{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:55Z","timestamp":1750220815636,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T00:00:00Z","timestamp":1562457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,7]]},"DOI":"10.1145\/3343147.3343159","type":"proceedings-article","created":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T19:51:28Z","timestamp":1565985088000},"page":"37-43","source":"Crossref","is-referenced-by-count":7,"title":["Algebraic Approach to Verification and Testing of Distributed Applications"],"prefix":"10.1145","author":[{"given":"Oleksandr","family":"Letychevskyi","sequence":"first","affiliation":[{"name":"Glushkov Institute of Cybernetic of NAS of Ukraine, Kyiv, Ukraine"}]},{"given":"Volodymyr","family":"Peschanenko","sequence":"additional","affiliation":[{"name":"Kherson State University, Kherson, Ukraine"}]},{"given":"Viktor","family":"Radchenko","sequence":"additional","affiliation":[{"name":"Garuda AI, Het Poortgebouw, Schiphol, Netherland"}]},{"given":"Maxim","family":"Orlovsky","sequence":"additional","affiliation":[{"name":"Pandora Core AG, Zug, Switzerland"}]},{"given":"Andrey","family":"Sobol","sequence":"additional","affiliation":[{"name":"Pandora Core AG, Zug, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Algebraic Programming System APS www.apsystem.org.ua  Algebraic Programming System APS www.apsystem.org.ua"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"357","article-title":"Insertion Modeling and Its Applications","volume":"24","author":"Letichevsky A.","year":"2016","journal-title":"Computer Science Journal of Moldova"},{"key":"e_1_3_2_1_3_1","first-page":"662","article-title":"Basic Protocols, Message Sequence Charts, and the Verification of Requirements Specifications","volume":"47","author":"Letichevsky A.","year":"2005","journal-title":"Computer Networks"},{"key":"e_1_3_2_1_4_1","unstructured":"Z3 decision procedure. https:\/\/github.com\/Z3Prover\/z3  Z3 decision procedure. https:\/\/github.com\/Z3Prover\/z3"},{"key":"e_1_3_2_1_5_1","unstructured":"CVC4 decision procedure. http:\/\/cvc4.cs.stanford.edu  CVC4 decision procedure. http:\/\/cvc4.cs.stanford.edu"},{"volume-title":"Springer-Verlag","year":"1999","author":"Letichevsky A.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"ITU-T Recommendation Z.151 User Requirements Notation (URN) - Language definition.  ITU-T Recommendation Z.151 User Requirements Notation (URN) - Language definition."},{"key":"e_1_3_2_1_8_1","unstructured":"ITU-T Recommendation Z.120 Message Sequence Charts (MSC).  ITU-T Recommendation Z.120 Message Sequence Charts (MSC)."},{"key":"e_1_3_2_1_9_1","unstructured":"Prometheus consensus protocol https:\/\/github.com\/pandoraboxchain\/prometheus-python  Prometheus consensus protocol https:\/\/github.com\/pandoraboxchain\/prometheus-python"},{"volume-title":"Conf. ICTERI 2015","year":"2015","author":"Letichevsky A.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28891-3_3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54013-4_10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2323977"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_18_1","unstructured":"DARPA \"Cyber Grand Challenge.\" {Online}. Available: https: \/\/www.cybergrandchallenge.com\/  DARPA \"Cyber Grand Challenge.\" {Online}. Available: https: \/\/www.cybergrandchallenge.com\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2017.8028670"},{"key":"e_1_3_2_1_20_1","first-page":"241","article-title":"Algebra of Behavior Transformations and its Applications\", in V. B. Kudryavtsev and I. G. Rosenberg (eds.), Structural Theory of Automata, Semigroups, and Universal Algebra, NATO Science Series II. Mathematics","volume":"207","author":"Letichevsky A.","year":"2005","journal-title":"Physics and Chemistry - V."}],"event":{"name":"IECC ' 19: 2019 International Electronics Communication Conference","acronym":"IECC ' 19","location":"Okinawa Japan"},"container-title":["Proceedings of the 2019 International Electronics Communication Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3343147.3343159","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3343147.3343159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:05Z","timestamp":1750201985000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3343147.3343159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,7]]},"references-count":19,"alternative-id":["10.1145\/3343147.3343159","10.1145\/3343147"],"URL":"https:\/\/doi.org\/10.1145\/3343147.3343159","relation":{},"subject":[],"published":{"date-parts":[[2019,7,7]]}}}