{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:25:06Z","timestamp":1725845106599},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662491218"},{"type":"electronic","value":"9783662491225"}],"license":[{"start":{"date-parts":[[2015,12,25]],"date-time":"2015-12-25T00:00:00Z","timestamp":1451001600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,12,25]],"date-time":"2015-12-25T00:00:00Z","timestamp":1451001600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49122-5_22","type":"book-chapter","created":{"date-parts":[[2015,12,24]],"date-time":"2015-12-24T05:01:36Z","timestamp":1450933296000},"page":"455-475","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Regular Symmetry Patterns"],"prefix":"10.1007","author":[{"given":"Anthony W.","family":"Lin","sequence":"first","affiliation":[]},{"given":"Truong Khanh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"R\u00fcmmer","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,25]]},"reference":[{"issue":"2","key":"22_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10009-011-0216-8","volume":"14","author":"PA Abdulla","year":"2012","unstructured":"Abdulla, P.A.: Regular model checking. STTT 14(2), 109\u2013118 (2012)","journal-title":"STTT"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-12002-2_14","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"PA Abdulla","year":"2010","unstructured":"Abdulla, P.A., Chen, Y.-F., Hol\u00edk, L., Mayr, R., Vojnar, T.: When simulation meets antichains. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol. 6015, pp. 158\u2013174. Springer, Heidelberg (2010)"},{"issue":"2","key":"22_CR3","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10009-011-0212-z","volume":"14","author":"PA Abdulla","year":"2012","unstructured":"Abdulla, P.A., Jonsson, B., Nilsson, M., d\u2019Orso, J., Saksena, M.: Regular model checking for LTL(MSO). STTT 14(2), 223\u2013241 (2012)","journal-title":"STTT"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-28644-8_3","volume-title":"CONCUR 2004 - Concurrency Theory","author":"PA Abdulla","year":"2004","unstructured":"Abdulla, P.A., Jonsson, B., Nilsson, M., Saksena, M.: A survey of regular model checking. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol. 3170, pp. 35\u201348. Springer, Heidelberg (2004)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1007\/978-3-540-73420-8_76","volume-title":"Automata, Languages and Programming","author":"M Arenas","year":"2007","unstructured":"Arenas, M., Barcel\u00f3, P., Libkin, L.: Regular languages of nested words: fixed points, automata, and synchronization. In: Arge, L., Cachin, C., Jurdzi\u0144ski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 888\u2013900. Springer, Heidelberg (2007)"},{"key":"22_CR6","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.-P.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"issue":"2\u20133","key":"22_CR7","first-page":"56","volume":"7","author":"DL Berre","year":"2010","unstructured":"Berre, D.L., Parrain, A.: The Sat4j library, release 2.2. JSAT 7(2\u20133), 56\u201359 (2010)","journal-title":"JSAT"},{"key":"22_CR8","unstructured":"Blumensath, A.: Automatic structures. Master\u2019s thesis, RWTH Aachen (1999)"},{"issue":"6","key":"22_CR9","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/s00224-004-1133-y","volume":"37","author":"A Blumensath","year":"2004","unstructured":"Blumensath, A., Gr\u00e4del, E.: Finite presentations of infinite structures: Automata and interpretations. Theor. Comput. Syst. 37(6), 641\u2013674 (2004)","journal-title":"Theor. Comput. Syst."},{"key":"22_CR10","unstructured":"Bonchi, F., Pous, D.: Checking NFA equivalence with bisimulations up to congruence. In: The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2013, Rome, Italy - January 23\u201325, 2013, pp. 457\u2013468 (2013)"},{"key":"22_CR11","series-title":"London Mathematical Society Student Texts","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511623677","volume-title":"Permutation Groups","author":"PJ Cameron","year":"1999","unstructured":"Cameron, P.J.: Permutation Groups. London Mathematical Society Student Texts. Cambridge University Press, Cambridge (1999)"},{"issue":"1\/2","key":"22_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF00625969","volume":"9","author":"EM Clarke","year":"1996","unstructured":"Clarke, E.M., Jha, S., Enders, R., Filkorn, T.: Exploiting symmetry in temporal logic model checking. Formal Methods Syst. Des. 9(1\/2), 77\u2013104 (1996)","journal-title":"Formal Methods Syst. Des."},{"key":"22_CR13","unstructured":"Dill, D.L., Drexler, A.J., Hu, A.J., Yang, C.H.: Protocol verification as a hardware design aid. In: Proceedings 1991 IEEE International Conference on Computer Design: VLSI in Computer and Processors, ICCD 1992, Cambridge, MA, USA, October 11\u201314, 1992, pp. 522\u2013525 (1992)"},{"key":"22_CR14","unstructured":"Donaldson, A.F.: Automatic Techniques for Detecting and Exploiting Symmetry in Model Checking. Ph.D. thesis, University of Glasgow (2007)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Donaldson, A.F., Miller, A.: Automatic symmetry detection for model checking using computational group theory. In: FM, pp. 631\u2013631 (2005)","DOI":"10.1007\/11526841_32"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10817-008-9107-4","volume":"41","author":"AF