{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:29Z","timestamp":1750221209887,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,3]]},"DOI":"10.1145\/3238147.3240487","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T20:04:36Z","timestamp":1534795476000},"page":"892-895","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["L-CMP: an automatic learning-based parameterized verification tool"],"prefix":"10.1145","author":[{"given":"Jialun","family":"Cao","sequence":"first","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Yongjian","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/170036.170072"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(86)90071-2"},{"key":"e_1_3_2_1_3_1","first-page":"221","article-title":"Parameterized verification with automatically computed inductive assertions?. In CAV. Springer","volume":"2102","author":"Pnueli A.","year":"2001","unstructured":"A. Pnueli , S. Ruah , Y. Xu , and L. Zuck . 2001 . Parameterized verification with automatically computed inductive assertions?. In CAV. Springer , LNCS 2102 , 221 \u2013 234 . A. Pnueli, S. Ruah, Y. Xu, and L. Zuck. 2001. Parameterized verification with automatically computed inductive assertions?. In CAV. Springer, LNCS 2102, 221\u2013234.","journal-title":"LNCS"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/646541.696180"},{"key":"e_1_3_2_1_5_1","unstructured":"X. Chen and G. Gopalakrishnan. 2006. A General Compositional Approach to Verifying Hierarchical Cache Coherence Protocols. Technical Report. UUCS-06-014 School of Computing University of Utah.  X. Chen and G. Gopalakrishnan. 2006. A General Compositional Approach to Verifying Hierarchical Cache Coherence Protocols. Technical Report. UUCS-06-014 School of Computing University of Utah."},{"key":"e_1_3_2_1_6_1","first-page":"382","article-title":"A simple method for parameterized verification of cache coherence protocols. In FMCAD. Springer","volume":"3312","author":"Chou C.-T.","year":"2004","unstructured":"C.-T. Chou , P. K Mannava , and S. Park . 2004 . A simple method for parameterized verification of cache coherence protocols. In FMCAD. Springer , LNCS 3312 , 382 \u2013 398 . C.-T. Chou, P. K Mannava, and S. Park. 2004. A simple method for parameterized verification of cache coherence protocols. In FMCAD. Springer, LNCS 3312, 382\u2013 398.","journal-title":"LNCS"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_55"},{"key":"e_1_3_2_1_8_1","unstructured":"S. Krstic. 2005. Parameterized system verification with guard strengthening and parameter abstraction. In Automated Verification of Infinite State Systems.  S. Krstic. 2005. Parameterized system verification with guard strengthening and parameter abstraction. In Automated Verification of Infinite State Systems."},{"key":"e_1_3_2_1_9_1","volume-title":"FMCAD","author":"Conchon S.","year":"2013","unstructured":"S. Conchon , A. Goel , S. Krsti\u0107 , A. Mebsout , and F. Za\u00efdi . 2013. Invariants for finite instances and beyond . In FMCAD , 2013 . IEEE, 61\u201368. S. Conchon, A. Goel, S. Krsti\u0107, A. Mebsout, and F. Za\u00efdi. 2013. Invariants for finite instances and beyond. In FMCAD, 2013. IEEE, 61\u201368."},{"key":"e_1_3_2_1_10_1","first-page":"247","article-title":"Exact and efficient verification of parameterized cache coherence protocols. In CHDVM. Springer","volume":"2860","author":"Emerson E. A.","year":"2003","unstructured":"E. A. Emerson and V. Kahlon . 2003 . Exact and efficient verification of parameterized cache coherence protocols. In CHDVM. Springer , LNCS 2860 , 247 \u2013 262 . E. A. Emerson and V. Kahlon. 2003. Exact and efficient verification of parameterized cache coherence protocols. In CHDVM. Springer, LNCS 2860, 247\u2013262.","journal-title":"LNCS"},{"key":"e_1_3_2_1_11_1","first-page":"267","article-title":"Constructing quantified invariants via predicate abstraction. In VMCAI. Springer","volume":"2937","author":"Lahiri S. K.","year":"2004","unstructured":"S. K. Lahiri and R. E. Bryant . 2004 . Constructing quantified invariants via predicate abstraction. In VMCAI. Springer , LNCS 2937 , 267 \u2013 281 . S. K. Lahiri and R. E. Bryant. 2004. Constructing quantified invariants via predicate abstraction. In VMCAI. Springer, LNCS 2937, 267\u2013281.","journal-title":"LNCS"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Y. Li K. Duan Y. Lv J. Pang and S. Cai. 2016. A novel approach to parameterized verification of cache coherence protocols. In ICCD. IEEE 560\u2013567.  Y. Li K. Duan Y. Lv J. Pang and S. Cai. 2016. A novel approach to parameterized verification of cache coherence protocols. In ICCD. IEEE 560\u2013567.","DOI":"10.1109\/ICCD.2016.7753341"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MEMCOD.2007.371252"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646705.702177"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560548_24"},{"key":"e_1_3_2_1_16_1","volume-title":"LNCS","author":"Pnueli A.","year":"2013","unstructured":"A. Pnueli , S. Ruah , and L. Zuck . 2001. Automatic deductive verification with invisible invariants. In TACAS. Springer , LNCS 2013 , 82\u201397. A. Pnueli, S. Ruah, and L. Zuck. 2001. Automatic deductive verification with invisible invariants. In TACAS. Springer, LNCS 2013, 82\u201397."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647765.735986"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Going with the flow: Parameterized verification using message flows","author":"Talupur M.","year":"2008","unstructured":"M. Talupur and M. R. Tuttle . 2008 . Going with the flow: Parameterized verification using message flows . In FMCAD. IEEE , 1 - 8 . M. Talupur and M. R. Tuttle. 2008. Going with the flow: Parameterized verification using message flows. In FMCAD. IEEE, 1-8.","journal-title":"FMCAD. IEEE"},{"key":"e_1_3_2_1_19_1","volume-title":"LNCS","author":"Tiwari A.","year":"2013","unstructured":"A. Tiwari , H. Rue\u00df , H. Sa\u00efdi , and N. Shankar . 2001. A technique for invariant generation. In TACAS. Springer , LNCS 2013 , 113\u2013127. Abstract 1 INTRODUCTION 2 RELATED WORKS 3 AN OVERVIEW OF L-CMP 4 IMPLEMENTATION DETAILS 4.1 Phase One 4.2 Phase Two 5 TOOL USAGE 6 EXPERIMENTAL EVALUATION 7 CONCLUDING REMARKS References A. Tiwari, H. Rue\u00df, H. Sa\u00efdi, and N. Shankar. 2001. A technique for invariant generation. In TACAS. Springer, LNCS 2013, 113\u2013127. Abstract 1 INTRODUCTION 2 RELATED WORKS 3 AN OVERVIEW OF L-CMP 4 IMPLEMENTATION DETAILS 4.1 Phase One 4.2 Phase Two 5 TOOL USAGE 6 EXPERIMENTAL EVALUATION 7 CONCLUDING REMARKS References"}],"event":{"name":"ASE '18: 33rd ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","CNRS Centre National De La Rechercue Scientifique","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Montpellier France","acronym":"ASE '18"},"container-title":["Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3240487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3238147.3240487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:41Z","timestamp":1750210781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3240487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":19,"alternative-id":["10.1145\/3238147.3240487","10.1145\/3238147"],"URL":"https:\/\/doi.org\/10.1145\/3238147.3240487","relation":{},"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}