<bibliography>
 <citation type="inproceedings" key="BezemG94">
  <author>Marc <surname>Bezem</surname></author>
  <author>Jan Friso <surname>Groote</surname></author>
  <year>1994</year>
  <title>Invariants in Process Algebra with Data</title>
  <editor>Bengt <surname>Jonsson</surname></editor>
  <editor>Joachim <surname>Parrow</surname></editor>
  <booktitle>CONCUR</booktitle>
  <series>LNCS</series>
  <volume>836</volume>
  <publisher>Springer</publisher>
  <pages>401&#8211;416</pages>
  <doi>10.1007/978-3-540-48654-1_30</doi>
 </citation>
 <citation type="inproceedings" key="BouvierGL20">
  <author>Pierre <surname>Bouvier</surname></author>
  <author>Hubert <surname>Garavel</surname></author>
  <author>Hern&#225;n Ponce <surname>de Le&#243;n</surname></author>
  <year>2020</year>
  <title>Automatic Decomposition of Petri Nets into Automata Networks - A Synthetic Account</title>
  <editor>Ryszard <surname>Janicki</surname></editor>
  <editor>Natalia <surname>Sidorova</surname></editor>
  <editor>Thomas <surname>Chatain</surname></editor>
  <booktitle>Application and Theory of Petri Nets and Concurrency - 41st International Conference, PETRI NETS 2020, Paris, France, June 24-25, 2020, Proceedings</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>12152</volume>
  <publisher>Springer</publisher>
  <pages>3&#8211;23</pages>
  <doi>10.1007/978-3-030-51831-8_1</doi>
 </citation>
 <citation type="inproceedings" key="BrinksmaLB93">
  <author>Ed <surname>Brinksma</surname></author>
  <author>Rom <surname>Langerak</surname></author>
  <author>Peter <surname>Broekroelofs</surname></author>
  <year>1993</year>
  <title>Functionality Decomposition by Compositional Correctness Preserving Transformation</title>
  <editor>Costas <surname>Courcoubetis</surname></editor>
  <booktitle>CAV</booktitle>
  <series>LNCS</series>
  <volume>697</volume>
  <publisher>Springer</publisher>
  <pages>371&#8211;384</pages>
  <doi>10.1007/3-540-56922-7_31</doi>
 </citation>
 <citation type="inproceedings" key="BunteGKLNVWWW19">
  <author>Olav <surname>Bunte</surname></author>
  <author>Jan Friso <surname>Groote</surname></author>
  <author>Jeroen J. A. <surname>Keiren</surname></author>
  <author>Maurice <surname>Laveaux</surname></author>
  <author>Thomas <surname>Neele</surname></author>
  <author>Erik P. <surname>de Vink</surname></author>
  <author>Wieger <surname>Wesselink</surname></author>
  <author>Anton <surname>Wijs</surname></author>
  <author>Tim A. C. <surname>Willemse</surname></author>
  <year>2019</year>
  <title>The mCRL2 Toolset for Analysing Concurrent Systems - Improvements in Expressivity and Usability</title>
  <editor>Tom&#225;s <surname>Vojnar</surname></editor>
  <editor>Lijun <surname>Zhang</surname></editor>
  <booktitle>TACAS</booktitle>
  <series>LNCS</series>
  <volume>11428</volume>
  <publisher>Springer</publisher>
  <pages>21&#8211;39</pages>
  <doi>10.1007/978-3-030-17465-1_2</doi>
 </citation>
 <citation type="article" key="CheungK96">
  <author>Shing-Chi <surname>Cheung</surname></author>
  <author>Jeff <surname>Kramer</surname></author>
  <year>1996</year>
  <title>Context Constraints for Compositional Reachability Analysis</title>
  <journal>ACM Trans. Softw. Eng. Methodol.</journal>
  <volume>5</volume>
  <number>4</number>
  <pages>334&#8211;377</pages>
  <doi>10.1145/235321.235323</doi>
 </citation>
 <citation type="inproceedings" key="CrouzenL11">
  <author>Pepijn <surname>Crouzen</surname></author>
  <author>Fr&#233;d&#233;ric <surname>Lang</surname></author>
  <year>2011</year>
  <title>Smart Reduction</title>
