1. Barrett C, Stump A, Tinelli C, Boehme S, Cok D, Deharbe D, Dutertre B, Fontaine P, Ganesh V, Griggio A, Grundy J, Jackson P, Oliveras A, Krstiäg S, Moskal M, Moura LD, Sebastiani R, Cok TD, Hoenicke JC (2010) The SMT-LIB standard: version 2.0. In: Technical report, Department of Computer Science, The University of Iowa
2. Berndtsson M, Mellin J (2009) ECA rules, pp 959–960. Springer, Boston. doi:
10.1007/978-0-387-39940-9_504
3. Beyer D, Stahlbauer A (2014) BDD-based software verification. Int J Softw Tools Technol Transf 16(5):507–518. doi:
10.1007/s10009-014-0334-1
4. Beyer D, Wendler P (2012) Algorithms for software model checking: predicate abstraction vs. impact. In: 2012 formal methods in computer-aided design (FMCAD), pp 106–113
5. Bryant RE (1986) Graph-based algorithms for Boolean function manipulation. IEEE Trans Comput 35(8):677–691. doi:
10.1109/TC.1986.1676819