6th Int. Conf. on Formal Engineering Methods , volume 3308 of LNCS, pages 99 -- 114 . Springer , 2004 . K. Baukus and R. van der Meyden. A knowledge based analysis of cache coherence. In Proc. 6th Int. Conf. on Formal Engineering Methods, volume 3308 of LNCS, pages 99--114. Springer, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.07.003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008647823331"},{"key":"e_1_3_2_1_7_1","volume-title":"Model Checking","author":"Clarke E.","year":"1999","unstructured":"E. Clarke , O. Grumberg , and D. Peled . Model Checking . The MIT Press , 1999 . E. Clarke, O. Grumberg, and D. Peled. Model Checking. The MIT Press, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791994.1791999"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning About Knowledge","author":"Fagin R.","year":"1995","unstructured":"R. Fagin , J. Halpern , Y. Moses , and M. Vardi . Reasoning About Knowledge . The MIT Press , 1995 . R. Fagin, J. Halpern, Y. Moses, and M. Vardi. Reasoning About Knowledge. The MIT Press, 1995."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/174652.174658"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27813-9_41"},{"key":"e_1_3_2_1_12_1","volume-title":"Reasoning about Uncertainty","author":"Halpern J. Y.","year":"2003","unstructured":"J. Y. Halpern . Reasoning about Uncertainty . MIT Press , 2003 . J. Y. Halpern. Reasoning about Uncertainty. MIT Press, 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1145948.1145953"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/153724.153770"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11691372_29"},{"issue":"1","key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.3233\/FUN-2008-851-422","article-title":"Verics 2007 - a model checker for knowledge and real-time","volume":"85","author":"Kacprzak M.","year":"2008","unstructured":"M. Kacprzak , W. Nabia\u0142ek , A. Niewiadomski , W. Penczek , A. P\u00f3\u0142rola , M. Szreter , B. Wo\u017ana , and A. Zbrzezny . Verics 2007 - a model checker for knowledge and real-time . Fundamenta Informaticae , 85 ( 1 ): 313 -- 328 , 2008 . M. Kacprzak, W. Nabia\u0142ek, A. Niewiadomski, W. Penczek, A. P\u00f3\u0142rola, M. Szreter, B. Wo\u017ana, and A. Zbrzezny. Verics 2007 - a model checker for knowledge and real-time. Fundamenta Informaticae, 85(1):313--328, 2008.","journal-title":"Fundamenta Informaticae"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00023-X"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_55"},{"key":"e_1_3_2_1_19_1","first-page":"25","volume-title":"Fixed Points in Computer Science","author":"Shilov N. O. G.","year":"2002","unstructured":"N. O. G. Nikolay V. Shilov . Model checking knowledge and fixpoints . In Fixed Points in Computer Science , pages 25 -- 39 , 2002 . N. O. G. Nikolay V. Shilov. Model checking knowledge and fixpoints. In Fixed Points in Computer Science, pages 25--39, 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1239319.1239323"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_22_1","volume-title":"Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer. Unpublished manuscript","author":"Rivest R. L.","year":"1999","unstructured":"R. L. Rivest . Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer. Unpublished manuscript , 1999 . R. L. Rivest. Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer. Unpublished manuscript, 1999."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/259794.259802"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1297352.1297359"},{"key":"e_1_3_2_1_25_1","unstructured":"F. Somenzi. CUDD: CU Decision Diagram Package. http:\/\/vlsi.colorado.edu\/_fabio\/CUDD. F. Somenzi. CUDD: CU Decision Diagram Package. http:\/\/vlsi.colorado.edu\/_fabio\/CUDD."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm009"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/646837.708360"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009683"},{"key":"e_1_3_2_1_29_1","first-page":"105","volume-title":"ENTCS 149(2)","author":"van Ditmarsch H.","year":"2006","unstructured":"H. van Ditmarsch , W. van der Hoek , R. van der Meyden , and J. Ruan . Model checking Russian cards . In ENTCS 149(2) , pages 105 -- 123 , 2006 . 10.1016\/j.entcs.2005.07.029 H. van Ditmarsch, W. van der Hoek, R. van der Meyden, and J. Ruan. Model checking Russian cards. In ENTCS 149(2), pages 105--123, 2006. 10.1016\/j.entcs.2005.07.029"},{"key":"e_1_3_2_1_30_1","volume-title":"Technical Report E 0424, CWI. Software Engineering {SEN}","author":"van Eijck J.","year":"2004","unstructured":"J. van Eijck . Dynamic epistemic modelling. Technical Report E 0424, CWI. Software Engineering {SEN} , 2004 . J. van Eijck. Dynamic epistemic modelling. Technical Report E 0424, CWI. Software Engineering {SEN}, 2004."}],"event":{"name":"TARK XIII: Thirteenth conference on Theoretical Aspects of Rationality and Knowledge","acronym":"TARK XIII","location":"Groningen The Netherlands"},"container-title":["Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000378.2000399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000378.2000399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:00Z","timestamp":1750244400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000378.2000399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,12]]},"references-count":30,"alternative-id":["10.1145\/2000378.2000399","10.1145\/2000378"],"URL":"https:\/\/doi.org\/10.1145\/2000378.2000399","relation":{},"subject":[],"published":{"date-parts":[[2011,7,12]]},"assertion":[{"value":"2011-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}