{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:57Z","timestamp":1750221117572,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T00:00:00Z","timestamp":1544745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,14]]},"DOI":"10.1145\/3301326.3301348","type":"proceedings-article","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T17:16:26Z","timestamp":1552583786000},"page":"92-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Genetic Algorithm for Generating Counterexample in Stochastic Model Checking"],"prefix":"10.1145","author":[{"given":"Tingting","family":"Zheng","sequence":"first","affiliation":[{"name":"College of Information Engineering, Nanjing University of Finance &amp; Economics, Nanjing, China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanjing University of Finance &amp; Economics, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032352"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2010.04.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11603009_15"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11867340_4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07317-0_3"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"15","volume-title":"Proc. of WAE)","author":"V\u00edctor M.","year":"1999","unstructured":"V\u00edctor M. Jim\u00e9nez and Andr\u00e9s Marzal. Computing the k shortest paths: A new algorithm and an experimental comparison . In Proc. of WAE) , volume 1668 of LNCS , pages 15 -- 29 . Springer , 1999 . V\u00edctor M. Jim\u00e9nez and Andr\u00e9s Marzal. Computing the k shortest paths: A new algorithm and an experimental comparison. In Proc. of WAE), volume 1668 of LNCS, pages 15--29. Springer, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2011.07.003"},{"key":"e_1_3_2_1_9_1","first-page":"118","volume":"58","author":"Armin Biere","year":"2003","unstructured":"Armin Biere , Alessandro Cimatti, Edmund M. Clarke , Ofer Strichman, and Yunshan Zhu . Bounded model checking. Advances in Computers , 58 : 118 -- 149 , 2003 . Armin Biere, Alessandro Cimatti, Edmund M. Clarke, Ofer Strichman, and Yunshan Zhu. Bounded model checking. Advances in Computers, 58:118--149, 2003.","journal-title":"Advances in Computers"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01702-5_15"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.57"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"183","volume-title":"Proc. of SPIN","author":"Husain Aljazzar","year":"2011","unstructured":"Husain Aljazzar , Florian Leitner-Fischer, Stefan Leue , and Dimitar Simeonov. DiPro-A tool for probabilistic counterexample generation . In Proc. of SPIN , volume 6823 of LNCS , pages 183 -- 187 . Springer , 2011 . Husain Aljazzar, Florian Leitner-Fischer, Stefan Leue, and Dimitar Simeonov. DiPro-A tool for probabilistic counterexample generation. In Proc. of SPIN, volume 6823 of LNCS, pages 183--187. Springer, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1838552.1838553"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022067.2022072"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28756-5_21"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2944225.2944372"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.766730"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(90)90004-2"}],"event":{"name":"ICNCC 2018: 2018 VII International Conference on Network, Communication and Computing","acronym":"ICNCC 2018","location":"Taipei City Taiwan"},"container-title":["Proceedings of the 2018 VII International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301326.3301348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301326.3301348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:05Z","timestamp":1750208525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301326.3301348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,14]]},"references-count":18,"alternative-id":["10.1145\/3301326.3301348","10.1145\/3301326"],"URL":"https:\/\/doi.org\/10.1145\/3301326.3301348","relation":{},"subject":[],"published":{"date-parts":[[2018,12,14]]},"assertion":[{"value":"2018-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}