{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:27:51Z","timestamp":1725550071949},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540292098"},{"type":"electronic","value":"9783540319696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11562948_7","type":"book-chapter","created":{"date-parts":[[2005,10,10]],"date-time":"2005-10-10T14:06:40Z","timestamp":1128953200000},"page":"54-68","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting Hub States in Automatic Verification"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Della Penna","sequence":"first","affiliation":[]},{"given":"Igor","family":"Melatti","sequence":"additional","affiliation":[]},{"given":"Benedetto","family":"Intrigila","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Tronci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Hu, A.J., York, G., Dill, D.L.: New Techniques for Efficient Verification with Implicitly Conjoined BDDs. In: 31st ACM\/IEEE Design Automation Conference (DAC), San Diego, CA, USA (1994)","DOI":"10.1145\/196244.196377"},{"key":"7_CR2","unstructured":"Barabasi, A.-L.: Linked. Perseus Publishing (2002)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-540-45069-6_40","volume-title":"Computer Aided Verification","author":"G. Behrmann","year":"2003","unstructured":"Behrmann, G., Larsen, K.G., Pel\u00e1nek, R.: To store or not to store. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol.\u00a02725, pp. 433\u2013445. Springer, Heidelberg (2003)"},{"issue":"8","key":"7_CR4","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"C-35","author":"R. Bryant","year":"1986","unstructured":"Bryant, R.: Graph-based algorithms for boolean function manipulation. IEEE Trans. on Computers\u00a0C-35(8), 677\u2013691 (1986)","journal-title":"IEEE Trans. on Computers"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/0890-5401(92)90017-A","volume":"98","author":"J.R. Burch","year":"1992","unstructured":"Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic model checking: 1020 states and beyond. Inf. Comput.\u00a098(2), 142\u2013170 (1992)","journal-title":"Inf. Comput."},{"key":"7_CR6","unstructured":"Caching murphi web page (2004), http:\/\/www.dsi.uniroma1.it\/~tronci\/cached.murphi.html"},{"key":"7_CR7","volume-title":"Computer Hardware Description Languages and their Applications","author":"C.N. Ip","year":"1993","unstructured":"Ip, C.N., Dill, D.L.: Better verification through symmetry. In: Computer Hardware Description Languages and their Applications. Elsevier Science Publishers B.V., Amsterdam (1993)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-36580-X_13","volume-title":"Hybrid Systems: Computation and Control","author":"G. Penna Della","year":"2003","unstructured":"Della Penna, G., Intrigila, B., Melatti, I., Minichino, M., Ciancamerla, E., Parisse, A., Tronci, E., Venturini Zilli, M.: Automatic verification of a turbogas control system with the mur\u03d5 verifier. In: Maler, O., Pnueli, A. (eds.) HSCC 2003. LNCS, vol.\u00a02623, pp. 141\u2013155. Springer, Heidelberg (2003)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Della Penna, G., Intrigila, B., Melatti, I., Tronci, E., Venturini Zilli, M.: Exploiting transition locality in automatic verification of finite state concurrent systems. STTT\u00a06(4) (2004)","DOI":"10.1007\/s10009-004-0149-6"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36126-X_13","volume-title":"Formal Methods in Computer-Aided Design","author":"G. Penna Della","year":"2002","unstructured":"Della Penna, G., Intrigila, B., Tronci, E., Venturini Zilli, M.: Exploiting transition locality in the disk based mur\u03d5 verifier. In: Aagaard, M.D., O\u2019Leary, J.W. (eds.) FMCAD 2002. LNCS, vol.\u00a02517. Springer, Heidelberg (2002)"},{"key":"7_CR11","volume-title":"Proc. of the 1991 IEEE Int. Conf. on Computer Design on VLSI in Computer & Processors","author":"D.L. Dill","year":"1992","unstructured":"Dill, D.L., Drexler, A.J., Hu, A.J., Han Yang, C.: Protocol verification as a hardware design aid. In: Proc. of the 1991 IEEE Int. Conf. on Computer Design on VLSI in Computer & Processors. IEEE Computer Society Press, Los Alamitos (1992)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-540-30494-4_26","volume-title":"Formal Methods in Computer-Aided Design","author":"P.C. Dillinger","year":"2004","unstructured":"Dillinger, P.C., Manolios, P.: Bloom filters in probabilistic verification. In: Hu, A.J., Martin, A.K. (eds.) FMCAD 2004. LNCS, vol.\u00a03312, pp. 367\u2013381. Springer, Heidelberg (2004)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-46017-9_18","volume-title":"Model Checking Software","author":"C. Eisner","year":"2002","unstructured":"Eisner, C., Peled, D.: Comparing symbolic and explicit model checking of a software system. In: Bo\u0161na\u010dki, D., Leue, S. (eds.) SPIN 2002. LNCS, vol.\u00a02318, p. 230. Springer, Heidelberg (2002)"},{"key":"7_CR14","volume-title":"SIGCOMM 1999: Proc. of the Conf. on Applications, technologies, architectures, and protocols for computer communication","author":"M. Faloutsos","year":"1999","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: SIGCOMM 1999: Proc. of the Conf. on Applications, technologies, architectures, and protocols for computer communication. ACM Press, New York (1999)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-540-24732-6_3","volume-title":"Model Checking Software","author":"J. Geldenhuys","year":"2004","unstructured":"Geldenhuys, J.: State caching reconsidered. In: Graf, S., Mounier, L. (eds.) SPIN 2004. LNCS, vol.