{"id":"https://openalex.org/W1996522627","doi":"https://doi.org/10.1017/s0269888912000252","title":"TCAS software verification using constraint programming","display_name":"TCAS software verification using constraint programming","publication_year":2012,"publication_date":"2012-07-26","ids":{"openalex":"https://openalex.org/W1996522627","doi":"https://doi.org/10.1017/s0269888912000252","mag":"1996522627"},"language":"en","primary_location":{"id":"doi:10.1017/s0269888912000252","is_oa":false,"landing_page_url":"https://doi.org/10.1017/s0269888912000252","pdf_url":null,"source":{"id":"https://openalex.org/S137506714","display_name":"The Knowledge Engineering Review","issn_l":"0269-8889","issn":["0269-8889","1469-8005"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Knowledge Engineering Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013313145","display_name":"Arnaud Gotlieb","orcid":"https://orcid.org/0000-0002-8980-7585"},"institutions":[{"id":"https://openalex.org/I4210133778","display_name":"Inria Rennes - Bretagne Atlantique Research Centre","ror":"https://ror.org/04040yw90","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210133778"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I2799829267","display_name":"Simula Research Laboratory","ror":"https://ror.org/00vn06n10","country_code":"NO","type":"facility","lineage":["https://openalex.org/I2799829267"]}],"countries":["FR","NO"],"is_corresponding":true,"raw_author_name":"Arnaud Gotlieb","raw_affiliation_strings":["Certus Software V&V Centre, Simula Research Laboratory, Lysaker, Norway; e-mail:","INRIA \u2013 Rennes \u2013 Bretagne Atlantique, 35042 Rennes Cedex, France; e-mail:","INRIA \u2013 Rennes \u2013 Bretagne Atlantique, 35042 Rennes Cedex, France","Certus Software V&V Centre, Simula Research Laboratory, Lysaker, Norway","e-mail:"],"affiliations":[{"raw_affiliation_string":"Certus Software V&V Centre, Simula Research Laboratory, Lysaker, Norway; e-mail:","institution_ids":["https://openalex.org/I2799829267"]},{"raw_affiliation_string":"INRIA \u2013 Rennes \u2013 Bretagne Atlantique, 35042 Rennes Cedex, France; e-mail:","institution_ids":["https://openalex.org/I4210133778"]},{"raw_affiliation_string":"INRIA \u2013 Rennes \u2013 Bretagne Atlantique, 35042 Rennes Cedex, France","institution_ids":["https://openalex.org/I4210133778","https://openalex.org/I1326498283"]},{"raw_affiliation_string":"Certus Software V&V Centre, Simula Research Laboratory, Lysaker, Norway","institution_ids":["https://openalex.org/I2799829267"]},{"raw_affiliation_string":"e-mail:","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013313145"],"corresponding_institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I2799829267","https://openalex.org/I4210133778"],"apc_list":null,"apc_paid":null,"fwci":7.0795,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.97443553,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"27","issue":"3","first_page":"343","last_page":"360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.709315299987793},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.6713095903396606},{"id":"https://openalex.org/keywords/constraint-programming","display_name":"Constraint programming","score":0.5910641551017761},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.58961021900177},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.5539876818656921},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5494510531425476},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5130707025527954},{"id":"https://openalex.org/keywords/constraint-logic-programming","display_name":"Constraint logic programming","score":0.5083369612693787},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4925476014614105},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44723302125930786},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.41657134890556335},{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.41520750522613525},{"id":"https://openalex.org/keywords/life-critical-system","display_name":"Life-critical system","score":0.412163645029068},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3748387396335602},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3535112738609314},{"id":"https://openalex.org/keywords/constraint-satisfaction","display_name":"Constraint satisfaction","score":0.3483548164367676},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.31507641077041626},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.2159392237663269},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.18270152807235718},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13967576622962952},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11845070123672485}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.709315299987793},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.6713095903396606},{"id":"https://openalex.org/C173404611","wikidata":"https://www.wikidata.org/wiki/Q528588","display_name":"Constraint programming","level":3,"score":0.5910641551017761},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.58961021900177},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.5539876818656921},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5494510531425476},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5130707025527954},{"id":"https://openalex.org/C176783269","wikidata":"https://www.wikidata.org/wiki/Q5164378","display_name":"Constraint