callback( { "result":{ "query":":facetid:toc:\"db/conf/atva/atva2007.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"63.16" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"41", "@dc":"41", "@oc":"41", "@id":"43380851", "text":":facetid:toc:db/conf/atva/atva2007.bht" } }, "hits":{ "@total":"41", "@computed":"41", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"5520465", "info":{"authors":{"author":[{"@pid":"69/5664","text":"Bijan Alizadeh"},{"@pid":"56/1768","text":"Masahiro Fujita"}]},"title":"Automatic Merge-Point Detection for Sequential Equivalence Checking of System-Level and RTL Descriptions.","venue":"ATVA","pages":"129-144","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/AlizadehF07","doi":"10.1007/978-3-540-75596-8_11","ee":"https://doi.org/10.1007/978-3-540-75596-8_11","url":"https://dblp.org/rec/conf/atva/AlizadehF07"}, "url":"URL#5520465" }, { "@score":"1", "@id":"5520466", "info":{"authors":{"author":[{"@pid":"k/JorgKreiker","text":"Jörg Bauer 0001"},{"@pid":"91/353","text":"Tobe Toben"},{"@pid":"45/5359","text":"Bernd Westphal"}]},"title":"Mind the Shapes: Abstraction Refinement Via Topology Invariants.","venue":"ATVA","pages":"35-50","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/BauerTW07","doi":"10.1007/978-3-540-75596-8_5","ee":"https://doi.org/10.1007/978-3-540-75596-8_5","url":"https://dblp.org/rec/conf/atva/BauerTW07"}, "url":"URL#5520466" }, { "@score":"1", "@id":"5520467", "info":{"authors":{"author":[{"@pid":"71/3025","text":"Bernard Berthomieu"},{"@pid":"46/2844","text":"Florent Peres"},{"@pid":"18/629","text":"François Vernadat 0001"}]},"title":"Model Checking Bounded Prioritized Time Petri Nets.","venue":"ATVA","pages":"523-532","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/BerthomieuPV07","doi":"10.1007/978-3-540-75596-8_37","ee":"https://doi.org/10.1007/978-3-540-75596-8_37","url":"https://dblp.org/rec/conf/atva/BerthomieuPV07"}, "url":"URL#5520467" }, { "@score":"1", "@id":"5520468", "info":{"authors":{"author":[{"@pid":"38/2132","text":"Dragan Bosnacki"},{"@pid":"11/5933","text":"Alastair F. Donaldson"},{"@pid":"l/MLeuschel","text":"Michael Leuschel"},{"@pid":"52/1845","text":"Thierry Massart"}]},"title":"Efficient Approximate Verification of Promela Models Via Symmetry Markers.","venue":"ATVA","pages":"300-315","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/BosnackiDLM07","doi":"10.1007/978-3-540-75596-8_22","ee":"https://doi.org/10.1007/978-3-540-75596-8_22","url":"https://dblp.org/rec/conf/atva/BosnackiDLM07"}, "url":"URL#5520468" }, { "@score":"1", "@id":"5520469", "info":{"authors":{"author":[{"@pid":"30/3611","text":"Hichem Boudali"},{"@pid":"18/4326","text":"Pepijn Crouzen"},{"@pid":"20/3901","text":"Mariëlle Stoelinga"}]},"title":"A Compositional Semantics for Dynamic Fault Trees in Terms of Interactive Markov Chains.","venue":"ATVA","pages":"441-456","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/BoudaliCS07","doi":"10.1007/978-3-540-75596-8_31","ee":"https://doi.org/10.1007/978-3-540-75596-8_31","url":"https://dblp.org/rec/conf/atva/BoudaliCS07"}, "url":"URL#5520469" }, { "@score":"1", "@id":"5520470", "info":{"authors":{"author":[{"@pid":"66/3003","text":"Marco Bozzano"},{"@pid":"13/5961","text":"Alessandro