Donaldson","year":"2008","unstructured":"Donaldson, A.F., Miller, A.: Automatic symmetry detection for promela. J. Autom. Reasoning 41, 251\u2013293 (2008)","journal-title":"J. Autom. Reasoning"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Emerson, E.A., Kahlon, V.: Reducing model checking of the many to the few. In: Proceedings of the 17th International Conference on Automated Deduction, Pittsburgh, PA, USA, June 17\u201320, 2000, Automated Deduction - CADE-17, pp. 236\u2013254 (2000)","DOI":"10.1007\/10721959_19"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Emerson, E.A., Namjoshi, K.S.: Reasoning about rings. In: POPL, 85\u201394, (1995)","DOI":"10.1145\/199448.199468"},{"issue":"1\/2","key":"22_CR19","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/BF00625970","volume":"9","author":"EA Emerson","year":"1996","unstructured":"Emerson, E.A., Sistla, A.P.: Symmetry and model checking. Formal Methods Syst. Des. 9(1\/2), 105\u2013131 (1996)","journal-title":"Formal Methods Syst. Des."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Gries, D.: The Science of Programming. Springer-Verlag (1981)","DOI":"10.1007\/978-1-4612-5983-1"},{"issue":"2","key":"22_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/0020-0190(90)90107-9","volume":"35","author":"T Herman","year":"1990","unstructured":"Herman, T.: Probabilistic self-stabilization. Inf. Process. Lett. 35(2), 63\u201367 (1990)","journal-title":"Inf. Process. Lett."},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/BF00625968","volume":"9","author":"CN Ip","year":"1996","unstructured":"Ip, C.N., Dill, D.L.: Better verification through symmetry. Formal Methods Syst. Des. 9, 41\u201375 (1996)","journal-title":"Formal Methods Syst. Des."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Israeli, A., Jalfon, M.: Token management schemes and random walks yield self-stabilizing mutual exclusion. In: PODC, pp. 119\u2013131 (1990)","DOI":"10.1145\/93385.93409"},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00236-009-0111-x","volume":"47","author":"MM Jaghoori","year":"2010","unstructured":"Jaghoori, M.M., Sirjani, M., Mousavi, M.R., Khamespanah, E., Movaghar, A.: Symmetry and partial order reduction techniques in model checking rebeca. Acta Inf. 47, 33\u201366 (2010)","journal-title":"Acta Inf."},{"key":"22_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/11604655_56","volume-title":"Distributed Computing and Internet Technology","author":"MM Jaghoori","year":"2005","unstructured":"Jaghoori, M.M., Sirjani, M., Mousavi, M.R.R., Movaghar, A.: Efficient symmetry reduction for an actor-based model. In: Chakraborty, G. (ed.) ICDCIT 2005. LNCS, vol. 3816, pp. 494\u2013507. Springer, Heidelberg (2005)"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Lehmann, D., Rabin, M.: On the advantage of free choice: A symmetric and fully distributed solution to the dining philosophers problem (extended abstract). In: Proceedings 8th Annual ACM Symposium on Principles of Programming Languages (POPL 1981), pp. 133\u2013138 (1981)","DOI":"10.1145\/567532.567547"},{"key":"22_CR27","unstructured":"Lin, A.W.: Accelerating tree-automatic relations. In: FSTTCS, pp. 313\u2013324 (2012)"},{"key":"22_CR28","first-page":"455","volume-title":"Lecture Notes in Computer Science","author":"Anthony W. Lin","year":"2015","unstructured":"Lin, A.W., Nguyen, T.K., R\u00fcmmer, P., Sun, J.: Regular symmetry patterns (technical report). \n http:\/\/arxiv.org\/abs\/1510.08506\n \n (cited in 2015)"},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/350887.350891","volume":"9","author":"AP Sistla","year":"2000","unstructured":"Sistla, A.P., Gyuris, V., Emerson, E.A.: SMC: a symmetry-based model checker for verification of safety and liveness properties. ACM Trans. Softw. Eng. Method. 9, 133\u2013166 (2000)","journal-title":"ACM Trans. Softw. Eng. Method."},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Spermann, C., Leuschel, M.: ProB gets nauty: effective symmetry reduction for B and Z models. In: TASE, pp. 15\u201322 (2008)","DOI":"10.1109\/TASE.2008.33"},{"key":"22_CR31","unstructured":"Vojnar, T.: Cut-offs and automata in formal verification of infinite-state systems: Habilitation Thesis. Brno University of Technology, Faculty of Information Technology (2007)"},{"key":"22_CR32","doi-asserted-by":"publisher","first-page":"799","DOI":"10.3390\/sym2020799","volume":"2","author":"T Wahl","year":"2010","unstructured":"Wahl, T., Donaldson, A.F.: Replication and abstraction: Symmetry in automated formal verification. Symmetry 2, 799\u2013847 (2010)","journal-title":"Symmetry"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, S.J., Sun, J., Sun, C., Liu, Y., Ma, J., Dong, J.S.: Constraint-based automatic symmetry detection. In: ASE, pp. 15\u201325 (2013)","DOI":"10.1109\/ASE.2013.6693062"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49122-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T05:05:31Z","timestamp":1559365531000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49122-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,25]]},"ISBN":["9783662491218","9783662491225"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49122-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015,12,25]]},"assertion":[{"value":"25 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}