{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:22:49Z","timestamp":1725790969569},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,7,12]]},"DOI":"10.1145\/1831708.1831712","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T09:31:10Z","timestamp":1278927070000},"page":"25-36","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Analysis of invariants for efficient bounded verification"],"prefix":"10.1145","author":[{"given":"Juan Pablo","family":"Galeotti","sequence":"first","affiliation":[{"name":"Universidad de Buenos Aires, Buenos Aires, Argentina"}]},{"given":"Nicol\u00e1s","family":"Rosner","sequence":"additional","affiliation":[{"name":"Universidad de Buenos Aires, Buenos Aires, Argentina"}]},{"given":"Carlos Gustavo","family":"L\u00f3pez Pombo","sequence":"additional","affiliation":[{"name":"Universidad de Buenos Aires, Buenos Aires, Argentina"}]},{"given":"Marcelo Fabian","family":"Frias","sequence":"additional","affiliation":[{"name":"Buenos Aires Institute of Technology, Buenos Aires, Argentina"}]}],"member":"320","published-online":{"date-parts":[[2010,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Andoni A. Daniliuc D. Khurshid S. and Marinov D. Evaluating the \"Small Scope Hypothesis\" downloadable from http:\/\/sdg.csail.mit.edu\/publications.html. Andoni A. Daniliuc D. Khurshid S. and Marinov D. Evaluating the \"Small Scope Hypothesis\" downloadable from http:\/\/sdg.csail.mit.edu\/publications.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595762"},{"key":"e_1_3_2_1_3_1","first-page":"74","volume-title":"Using First-Order Theorem Provers in the Jahob Data Structure Verification System. VMCAI","author":"Bouillaguet Ch","year":"2007","unstructured":"Bouillaguet Ch ., Kuncak V. , Wies T. , Zee K. , Rinard M. C. , Using First-Order Theorem Provers in the Jahob Data Structure Verification System. VMCAI 2007 , pp. 74 -- 88 . Bouillaguet Ch., Kuncak V., Wies T., Zee K., Rinard M. C., Using First-Order Theorem Provers in the Jahob Data Structure Verification System. VMCAI 2007, pp. 74--88."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566191"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_16"},{"key":"e_1_3_2_1_6_1","first-page":"168","volume-title":"TACAS","author":"Clarke E.","year":"2004","unstructured":"Clarke E. , Kroening D. , Lerda F., A Tool for Checking ANSI-C Programs , in TACAS 2004 , LNCS 2988, pp. 168 -- 176 . Clarke E., Kroening D., Lerda F., A Tool for Checking ANSI-C Programs, in TACAS 2004, LNCS 2988, pp. 168--176."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2007.43"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146251"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87873-5_13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287653"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512558"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062535"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314493.1314497"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39388-9_24"},{"volume-title":"Symmetry Reduction Criteria for Software Model Checking. SPIN 2002: 22--41","author":"Iosif R.","key":"e_1_3_2_1_16_1","unstructured":"Iosif R. , Symmetry Reduction Criteria for Software Model Checking. SPIN 2002: 22--41 Iosif R., Symmetry Reduction Criteria for Software Model Checking. SPIN 2002: 22--41"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_31"},{"key":"e_1_3_2_1_18_1","unstructured":"Jackson D. Software Abstractions. MIT Press 2006. Jackson D. Software Abstractions. MIT Press 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/347324.383378"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582441"},{"key":"e_1_3_2_1_21_1","first-page":"272","volume-title":"SAT","author":"Khurshid S.","year":"2003","unstructured":"Khurshid , S. , Marinov , D. , Shlyakhter , I. , Jackson , D., A Case for Efficient Solution Enumeration , in SAT 2003 , LNCS 2919, pp. 272 -- 286 . Khurshid, S., Marinov, D., Shlyakhter, I., Jackson, D., A Case for Efficient Solution Enumeration, in SAT 2003, LNCS 2919, pp. 272--286."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v15:2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349325"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/514188.514190"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10373-5_5"},{"key":"e_1_3_2_1_27_1","first-page":"632","volume-title":"Kodkod: A Relational Model Finder. in TACAS '07","author":"Torlak E.","unstructured":"Torlak E. , Jackson , D. , Kodkod: A Relational Model Finder. in TACAS '07 , LNCS 4425, pp. 632 -- 647 . Torlak E., Jackson, D., Kodkod: A Relational Model Finder. in TACAS '07, LNCS 4425, pp. 632--647."},{"key":"e_1_3_2_1_28_1","first-page":"505","volume-title":"TACAS","author":"Vaziri M.","year":"2003","unstructured":"Vaziri , M. , Jackson , D. , Checking Properties of Heap-Manipulating Procedures with a Constraint Solver , in TACAS 2003 , pp. 505 -- 520 . Vaziri, M., Jackson, D., Checking Properties of Heap-Manipulating Procedures with a Constraint Solver, in TACAS 2003, pp. 505--520."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022920129859"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146243"},{"key":"e_1_3_2_1_31_1","volume-title":"February 2nd.","author":"Visser W.","year":"2010","unstructured":"Visser W. , Private communication , February 2nd. , 2010 . Visser W., Private communication, February 2nd., 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232420.1232423"}],"event":{"name":"ISSTA '10: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Trento Italy","acronym":"ISSTA '10"},"container-title":["Proceedings of the 19th international symposium on Software testing and analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1831708.1831712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T23:10:00Z","timestamp":1673219400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1831708.1831712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,12]]},"references-count":32,"alternative-id":["10.1145\/1831708.1831712","10.1145\/1831708"],"URL":"https:\/\/doi.org\/10.1145\/1831708.1831712","relation":{},"subject":[],"published":{"date-parts":[[2010,7,12]]},"assertion":[{"value":"2010-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}