  <booktitle>FASE</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>6603</volume>
  <publisher>Springer</publisher>
  <pages>111&#8211;126</pages>
  <doi>10.1007/978-3-642-19811-3_9</doi>
 </citation>
 <citation type="inproceedings" key="GaravelLM18">
  <author>Hubert <surname>Garavel</surname></author>
  <author>Fr&#233;d&#233;ric <surname>Lang</surname></author>
  <author>Laurent <surname>Mounier</surname></author>
  <year>2018</year>
  <title>Compositional Verification in Action</title>
  <editor>Falk <surname>Howar</surname></editor>
  <editor>Jiri <surname>Barnat</surname></editor>
  <booktitle>FMICS</booktitle>
  <series>LNCS</series>
  <volume>11119</volume>
  <publisher>Springer</publisher>
  <pages>189&#8211;210</pages>
  <doi>10.1007/978-3-030-00244-2_13</doi>
 </citation>
 <citation type="article" key="GlabbeekLT09">
  <author>R. J. <surname>van Glabbeek</surname></author>
  <author>B. <surname>Luttik</surname></author>
  <author>N. <surname>Trcka</surname></author>
  <year>2009</year>
  <title>Branching Bisimilarity with Explicit Divergence</title>
  <journal>Fundam. Inform.</journal>
  <volume>93</volume>
  <number>4</number>
  <pages>371&#8211;392</pages>
  <doi>10.3233/FI-2009-109</doi>
 </citation>
 <citation type="article" key="GrafSL96">
  <author>Susanne <surname>Graf</surname></author>
  <author>Bernhard <surname>Steffen</surname></author>
  <author>Gerald <surname>L&#252;ttgen</surname></author>
  <year>1996</year>
  <title>Compositional Minimisation of Finite State Systems Using Interface Specifications</title>
  <journal>Formal Asp. Comput.</journal>
  <volume>8</volume>
  <number>5</number>
  <pages>607&#8211;616</pages>
  <doi>10.1007/BF01211911</doi>
 </citation>
 <citation type="inproceedings" key="GrooteM92">
  <author>Jan Friso <surname>Groote</surname></author>
  <author>Faron <surname>Moller</surname></author>
  <year>1992</year>
  <title>Verification of Parallel Systems via Decomposition</title>
  <editor>Rance <surname>Cleaveland</surname></editor>
  <booktitle>CONCUR</booktitle>
  <series>LNCS</series>
  <volume>630</volume>
  <publisher>Springer</publisher>
  <pages>62&#8211;76</pages>
  <doi>10.1007/BFb0084783</doi>
 </citation>
 <citation type="book" key="GrooteM2014">
  <author>Jan Friso <surname>Groote</surname></author>
  <author>Mohammad Reza <surname>Mousavi</surname></author>
  <year>2014</year>
  <title>Modeling and Analysis of Communicating Systems</title>
  <publisher>MIT Press</publisher>
  <doi>10.7551/mitpress/9946.001.0001</doi>
 </citation>
 <citation type="article" key="Hesselink98">
  <author>Wim H. <surname>Hesselink</surname></author>
  <year>1998</year>
  <title>Invariants for the Construction of a Handshake Register</title>
  <journal>Inf. Process. Lett.</journal>
  <volume>68</volume>
  <number>4</number>
  <pages>173&#8211;177</pages>
  <doi>10.1016/S0020-0190(98)00158-6</doi>
 </citation>
 <citation type="article" key="JongmansCP16">
  <author>Sung-Shik T. Q. <surname>Jongmans</surname></author>
  <author>Dave <surname>Clarke</surname></author>
  <author>Jos&#233; <surname>Proen&#x00e7;a</surname></author>
  <year>2016</year>
  <title>A procedure for splitting data-aware processes and its application to coordination</title>
  <journal>Sci. Comput. Program.</journal>
  <volume>115-116</volume>
  <pages>47&#8211;78</pages>
  <doi>10.1016/j.scico.2014.02.017</doi>
 </citation>
 <citation type="article" key="artifact">
  <author>M. <surname>Laveaux</surname></author>
  <year>2021</year>
  <title>Downloadable sources for the case study</title>
  <doi>10.5281/zenodo.5091850</doi>
 </citation>
 <citation type="article" key="Laveaux20">
