{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:15:58Z","timestamp":1770977758885,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,14]],"date-time":"2017-01-14T00:00:00Z","timestamp":1484352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,14]]},"DOI":"10.1145\/3034950.3034984","type":"proceedings-article","created":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:24:09Z","timestamp":1490286249000},"page":"113-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A New Parallel Approach for Reachability Analysis of Pushdown Models"],"prefix":"10.1145","author":[{"given":"Lingjie","family":"Shu","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Jianqi","family":"Shi","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Xin","family":"Ye","sequence":"additional","affiliation":[{"name":"Eash China Normal University, Shanghai, China"}]},{"given":"Ningkang","family":"Jiang","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Yichun","family":"Li","sequence":"additional","affiliation":[{"name":"Eash China Normal University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2017,1,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"et al","author":"A.","year":"1997","unstructured":"Bouajjani, A. et al . 1997 . Reachability analysis of pushdown automata: Application to model-checking. CONCUR '97: Concurrency Theory. A. Mazurkiewicz and J. Winkowski, eds. Springer Berlin Heidelberg . 135--150. Bouajjani, A. et al. 1997. Reachability analysis of pushdown automata: Application to model-checking. CONCUR '97: Concurrency Theory. A. Mazurkiewicz and J. Winkowski, eds. Springer Berlin Heidelberg. 135--150."},{"key":"e_1_3_2_1_2_1","first-page":"232","article-title":"2000","author":"J.","year":"1855","unstructured":"Esparza, J. et al . 2000 . Efficient Algorithms for Model Checking Pushdown Systems. CAV . 1855 , C hapter 20 (2000), 232 -- 247 . Esparza, J. et al. 2000. Efficient Algorithms for Model Checking Pushdown Systems. CAV. 1855, Chapter 20 (2000), 232--247.","journal-title":"Efficient Algorithms for Model Checking Pushdown Systems. CAV"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11539452_36"},{"key":"e_1_3_2_1_4_1","unstructured":"G.S.1. Almasi and A. Gottlieb. 1989. Highly parallel computing Redwood City Calif.: Benjamin\/Cummings.   G.S.1. Almasi and A. Gottlieb. 1989. Highly parallel computing Redwood City Calif.: Benjamin\/Cummings."},{"key":"e_1_3_2_1_5_1","volume-title":"Model-Checking Pushdown Systems","author":"Schwoon S.","year":"2007","unstructured":"S. Schwoon . 2007. Model-Checking Pushdown Systems ; Model-Checken von Pushdown Systemen . ( 2007 ). S. Schwoon. 2007. Model-Checking Pushdown Systems; Model-Checken von Pushdown Systemen. (2007)."},{"key":"e_1_3_2_1_6_1","first-page":"2010","article-title":"2010. Spark","author":"Zaharia M.","year":"2010","unstructured":"M. Zaharia , M. Chowdhury , M.J. Franklin , S. Shenker , and I. Stoica . 2010. Spark : Cluster Computing with Working Sets. HotCloud 2010 ( 2010 ). M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker, and I. Stoica. 2010. Spark: Cluster Computing with Working Sets. HotCloud 2010 (2010).","journal-title":"Cluster Computing with Working Sets. HotCloud"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_39"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325697"},{"key":"e_1_3_2_1_9_1","volume-title":"Efficient Malware Detection Using Model-Checking. In FM 2012: Formal Methods. Lecture Notes in Computer Science","author":"Song F.","unstructured":"F. Song and T. Touili . 2012 . Efficient Malware Detection Using Model-Checking. In FM 2012: Formal Methods. Lecture Notes in Computer Science . Berlin, Heidelberg : Springer Berlin Heidelberg, 418--433. F. Song and T. Touili. 2012. Efficient Malware Detection Using Model-Checking. In FM 2012: Formal Methods. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 418--433."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(05)80426-8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J. Esparza and S. Schwoon. 2001. A BDD-Based Model Checker for Recursive Programs. CAV 2102 Chapter 30 (2001) 324--336.   J. Esparza and S. Schwoon. 2001. A BDD-Based Model Checker for Recursive Programs. CAV 2102 Chapter 30 (2001) 324--336.","DOI":"10.1007\/3-540-44585-4_30"},{"key":"e_1_3_2_1_12_1","first-page":"316","article-title":"2001. Model-Checking LTL with Regular Valuations for Pushdown Systems. TACS 2215","volume":"16","author":"Esparza J.","year":"2001","unstructured":"J. Esparza , A. Kucera , and S. Schwoon . 2001. Model-Checking LTL with Regular Valuations for Pushdown Systems. TACS 2215 , Chapter 16 ( 2001 ), 316 -- 339 . J. Esparza, A. Kucera, and S. Schwoon. 2001. Model-Checking LTL with Regular Valuations for Pushdown Systems. TACS 2215, Chapter 16 (2001), 316--339.","journal-title":"Chapter"},{"key":"e_1_3_2_1_13_1","first-page":"189","article-title":"2003. Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. SAS 2694","volume":"11","author":"Reps T.W.","year":"2003","unstructured":"T.W. Reps , S. Schwoon , and S. Jha . 2003. Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. SAS 2694 , Chapter 11 ( 2003 ), 189 -- 213 . T.W. Reps, S. Schwoon, and S. Jha. 2003. Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. SAS 2694, Chapter 11 (2003), 189--213.","journal-title":"Chapter"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-014-0330-y"}],"event":{"name":"ICMSS '17: 2017 International Conference on Management Engineering, Software Engineering and Service Sciences","location":"Wuhan China","acronym":"ICMSS '17","sponsor":["Wuhan Univ. Wuhan University, China"]},"container-title":["Proceedings of the 2017 International Conference on Management Engineering, Software Engineering and Service Sciences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034950.3034984","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3034950.3034984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:33Z","timestamp":1750220613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034950.3034984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,14]]},"references-count":14,"alternative-id":["10.1145\/3034950.3034984","10.1145\/3034950"],"URL":"https:\/\/doi.org\/10.1145\/3034950.3034984","relation":{},"subject":[],"published":{"date-parts":[[2017,1,14]]},"assertion":[{"value":"2017-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}