{"id":"https://openalex.org/W2085071114","doi":"https://doi.org/10.1145/2591062.2591197","title":"Incremental reachability checking of KernelC programs using matching logic","display_name":"Incremental reachability checking of KernelC programs using matching logic","publication_year":2014,"publication_date":"2014-05-20","ids":{"openalex":"https://openalex.org/W2085071114","doi":"https://doi.org/10.1145/2591062.2591197","mag":"2085071114"},"language":"en","primary_location":{"id":"doi:10.1145/2591062.2591197","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2591062.2591197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the 36th International Conference on Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031580796","display_name":"Alessandro Rizzi","orcid":"https://orcid.org/0000-0001-6240-4383"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessandro Maria Rizzi","raw_affiliation_strings":["Politecnico di Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5031580796"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":null,"apc_paid":null,"fwci":0.7312,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73466156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"724","last_page":"726"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.80291748046875},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.7115896344184875},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.6615484356880188},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.6395738124847412},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5898072719573975},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.559048593044281},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5570093393325806},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.5102143287658691},{"id":"https://openalex.org/keywords/verification-and-validation","display_name":"Verification and validation","score":0.4864635169506073},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4514630138874054},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4510180950164795},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4345908761024475},{"id":"https://openalex.org/keywords/verification","display_name":"Verification","score":0.4283807575702667},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.41616299748420715},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.37581631541252136},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.23403120040893555}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80291748046875},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.7115896344184875},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.6615484356880188},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.6395738124847412},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5898072719573975},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.559048593044281},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5570093393325806},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.5102143287658691},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.4864635169506073},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4514630138874054},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4510180950164795},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4345908761024475},{"id":"https://openalex.org/C142284323","wikidata":"https://www.wikidata.org/wiki/Q7921323","display_name":"Verification","level":5,"score":0.4283807575702667},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.41616299748420715},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.37581631541252136},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.23403120040893555},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2591062.2591197","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2591062.2591197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the 36th International Conference on Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:re.public.polimi.it:11311/986640","is_oa":false,"landing_page_url":"http://hdl.handle.net/11311/986640","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W82172290","https://openalex.org/W188963226","https://openalex.org/W1480909796","https://openalex.org/W1521942127","https://openalex.org/W1563307140","https://openalex.org/W1608455964","https://openalex.org/W1646049001","https://openalex.org/W1964071625","https://openalex.org/W1977220114","https://openalex.org/W2000387514","https://openalex.org/W2090551028","https://openalex.org/W2093478393","https://openalex.org/W2095838677","https://openalex.org/W2098039922","https://openalex.org/W2098780033","https://openalex.org/W2103057263","https://openalex.org/W2103778230","https://openalex.org/W2109693366","https://openalex.org/W2146298624","https://openalex.org/W2155791623","https://openalex.org/W2296332834","https://openalex.org/W2483649756","https://openalex.org/W2565555751","https://openalex.org/W4236799059"],"related_works":["https://openalex.org/W2361881307","https://openalex.org/W2363848262","https://openalex.org/W3171879404","https://openalex.org/W1497560829","https://openalex.org/W2291120548","https://openalex.org/W3084925267","https://openalex.org/W2166071215","https://openalex.org/W4320924515","https://openalex.org/W1964416763","https://openalex.org/W2129248173"],"abstract_inverted_index":{"A":[0],"fundamental":[1],"phase":[2],"in":[3,27],"software":[4,10,22,44],"development":[5],"deals":[6],"with":[7],"verifying":[8,64],"that":[9,30],"behaves":[11],"correctly.":[12],"Although":[13],"accurate":[14],"testing":[15],"can":[16,25,76],"discover":[17],"many":[18],"wrong":[19],"behaviours,":[20],"formal":[21,37],"verification":[23,38,48,58],"techniques":[24,39],"help":[26],"developing":[28],"applications":[29],"dependably":[31],"satisfy":[32],"their":[33],"requirements.":[34],"However,":[35],"since":[36,74],"are":[40,71],"time":[41,80],"consuming":[42],"and":[43],"changes":[45],"continuously,":[46],"incremental":[47],"methods,":[49],"i.e.,":[50],"methods":[51],"which":[52],"reuse":[53],"the":[54,57,79,84],"results":[55],"of":[56,59,68],"a":[60,65,69],"previous":[61],"version":[62,67],"when":[63],"new":[66],"program,":[70],"very":[72],"useful,":[73],"they":[75],"significantly":[77],"reduce":[78],"required":[81],"to":[82],"perform":[83],"verification.":[85]},"counts_by_year":[{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