  <author>Maurice <surname>Laveaux</surname></author>
  <author>Tim A. C. <surname>Willemse</surname></author>
  <year>2020</year>
  <title>Decompositional Minimisation of Monolithic Processes</title>
  <journal>CoRR</journal>
  <volume>abs/2012.06468</volume>
  <url>https://arxiv.org/abs/2012.06468</url>
 </citation>
 <citation type="article" key="Milner83">
  <author>Robin <surname>Milner</surname></author>
  <year>1983</year>
  <title>Calculi for Synchrony and Asynchrony</title>
  <journal>Theor. Comput. Sci.</journal>
  <volume>25</volume>
  <pages>267&#8211;310</pages>
  <doi>10.1016/0304-3975(83)90114-7</doi>
 </citation>
 <citation type="inproceedings" key="PolT09">
  <author>Jaco <surname>van de Pol</surname></author>
  <author>Mark <surname>Timmer</surname></author>
  <year>2009</year>
  <title>State Space Reduction of Linear Processes Using Control Flow Reconstruction</title>
  <editor>Zhiming <surname>Liu</surname></editor>
  <editor>Anders P. <surname>Ravn</surname></editor>
  <booktitle>Automated Technology for Verification and Analysis, 7th International Symposium, ATVA 2009, Macao, China, October 14-16, 2009. Proceedings</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>5799</volume>
  <publisher>Springer</publisher>
  <pages>54&#8211;68</pages>
  <doi>10.1007/978-3-642-04761-9_5</doi>
 </citation>
 <citation type="inproceedings" key="RemenskaWVFTB12">
  <author>Daniela <surname>Remenska</surname></author>
  <author>Tim A. C. <surname>Willemse</surname></author>
  <author>Kees <surname>Verstoep</surname></author>
  <author>Wan J. <surname>Fokkink</surname></author>
  <author>Jeff <surname>Templon</surname></author>
  <author>Henri E. <surname>Bal</surname></author>
  <year>2012</year>
  <title>Using Model Checking to Analyze the System Behavior of the LHC Production Grid</title>
  <booktitle>12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012</booktitle>
  <publisher>IEEE Computer Society</publisher>
  <pages>335&#8211;343</pages>
  <doi>10.1109/CCGrid.2012.90</doi>
 </citation>
 <citation type="inproceedings" key="RomijnS98">
  <author>Judi <surname>Romijn</surname></author>
  <author>Jan <surname>Springintveld</surname></author>
  <year>1998</year>
  <title>Exploiting Symmetry in Protocol Testing</title>
  <editor>Stanislaw <surname>Budkowski</surname></editor>
  <editor>Ana R. <surname>Cavalli</surname></editor>
  <editor>Elie <surname>Najm</surname></editor>
  <booktitle>FORTE XI / PSTV XVIII</booktitle>
  <series>IFIP Conference Proceedings</series>
  <volume>135</volume>
  <publisher>Kluwer</publisher>
  <pages>337&#8211;352</pages>
  <doi>10.1007/978-0-387-35394-4_29</doi>
 </citation>
 <citation type="inproceedings" key="TaiK93:hierarchy">
  <author>Kuo-Chung <surname>Tai</surname></author>
  <author>Pramod V. <surname>Koppol</surname></author>
  <year>1993</year>
  <title>Hierarchy-based incremental analysis of communication protocols</title>
  <booktitle>ICNP</booktitle>
  <publisher>IEEE Computer Society</publisher>
  <pages>318&#8211;325</pages>
  <doi>10.1109/ICNP.1993.340896</doi>
 </citation>
 <citation type="inproceedings" key="TaiK93:incremental">
  <author>Kuo-Chung <surname>Tai</surname></author>
  <author>Pramod V. <surname>Koppol</surname></author>
  <year>1993</year>
  <title>An Incremental Approach to Reachability Analysis of Distributed Programs</title>
  <editor>Jack C. <surname>Wileden</surname></editor>
  <booktitle>IWSSD</booktitle>
  <publisher>IEEE Computer Society</publisher>
  <pages>141&#8211;151</pages>
  <doi>10.1109/IWSSD.1993.315504</doi>
 </citation>
</bibliography>
