{"id":"https://openalex.org/W4407363546","doi":"https://doi.org/10.1007/978-3-031-78750-8_8","title":"CPA-Daemon: Mitigating Tool Restarts for Java-Based Verifiers","display_name":"CPA-Daemon: Mitigating Tool Restarts for Java-Based Verifiers","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407363546","doi":"https://doi.org/10.1007/978-3-031-78750-8_8"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-78750-8_8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-78750-8_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1007/978-3-031-78750-8_8","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071340047","display_name":"Dirk Beyer","orcid":"https://orcid.org/0000-0003-4832-7662"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dirk Beyer","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0003-4832-7662","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076841146","display_name":"Thomas R. Lemberger","orcid":"https://orcid.org/0000-0003-0291-815X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Lemberger","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0003-0291-815X","affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5092451055","display_name":"Henrik Wachowitz","orcid":"https://orcid.org/0000-0002-4768-4054"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Henrik Wachowitz","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-4768-4054","affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071340047"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":5.0806,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90315077,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"158","last_page":"173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/daemon","display_name":"Daemon","score":0.9793453216552734},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.8496522903442383},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8206727504730225},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5387919545173645}],"concepts":[{"id":"https://openalex.org/C2777253204","wikidata":"https://www.wikidata.org/wiki/Q308980","display_name":"Daemon","level":2,"score":0.9793453216552734},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.8496522903442383},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8206727504730225},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5387919545173645}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-78750-8_8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-78750-8_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-78750-8_8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-78750-8_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W167956735","https://openalex.org/W777621473","https://openalex.org/W1976665040","https://openalex.org/W2045109907","https://openalex.org/W2064740254","https://openalex.org/W2127574686","https://openalex.org/W2149907859","https://openalex.org/W2161253570","https://openalex.org/W2278602989","https://openalex.org/W2467636347","https://openalex.org/W2601291317","https://openalex.org/W2763995315","https://openalex.org/W2765527199","https://openalex.org/W2784060175","https://openalex.org/W2794720712","https://openalex.org/W2797206907","https://openalex.org/W2888641315","https://openalex.org/W2937521294","https://openalex.org/W2966097619","https://openalex.org/W2977998442","https://openalex.org/W2998743141","https://openalex.org/W2999366812","https://openalex.org/W3006146940","https://openalex.org/W3017047012","https://openalex.org/W3084925267","https://openalex.org/W3095071793","https://openalex.org/W3139065122","https://openalex.org/W3139258282","https://openalex.org/W4225474367","https://openalex.org/W4225637722","https://openalex.org/W4226246074","https://openalex.org/W4226321534","https://openalex.org/W4239515158","https://openalex.org/W4284699178","https://openalex.org/W4308643053","https://openalex.org/W4366447030","https://openalex.org/W4366448931","https://openalex.org/W4366449580","https://openalex.org/W4366452143","https://openalex.org/W4368363501","https://openalex.org/W4384009635","https://openalex.org/W4393838009","https://openalex.org/W4393942723","https://openalex.org/W4400582703","https://openalex.org/W4404448308","https://openalex.org/W6892521864","https://openalex.org/W6911922086"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2375183653","https://openalex.org/W2043486348","https://openalex.org/W2090419612","https://openalex.org/W4238810650","https://openalex.org/W4230130155","https://openalex.org/W4239600814","https://openalex.org/W1993245031"],"abstract_inverted_index":{"Abstract":[0],"We":[1],"present":[2],"CPA-Daemon":[3,14,104,161],",":[4,22,138],"a":[5,25,44,51,62,150],"microservice":[6],"for":[7,152],"continuous":[8],"software":[9],"verification":[10,80,83,97,111,127,154],"of":[11,38,79,90,124,143],"C":[12],"code.":[13],"provides":[15],"full":[16],"access":[17],"to":[18,114,130],"the":[19,76,87,106,121,139],"verifier":[20],"CPAchecker":[21,42,49,60,91,137],"but":[23],"adds":[24],"clear":[26],"network":[27],"interface":[28],"based":[29],"on":[30,109,136],"gRPC":[31],"that":[32,73,103,117,156],"abstracts":[33],"from":[34],"three":[35],"different":[36,82],"modes":[37,72],"execution:":[39],"(1)":[40],"running":[41,48,59],"in":[43,61,81,95],"separate":[45],"JVM,":[46],"(2)":[47],"as":[50,92,149],"native":[52],"executable":[53],"compiled":[54],"with":[55],"GraalVM,":[56],"and":[57,85,116,146,165],"(3)":[58],"shared,":[63],"continuously-running":[64],"JVM.":[65],"The":[66],"last":[67],"two":[68],"are":[69,142],"novel":[70],"execution":[71],"greatly":[74],"improve":[75],"response":[77,107,122],"time":[78,108,123],"scenarios":[84],"enable":[86],"seamless":[88],"integration":[89],"an":[93],"engine":[94],"other":[96,153],"tooling.":[98],"Our":[99],"comparative":[100],"evaluation":[101],"shows":[102],"reduces":[105],"small":[110],"tasks":[112],"down":[113,129],"17%,":[115],"it":[118],"can":[119,147],"reduce":[120],"existing":[125],"cooperative":[126],"techniques":[128],"70%.":[131],"While":[132],"our":[133],"implementation":[134],"focuses":[135],"conceptual":[140],"ideas":[141],"general":[144],"nature":[145],"serve":[148],"solution":[151],"tools":[155],"face":[157],"similar":[158],"JVM-specific":[159],"issues.":[160],"is":[162],"open":[163],"source":[164],"available":[166],"at":[167],"https://gitlab.com/sosy-lab/software/cpa-daemon":[168],".":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
