2006
DOI: 10.1093/comjnl/bxl017
|View full text |Cite
|
Sign up to set email alerts
|

A Blocking-based Approach to Protocol Validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…According to Pelánek 11, typical techniques exploiting (relative) equivalence of walks are transition merging 12, 13, POR 5, 6, 14–19, τ‐confluence‐based reduction (TCR) 20 and SRA 4, 7.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…According to Pelánek 11, typical techniques exploiting (relative) equivalence of walks are transition merging 12, 13, POR 5, 6, 14–19, τ‐confluence‐based reduction (TCR) 20 and SRA 4, 7.…”
Section: Discussionmentioning
confidence: 99%
“…The paper was motivated by the work of Duan and Chen 3, who innovatively proposed two EPLTs for systems of CSMs differing from the classical CFSM definition 1 in that an individual transition could denote un‐interruptible and atomic execution of a sequence of multiple message receptions and/or transmissions . Their motivation for considering a more general kind of CSM was that in the reachability analysis, it is sometimes acceptable to treat specific sequences of events as one atomic action 4. Both EPLTs, in the following called Θ 1 and Θ 2 , are very elementary, but when applied to a CSM in an adequate combination, they facilitate elimination of its globally insignificant states and exploitation of commutation of its mutually independent transitions .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The third paper 'A Blocking-Based Approach to Protocol Validation' by Qizhi Ye, Yu Lei and David Kung [3] reports a new analysis method for protocol validation. Their method, based on reachability analysis, guarantees to detect protocol logical errors including deadlocks, unspecified receptions and channel overflows prior to actual system deployment.…”
mentioning
confidence: 99%