\u00a02989, pp. 23\u201338. Springer, Heidelberg (2004)"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1023\/A:1008696026254","volume":"13","author":"G.J. Holzmann","year":"1998","unstructured":"Holzmann, G.J.: An analysis of bitstate hashing. Form. Methods Syst. Des.\u00a013(3), 289\u2013307 (1998)","journal-title":"Form. Methods Syst. Des."},{"key":"7_CR17","volume-title":"The SPIN Model Checker: Primer and Reference Manual","author":"G.J. Holzmann","year":"2004","unstructured":"Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison Wesley Professional, Reading (2004)"},{"key":"7_CR18","volume-title":"Proc. of the IEEE Int. Conf. on Computer Design: VLSI in Computers and Processors","author":"C.N. Ip","year":"1993","unstructured":"Ip, C.N., Dill, D.L.: Efficient verification of symmetric concurrent systems. In: Proc. of the IEEE Int. Conf. on Computer Design: VLSI in Computers and Processors, October 1993. IEEE Computer Society Press, Cambridge (1993)"},{"key":"7_CR19","unstructured":"Murphi web page (2004), http:\/\/sprout.stanford.edu\/dill\/murphi.html"},{"key":"7_CR20","volume-title":"Computer architecture: a quantitative approach","author":"D.A. Patterson","year":"1996","unstructured":"Patterson, D.A., Hennessy, J.L.: Computer architecture: a quantitative approach. Morgan Kaufmann Publishers Inc., San Francisco (1996)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-24732-6_2","volume-title":"Model Checking Software","author":"R. Pel\u00e1nek","year":"2004","unstructured":"Pel\u00e1nek, R.: Typical structural properties of state spaces. In: Graf, S., Mounier, L. (eds.) SPIN 2004. LNCS, vol.\u00a02989, pp. 5\u201322. Springer, Heidelberg (2004)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Aided Verification","author":"D. Peled","year":"1998","unstructured":"Peled, D.: Ten years of partial order reduction. In: Y. Vardi, M. (ed.) CAV 1998. LNCS, vol.\u00a01427. Springer, Heidelberg (1998)"},{"key":"7_CR23","unstructured":"Spin web page (2004), http:\/\/spinroot.com"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Aided Verification","author":"U. Stern","year":"1997","unstructured":"Stern, U., Dill, D.: Parallelizing the mur\u03d5 verifier. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol.\u00a01254. Springer, Heidelberg (1997)"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028743","volume-title":"Computer Aided Verification","author":"U. Stern","year":"1998","unstructured":"Stern, U., Dill, D.: Using magnetic disk instead of main memory in the mur\u03d5 verifier. In: Y. Vardi, M. (ed.) CAV 1998. LNCS, vol.\u00a01427. Springer, Heidelberg (1998)"},{"key":"7_CR26","series-title":"IFIP Conference Proceedings","volume-title":"IFIP TC6\/WG6.1 Joint Int. Conf. on: Formal Description Techniques for Distributed Systems and Communication Protocols, and Protocol Specification, Testing, and Verification","author":"U. Stern","year":"1996","unstructured":"Stern, U., Dill, D.L.: A new scheme for memory-efficient probabilistic verification. In: IFIP TC6\/WG6.1 Joint Int. Conf. on: Formal Description Techniques for Distributed Systems and Communication Protocols, and Protocol Specification, Testing, and Verification. IFIP Conference Proceedings, vol.\u00a069. Kluwer, Dordrecht (1996)"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-44798-9_22","volume-title":"Correct Hardware Design and Verification Methods","author":"E. Tronci","year":"2001","unstructured":"Tronci, E., Della Penna, G., Intrigila, B., Venturini Zilli, M.: Exploiting transition locality in automatic verification. In: Margaria, T., Melham, T.F. (eds.) CHARME 2001. LNCS, vol.\u00a02144, p. 259. Springer, Heidelberg (2001)"},{"key":"7_CR28","volume-title":"Correct Hardware Design and Verification Methods","author":"U. Stern","year":"1995","unstructured":"Stern, U., Dill, D.L.: Improved Probabilistic Verification by Hash Compaction. In: Correct Hardware Design and Verification Methods, Stanford University, USA, vol.\u00a0987. Springer, Heidelberg (1995)"},{"key":"7_CR29","doi-asserted-by":"crossref","DOI":"10.1515\/9780691188331","volume-title":"Small Worlds: The Dynamics of Networks Between Order and Randomness","author":"D.J. Watts","year":"1999","unstructured":"Watts, D.J.: Small Worlds: The Dynamics of Networks Between Order and Randomness. Princeton Univ. Press, Princeton (1999)"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Aided Verification","author":"P. Wolper","year":"1993","unstructured":"Wolper, P., Leroy, D.: Reliable hashing without collision detection. In: Courcoubetis, C. (ed.) CAV 1993. LNCS, vol.\u00a0697. Springer, Heidelberg (1993)"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11562948_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T07:10:04Z","timestamp":1586502604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11562948_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540292098","9783540319696"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11562948_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}