{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:11:34Z","timestamp":1725412294394},"reference-count":25,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icnp.2003.1249774","type":"proceedings-article","created":{"date-parts":[[2004,6,21]],"date-time":"2004-06-21T21:52:40Z","timestamp":1087854760000},"page":"234-244","source":"Crossref","is-referenced-by-count":3,"title":["Systematic verification of safety properties of arbitrary network protocol compositions using CHAIN"],"prefix":"10.1109","author":[{"given":"A.D.","family":"Bradley","sequence":"first","affiliation":[]},{"given":"A.","family":"Bestavros","sequence":"additional","affiliation":[]},{"given":"A.J.","family":"Kfoury","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60045-0_40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/2.84874"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633028"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022253"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(96)01150-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58555-9_113"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/B978-0-08-012975-4.50028-X","article-title":"Simple word problems in universal algebra","author":"knuth","year":"1970","journal-title":"Computational Problems in Abstract Algebra"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00008-0"},{"key":"ref18","first-page":"41","article-title":"Equivalence-checking with infinite-state systems: Techniques and results","author":"ku?era","year":"2002","journal-title":"Proceedings of 29th Seminar on Current Trends in Theory and Practice of Informatics (SOFSEM 2002)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/10720327_5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2002.1189027"},{"journal-title":"Workshop on Caching Coherence and Consistency (WC3)","article-title":"Basis token consistency: Extending and evaluating a novel web consistency algorithm","year":"2002","author":"bradley","key":"ref3"},{"journal-title":"Tech Rep TR-2002–01","article-title":"Safe composition of web communication protocols for extensible edge services","year":"2002","author":"bradley","key":"ref6"},{"journal-title":"Proc of Web Caching and Content Delivery Workshop","article-title":"Safe composition of web communication protocols for extensible edge services","year":"2002","author":"bradley","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503278"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2003.1249774"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624193"},{"journal-title":"Proc 8th SPIN Workshop","article-title":"Model-checking infinite state-space systems with fine-grained abstractions using SPIN","year":"2001","author":"chechik","key":"ref9"},{"article-title":"Term Rewriting and All That.","year":"1998","author":"baader","key":"ref1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139172752"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1134"},{"journal-title":"HTTP-WG Mailing List Archive","article-title":"Is 100-Continue hop-by-hop?","year":"0","author":"mogul","key":"ref22"},{"key":"ref21","first-page":"215","article-title":"Virtual time and global states of distributed systems","author":"mattern","year":"1988","journal-title":"Proc Parallel and Distributed Algorithms Conf"},{"journal-title":"Keynote Address presented at the NSF ANIR Principle Investigators Meeting","article-title":"Where's the science?","year":"2003","author":"shenker","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/90.779192"},{"journal-title":"Presented at the NSF ANIR Principle Investigator Meeting","article-title":"Panel recommendations on “Network Trustworthiness","year":"2003","author":"touch","key":"ref25"}],"event":{"name":". 11th IEEE International Conference on Network Protocols","acronym":"ICNP-03","location":"Atlanta, GA, USA"},"container-title":["11th IEEE International Conference on Network Protocols, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8838\/27972\/01249774.pdf?arnumber=1249774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T13:40:03Z","timestamp":1585834803000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1249774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icnp.2003.1249774","relation":{},"subject":[]}}