References
Bartzis C, Bultan T (2005) Efficient BDDs for bounded arithmetic constraints. Int J Softw Tools Technol Transfer 8(1)
Bozga L, Lakhnech Y, Périn M (2005) Pattern-based abstraction for verifying secrecy in protocols. Int J Softw Tools Technol Transfer 8(1)
Ciardo G, Marmorstein R, Siminiceanu R (2005) The saturation algorithm for symbolic state space exploration. Int J Softw Tools Technol Transfer 8(1)
Garavel H, Hatcliff J (2003) Proceedings of the 9th International Conference on Tools and Algorithms for Construction and Analysis of Systems TACAS’2003, Warsaw, Poland, April 2003. Lecture notes in computer science, vol 2619. Springer, Berlin Heidelberg New York
Groote JF, van Ham F (2005) Interactive visualization of large state graphs. Int J Softw Tools Technol Transfer 8(1)
Mateescu R (2005) CAESAR_SOLVE: A generic library for on-the-fly resolution of alternation-free Boolean equation systems. Int J Softw Tools Technol Transfer 8(1)
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Garavel, H., Hatcliff, J. Why you should definitely read this special section. Int J Softw Tools Technol Transfer 8, 1–3 (2006). https://doi.org/10.1007/s10009-005-0199-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10009-005-0199-4