logic programming","level":4,"score":0.5083369612693787},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4925476014614105},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44723302125930786},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.41657134890556335},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.41520750522613525},{"id":"https://openalex.org/C163707989","wikidata":"https://www.wikidata.org/wiki/Q1996307","display_name":"Life-critical system","level":3,"score":0.412163645029068},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3748387396335602},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3535112738609314},{"id":"https://openalex.org/C44616089","wikidata":"https://www.wikidata.org/wiki/Q30158686","display_name":"Constraint satisfaction","level":3,"score":0.3483548164367676},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.31507641077041626},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.2159392237663269},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.18270152807235718},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13967576622962952},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11845070123672485},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C137631369","wikidata":"https://www.wikidata.org/wiki/Q7617831","display_name":"Stochastic programming","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1017/s0269888912000252","is_oa":false,"landing_page_url":"https://doi.org/10.1017/s0269888912000252","pdf_url":null,"source":{"id":"https://openalex.org/S137506714","display_name":"The Knowledge Engineering Review","issn_l":"0269-8889","issn":["0269-8889","1469-8005"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Knowledge Engineering Review","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W6337991","https://openalex.org/W47957325","https://openalex.org/W1533493347","https://openalex.org/W1544693717","https://openalex.org/W1553032077","https://openalex.org/W1573299783","https://openalex.org/W1596552075","https://openalex.org/W1808949452","https://openalex.org/W1968898611","https://openalex.org/W1971137495","https://openalex.org/W1972997295","https://openalex.org/W1974023789","https://openalex.org/W1979812412","https://openalex.org/W1981597579","https://openalex.org/W1988622494","https://openalex.org/W1997960810","https://openalex.org/W2009489720","https://openalex.org/W2012056483","https://openalex.org/W2012741612","https://openalex.org/W2017741580","https://openalex.org/W2051735096","https://openalex.org/W2096449544","https://openalex.org/W2100221082","https://openalex.org/W2104021743","https://openalex.org/W2104857676","https://openalex.org/W2120552859","https://openalex.org/W2128080346","https://openalex.org/W2133237582","https://openalex.org/W2133520239","https://openalex.org/W2137526495","https://openalex.org/W2144737265","https://openalex.org/W2145400374","https://openalex.org/W2161977990","https://openalex.org/W2604202109","https://openalex.org/W2951830171","https://openalex.org/W4237492309","https://openalex.org/W4250619922","https://openalex.org/W6681135891"],"related_works":["https://openalex.org/W1486916474","https://openalex.org/W2097415053","https://openalex.org/W1531664660","https://openalex.org/W1496100162","https://openalex.org/W1980681296","https://openalex.org/W1514298554","https://openalex.org/W1597500234","https://openalex.org/W4303044088","https://openalex.org/W1570648367","https://openalex.org/W1567852657"],"abstract_inverted_index":{"Abstract":[0],"Safety-critical":[1],"software":[2,64],"must":[3,24],"be":[4,25],"thoroughly":[5],"verified":[6,26],"before":[7],"being":[8],"exploited":[9],"in":[10],"commercial":[11],"applications.":[12],"In":[13,52],"particular,":[14],"any":[15],"TCAS":[16,107],"(Traffic":[17],"Alert":[18],"and":[19,50,66,95,122],"Collision":[20],"Avoidance":[21],"System)":[22],"implementation":[23,109],"against":[27,110],"safety":[28,96],"properties":[29,115],"extracted":[30,91],"from":[31,92],"the":[32,37,57],"anti-collision":[33],"theory":[34],"that":[35,75,117],"regulates":[36],"controlled":[38],"airspace.":[39],"This":[40],"verification":[41,65],"step":[42],"is":[43,120],"currently":[44],"realized":[45],"with":[46,79],"manual":[47],"code":[48],"reviews":[49],"testing.":[51,67],"our":[53],"work,":[54],"we":[55,100],"explore":[56],"capabilities":[58],"of":[59,113],"Constraint":[60],"Programming":[61,81],"for":[62],"automated":[63],"We":[68],"built":[69],"a":[70,104,111],"dedicated":[71],"constraint":[72,77,86],"solving":[73],"procedure":[74],"combines":[76],"propagation":[78],"Linear":[80],"to":[82],"solve":[83],"conditional":[84],"disjunctive":[85],"systems":[87],"over":[88],"bounded":[89],"integers":[90],"computer":[93],"programs":[94],"properties.":[97],"An":[98],"experience":[99],"made":[101],"on":[102],"verifying":[103],"publicly":[105],"available":[106],"component":[108],"set":[112],"safety-critical":[114],"showed":[116],"this":[118],"approach":[119],"viable":[121],"efficient.":[123]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