Cimatti"},{"@pid":"16/1309","text":"Francesco Tapparo"}]},"title":"Symbolic Fault Tree Analysis for Reactive Systems.","venue":"ATVA","pages":"162-176","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/BozzanoCT07","doi":"10.1007/978-3-540-75596-8_13","ee":"https://doi.org/10.1007/978-3-540-75596-8_13","url":"https://dblp.org/rec/conf/atva/BozzanoCT07"}, "url":"URL#5520470" }, { "@score":"1", "@id":"5520471", "info":{"authors":{"author":[{"@pid":"99/622","text":"Franck Cassez"},{"@pid":"06/5602","text":"Alexandre David"},{"@pid":"l/KimGuldstrandLarsen","text":"Kim Guldstrand Larsen"},{"@pid":"94/6720","text":"Didier Lime"},{"@pid":"05/4174","text":"Jean-François Raskin"}]},"title":"Timed Control with Observation Based and Stuttering Invariant Strategies.","venue":"ATVA","pages":"192-206","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/CassezDLLR07","doi":"10.1007/978-3-540-75596-8_15","ee":"https://doi.org/10.1007/978-3-540-75596-8_15","url":"https://dblp.org/rec/conf/atva/CassezDLLR07"}, "url":"URL#5520471" }, { "@score":"1", "@id":"5520472", "info":{"authors":{"author":[{"@pid":"d/WernerDamm","text":"Werner Damm"},{"@pid":"97/4999","text":"Stefan Disch"},{"@pid":"25/6675","text":"Hardi Hungar"},{"@pid":"73/6880","text":"Swen Jacobs"},{"@pid":"p/JunPang","text":"Jun Pang 0001"},{"@pid":"87/4128","text":"Florian Pigorsch"},{"@pid":"s/ChristophScholl","text":"Christoph Scholl 0001"},{"@pid":"w/UweWaldmann","text":"Uwe Waldmann"},{"@pid":"69/1261","text":"Boris Wirtz"}]},"title":"Exact State Set Representations in the Verification of Linear Hybrid Systems with Large Discrete State Space.","venue":"ATVA","pages":"425-440","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/DammDHJPPSWW07","doi":"10.1007/978-3-540-75596-8_30","ee":"https://doi.org/10.1007/978-3-540-75596-8_30","url":"https://dblp.org/rec/conf/atva/DammDHJPPSWW07"}, "url":"URL#5520472" }, { "@score":"1", "@id":"5520473", "info":{"authors":{"author":[{"@pid":"95/1815","text":"Muhammad Torabi Dashti"},{"@pid":"77/6678","text":"Anton Wijs"}]},"title":"Pruning State Spaces with Extended Beam Search.","venue":"ATVA","pages":"543-552","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/DashtiW07","doi":"10.1007/978-3-540-75596-8_39","ee":"https://doi.org/10.1007/978-3-540-75596-8_39","url":"https://dblp.org/rec/conf/atva/DashtiW07"}, "url":"URL#5520473" }, { "@score":"1", "@id":"5520474", "info":{"authors":{"author":[{"@pid":"60/2500","text":"Christian Dax"},{"@pid":"75/3685","text":"Jochen Eisinger"},{"@pid":"27/6182","text":"Felix Klaedtke"}]},"title":"Mechanizing the Powerset Construction for Restricted Classes of omega -Automata.","venue":"ATVA","pages":"223-236","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/DaxEK07","doi":"10.1007/978-3-540-75596-8_17","ee":"https://doi.org/10.1007/978-3-540-75596-8_17","url":"https://dblp.org/rec/conf/atva/DaxEK07"}, "url":"URL#5520474" }, { "@score":"1", "@id":"5520475", "info":{"authors":{"author":[{"@pid":"31/2621","text":"Edith Elkind"},{"@pid":"59/6859","text":"Blaise Genest"},{"@pid":"p/DPeled","text":"Doron A. Peled"},{"@pid":"92/1332","text":"Paola Spoletini"}]},"title":"Quantifying the Discord: Order Discrepancies in Message Sequence