{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:46:33Z","timestamp":1730209593250,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/compsac54236.2022.00278","type":"proceedings-article","created":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T19:34:53Z","timestamp":1660160093000},"page":"1750-1755","source":"Crossref","is-referenced-by-count":0,"title":["An Extention of Lazy Abstraction and Refinement for Program Verification"],"prefix":"10.1109","author":[{"given":"Liang","family":"Haowei","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Tianjin University of Technology,Tianjin,China"}]},{"given":"Hou","family":"Chunyan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Tianjin University of Technology,Tianjin,China"}]},{"given":"Wang","family":"Jinsong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Tianjin University of Technology,Tianjin,China"}]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science, Nankai University,Tianjin,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"556","article-title":"Wolverine: Battling bugs with interpolants - (competition contribution)","volume":"7214","author":"weissenbacher","year":"2012","journal-title":"ETAPS"},{"key":"ref11","first-page":"672","article-title":"Ufo: A frame-work for abstraction- and interpolation-based software verification","volume":"7358","author":"albarghouthi","year":"2012","journal-title":"CAV"},{"key":"ref12","first-page":"106","article-title":"Algorithms for software model checking: Predicate abstraction vs. impact","author":"beyer","year":"2012","journal-title":"Formal Methods in Computer Aided Design FMCAD"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-014-0209-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_13"},{"key":"ref15","first-page":"369","article-title":"Slicing abstractions","volume":"89","author":"brtickner","year":"2008","journal-title":"Fund Informaticae"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706353"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_42"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503279"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/876638.876643"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2641638.2641655"},{"key":"ref5","first-page":"504","article-title":"Competition on software verification - (SV-COMP)","volume":"7214","author":"beyer","year":"2012","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems TACAS Tallinn Estonia"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503274"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28717-6_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1911-y"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_11"},{"key":"ref9","first-page":"44","article-title":"Formal verification of systemc designs using the BLAST software model checker","volume":"1250","author":"herber","year":"2014","journal-title":"MoDELS"}],"event":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","start":{"date-parts":[[2022,6,27]]},"location":"Los Alamitos, CA, USA","end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/9842455\/9842394\/09842594.pdf?arnumber=9842594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:56:08Z","timestamp":1661810168000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9842594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":18,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/compsac54236.2022.00278","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}