{"id":"https://openalex.org/W3197105558","doi":"https://doi.org/10.18293/seke2021-139","title":"A Novel Approach of CTL Model Checking Based on Probe Machine","display_name":"A Novel Approach of CTL Model Checking Based on Probe Machine","publication_year":2021,"publication_date":"2021-07-03","ids":{"openalex":"https://openalex.org/W3197105558","doi":"https://doi.org/10.18293/seke2021-139","mag":"3197105558"},"language":"en","primary_location":{"id":"doi:10.18293/seke2021-139","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2021-139","pdf_url":"https://doi.org/10.18293/seke2021-139","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2021-139","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100391567","display_name":"Dong Wang","orcid":"https://orcid.org/0009-0008-1874-6608"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dong Wang","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100391567"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.3164,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62853403,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"2021","issue":null,"first_page":"183","last_page":"188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11450","display_name":"Model-Driven Software Engineering Techniques","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ctl*","display_name":"CTL*","score":0.7045261263847351},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6891368627548218},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.6637134552001953},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3373678922653198},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2684040069580078}],"concepts":[{"id":"https://openalex.org/C147969180","wikidata":"https://www.wikidata.org/wiki/Q5014579","display_name":"CTL*","level":4,"score":0.7045261263847351},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6891368627548218},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.6637134552001953},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3373678922653198},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2684040069580078},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C154317977","wikidata":"https://www.wikidata.org/wiki/Q376266","display_name":"Cytotoxic T cell","level":3,"score":0.0},{"id":"https://openalex.org/C202751555","wikidata":"https://www.wikidata.org/wiki/Q221681","display_name":"In vitro","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2021-139","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2021-139","pdf_url":"https://doi.org/10.18293/seke2021-139","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2021-139","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2021-139","pdf_url":"https://doi.org/10.18293/seke2021-139","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4844286744","display_name":null,"funder_award_id":"61972150","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5661849975","display_name":null,"funder_award_id":"ZF1213","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3197105558.pdf","grobid_xml":"https://content.openalex.org/works/W3197105558.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1498432697","https://openalex.org/W1540501475","https://openalex.org/W2061438988","https://openalex.org/W2100112273","https://openalex.org/W2117189826","https://openalex.org/W2162617112","https://openalex.org/W2169870841","https://openalex.org/W2895755985","https://openalex.org/W2913459036","https://openalex.org/W2966868185","https://openalex.org/W2998259759","https://openalex.org/W3119058056","https://openalex.org/W3144889436","https://openalex.org/W4239629804","https://openalex.org/W4249906489","https://openalex.org/W6665773200","https://openalex.org/W6683813450","https://openalex.org/W6717417979","https://openalex.org/W6755541201","https://openalex.org/W6788266475"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W1549922507","https://openalex.org/W1605884721","https://openalex.org/W2102262438","https://openalex.org/W2027917976","https://openalex.org/W2032919665","https://openalex.org/W1864390991","https://openalex.org/W2414401084","https://openalex.org/W146107827","https://openalex.org/W2381825341"],"abstract_inverted_index":{"Model":[0],"checking":[1,88,105],"has":[2],"established":[3],"as":[4],"an":[5],"effective":[6],"method":[7],"for":[8,32,42,127],"automatic":[9],"system":[10],"analysis":[11],"and":[12,22,36,144],"verification.":[13],"It":[14,120],"is":[15,38,62,152],"making":[16],"its":[17],"way":[18],"into":[19],"many":[20,33],"domains":[21],"methodologies.":[23],"However,":[24],"the":[25,71,77,85,108,124,145],"state":[26,131],"space":[27],"may":[28],"be":[29],"extremely":[30],"large":[31,130],"practical":[34],"systems,":[35],"this":[37,91],"a":[39,52,63,95,135],"major":[40],"limitation":[41],"state-space":[43],"search":[44,79],"algorithms":[45],"in":[46,59],"model":[47,55,87,104,110,136],"checking.":[48],"We":[49,133],"have":[50],"proposed":[51],"novel":[53,96],"computing":[54,66],"called":[56,138],"probe":[57,112],"machine":[58],"2016,":[60],"which":[61,82,114],"fully":[64],"parallel":[65],"model.":[67],"In":[68,90],"comparison":[69],"to":[70,98],"Turing":[72],"machine,":[73,113],"it":[74],"can":[75,83,115,121],"solve":[76],"graph":[78],"problems":[80],"efficiently,":[81],"overcome":[84],"existing":[86],"limitations.":[89],"paper,":[92],"we":[93],"propose":[94],"approach":[97,143,151],"perform":[99],"Computation":[100],"Tree":[101],"Logic":[102],"(CTL)":[103],"based":[106,140],"on":[107,141],"mathematical":[109],"of":[111],"verify":[116],"all":[117],"CTL":[118],"properties.":[119],"greatly":[122],"reduce":[123],"verification":[125],"time":[126],"systems":[128],"with":[129],"space.":[132],"develop":[134],"checker":[137],"CTL2PROBE":[139],"our":[142,150],"experimental":[146],"results":[147],"show":[148],"that":[149],"better":[153],"than":[154],"NuSMV.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