Charts.","venue":"ATVA","pages":"378-393","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/ElkindGPS07","doi":"10.1007/978-3-540-75596-8_27","ee":"https://doi.org/10.1007/978-3-540-75596-8_27","url":"https://dblp.org/rec/conf/atva/ElkindGPS07"}, "url":"URL#5520475" }, { "@score":"1", "@id":"5520476", "info":{"authors":{"author":[{"@pid":"17/3701","text":"Thomas Gawlitza"},{"@pid":"s/HelmutSeidl","text":"Helmut Seidl"}]},"title":"Computing Game Values for Crash Games.","venue":"ATVA","pages":"177-191","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/GawlitzaS07","doi":"10.1007/978-3-540-75596-8_14","ee":"https://doi.org/10.1007/978-3-540-75596-8_14","url":"https://dblp.org/rec/conf/atva/GawlitzaS07"}, "url":"URL#5520476" }, { "@score":"1", "@id":"5520477", "info":{"authors":{"author":[{"@pid":"95/422","text":"Gilles Geeraerts"},{"@pid":"05/4174","text":"Jean-François Raskin"},{"@pid":"83/1643","text":"Laurent Van Begin"}]},"title":"On the Efficient Computation of the Minimal Coverability Set for Petri Nets.","venue":"ATVA","pages":"98-113","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/GeeraertsRB07","doi":"10.1007/978-3-540-75596-8_9","ee":"https://doi.org/10.1007/978-3-540-75596-8_9","url":"https://dblp.org/rec/conf/atva/GeeraertsRB07"}, "url":"URL#5520477" }, { "@score":"1", "@id":"5520478", "info":{"authors":{"author":[{"@pid":"g/OrnaGrumberg","text":"Orna Grumberg"},{"@pid":"s/AssafSchuster","text":"Assaf Schuster"},{"@pid":"00/2412","text":"Avi Yadgar"}]},"title":"3-Valued Circuit SAT for STE with Automatic Refinement.","venue":"ATVA","pages":"457-473","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/GrumbergSY07","doi":"10.1007/978-3-540-75596-8_32","ee":"https://doi.org/10.1007/978-3-540-75596-8_32","url":"https://dblp.org/rec/conf/atva/GrumbergSY07"}, "url":"URL#5520478" }, { "@score":"1", "@id":"5520479", "info":{"authors":{"author":[{"@pid":"22/639","text":"Peter Habermehl"},{"@pid":"81/5510","text":"Radu Iosif"},{"@pid":"87/2946","text":"Adam Rogalewicz"},{"@pid":"51/533","text":"Tomás Vojnar"}]},"title":"Proving Termination of Tree Manipulating Programs.","venue":"ATVA","pages":"145-161","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/HabermehlIRV07","doi":"10.1007/978-3-540-75596-8_12","ee":"https://doi.org/10.1007/978-3-540-75596-8_12","url":"https://dblp.org/rec/conf/atva/HabermehlIRV07"}, "url":"URL#5520479" }, { "@score":"1", "@id":"5520480", "info":{"authors":{"author":[{"@pid":"38/3003-1","text":"Tingting Han 0001"},{"@pid":"k/JoostPieterKatoen","text":"Joost-Pieter Katoen"}]},"title":"Providing Evidence of Likely Being on Time: Counterexample Generation for CTMC Model Checking.","venue":"ATVA","pages":"331-346","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/HanK07","doi":"10.1007/978-3-540-75596-8_24","ee":"https://doi.org/10.1007/978-3-540-75596-8_24","url":"https://dblp.org/rec/conf/atva/HanK07"}, "url":"URL#5520480" }, { "@score":"1", "@id":"5520481", "info":{"authors":{"author":{"@pid":"22/6230","text":"Atsushi Hasegawa"}},"title":"Recent Trend in Industry and Expectation to DA Research.","venue":"ATVA","pages":"15-16","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/Hasegawa07","doi":"10.1007/978-3-540-75596-8_2","ee":"https://doi.org/10.1007/978-3-540-75596-8_2","url":"https://dblp.org/rec/conf/atva/Hasegawa07"}, "url":"URL#5520481" }, { "@score":"1", "@id":"5520482", "info":{"authors":{"author":[{"@pid":"77/4395","text":"Geng-Dian Huang"},{"@pid":"36/6517","text":"Bow-Yaw Wang"}]},"title":"Complete SAT-Based Model Checking for Context-Free Processes.","venue":"ATVA","pages":"51-65","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/HuangW07","doi":"10.1007/978-3-540-75596-8_6","ee":"https://doi.org/10.1007/978-3-540-75596-8_6","url":"https://dblp.org/rec/conf/atva/HuangW07"}, "url":"URL#5520482" }, { "@score":"1", "@id":"5520483", "info":{"authors":{"author":{"@pid":"11/6551","text":"Moonzoo Kim"}},"title":"Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances.","venue":"ATVA","pages":"489-500","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/Kim07","doi":"10.1007/978-3-540-75596-8_34","ee":"https://doi.org/10.1007/978-3-540-75596-8_34","url":"https://dblp.org/rec/conf/atva/Kim07"}, "url":"URL#5520483" }, { "@score":"1", "@id":"5520484", "info":{"authors":{"author":[{"@pid":"k/OrnaKupferman","text":"Orna Kupferman"},{"@pid":"22/1826","text":"Yoad Lustig"}]},"title":"Latticed Simulation Relations and Games.","venue":"ATVA","pages":"316-330","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/KupfermanL07","doi":"10.1007/978-3-540-75596-8_23","ee":"https://doi.org/10.1007/978-3-540-75596-8_23","url":"https://dblp.org/rec/conf/atva/KupfermanL07"}, "url":"URL#5520484" }, { "@score":"1", "@id":"5520485", "info":{"authors":{"author":[{"@pid":"l/GuoqiangLi1","text":"Guoqiang Li 0001"},{"@pid":"55/2431","text":"Mizuhito Ogawa"}]},"title":"On-the-Fly Model Checking of Fair Non-repudiation Protocols.","venue":"ATVA","pages":"511-522","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/LiO07","doi":"10.1007/978-3-540-75596-8_36","ee":"https://doi.org/10.1007/978-3-540-75596-8_36","url":"https://dblp.org/rec/conf/atva/LiO07"}, "url":"URL#5520485" }, { "@score":"1", "@id":"5520486", "info":{"authors":{"author":[{"@pid":"32/3844","text":"Scott Little"},{"@pid":"55/5655","text":"David Walter"},{"@pid":"116/9864","text":"Kevin R. Jones"},{"@pid":"89/3161","text":"Chris J. Myers"}]},"title":"Analog/Mixed-Signal Circuit Verification Using Models Generated from Simulation Traces.","venue":"ATVA","pages":"114-128","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/LittleWJM07","doi":"10.1007/978-3-540-75596-8_10","ee":"https://doi.org/10.1007/978-3-540-75596-8_10","url":"https://dblp.org/rec/conf/atva/LittleWJM07"}, "url":"URL#5520486" }, { "@score":"1", "@id":"5520487", "info":{"authors":{"author":{"@pid":"m/KennethLMcMillan","text":"Kenneth L. McMillan"}},"title":"Toward Property-Driven Abstraction for Heap Manipulating Programs.","venue":"ATVA","pages":"17-18","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/McMillan07","doi":"10.1007/978-3-540-75596-8_3","ee":"https://doi.org/10.1007/978-3-540-75596-8_3","url":"https://dblp.org/rec/conf/atva/McMillan07"}, "url":"URL#5520487" }, { "@score":"1", "@id":"5520488", "info":{"authors":{"author":[{"@pid":"93/1152","text":"Mercedes G. Merayo"},{"@pid":"n/ManuelNunez","text":"Manuel Núñez 0001"},{"@pid":"41/4428","text":"Ismael Rodríguez"}]},"title":"A Brief Introduction to THOTL.","venue":"ATVA","pages":"501-510","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/MerayoNR07","doi":"10.1007/978-3-540-75596-8_35","ee":"https://doi.org/10.1007/978-3-540-75596-8_35","url":"https://dblp.org/rec/conf/atva/MerayoNR07"}, "url":"URL#5520488" }, { "@score":"1", "@id":"5520489", "info":{"authors":{"author":[{"@pid":"26/5333","text":"Sumit Nain"},{"@pid":"v/MosheYVardi","text":"Moshe Y. Vardi"}]},"title":"Branching vs. Linear Time: Semantical Perspective.","venue":"ATVA","pages":"19-34","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/NainV07","doi":"10.1007/978-3-540-75596-8_4","ee":"https://doi.org/10.1007/978-3-540-75596-8_4","url":"https://dblp.org/rec/conf/atva/NainV07"}, "url":"URL#5520489" }, { "@score":"1", "@id":"5520490", "info":{"authors":{"author":[{"@pid":"02/2005","text":"Rotem Oshman"},{"@pid":"g/OrnaGrumberg","text":"Orna Grumberg"}]},"title":"A New Approach to Bounded Model Checking for Branching Time Logics.","venue":"ATVA","pages":"410-424","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/OshmanG07","doi":"10.1007/978-3-540-75596-8_29","ee":"https://doi.org/10.1007/978-3-540-75596-8_29","url":"https://dblp.org/rec/conf/atva/OshmanG07"}, "url":"URL#5520490" }, { "@score":"1", "@id":"5520491", "info":{"authors":{"author":[{"@pid":"52/776","text":"Gordon J. Pace"},{"@pid":"23/3456","text":"Cristian Prisacariu"},{"@pid":"01/1333","text":"Gerardo Schneider"}]},"title":"Model Checking Contracts - A Case Study.","venue":"ATVA","pages":"82-97","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/PacePS07","doi":"10.1007/978-3-540-75596-8_8","ee":"https://doi.org/10.1007/978-3-540-75596-8_8","url":"https://dblp.org/rec/conf/atva/PacePS07"}, "url":"URL#5520491" }, { "@score":"1", "@id":"5520492", "info":{"authors":{"author":{"@pid":"84/4091","text":"Sophie Pinchinat"}},"title":"A Generic Constructive Solution for Concurrent Games with Expressive Constraints on Strategies.","venue":"ATVA","pages":"253-267","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/Pinchinat07","doi":"10.1007/978-3-540-75596-8_19","ee":"https://doi.org/10.1007/978-3-540-75596-8_19","url":"https://dblp.org/rec/conf/atva/Pinchinat07"}, "url":"URL#5520492" }, { "@score":"1", "@id":"5520493", "info":{"authors":{"author":[{"@pid":"31/4458","text":"Zvonimir Rakamaric"},{"@pid":"28/4846","text":"Roberto Bruttomesso"},{"@pid":"01/2712","text":"Alan J. Hu"},{"@pid":"13/5961","text":"Alessandro Cimatti"}]},"title":"Verifying Heap-Manipulating Programs in an SMT Framework.","venue":"ATVA","pages":"237-252","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/RakamaricBHC07","doi":"10.1007/978-3-540-75596-8_18","ee":"https://doi.org/10.1007/978-3-540-75596-8_18","url":"https://dblp.org/rec/conf/atva/RakamaricBHC07"}, "url":"URL#5520493" }, { "@score":"1", "@id":"5520494", "info":{"authors":{"author":[{"@pid":"23/4018","text":"Laura Recalde"},{"@pid":"h/SergeHaddad","text":"Serge Haddad"},{"@pid":"181/1846","text":"Manuel Silva Suárez"}]},"title":"Continuous Petri Nets: Expressive Power and Decidability Issues.","venue":"ATVA","pages":"362-377","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/atva/RecaldeHS07","doi":"10.1007/978-3-540-75596-8_26","ee":"https://doi.org/10.1007/978-3-540-75596-8_26","url":"https://dblp.org/rec/conf/atva/RecaldeHS07"}, "url":"URL#5520494" } ] } } } )