Formal Description Techniques and Protocol Specification, Testing and Verification 1997
DOI: 10.1007/978-0-387-35271-8_5
|View full text |Cite
|
Sign up to set email alerts
|

A Hierarchy of Communication Models for Message Sequence Charts

Abstract: In a Message Sequence Chart (MSC) the dynamical behaviour of a number of cooperating processes is depicted. An MSC defines a partial order on the communication events between these processes. This order determines the physical architecture needed for implementing the specified behaviour, such as a FIFO buffer between each of the processes. In a systematic way, we define 50 communication models for MSC and we define what it means for an MSC to be implementable by such a model. Some of these models tum out to be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2001
2001
2006
2006

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The main rationale for introducing the three event semantics in Timed STAIRS is to be able to distinguish between reception and consumption of messages in order to specify time-constraints on black-box behavior as well as message consumption. Hence, the purpose of the three event semantics is quite different from [EMR97] where time and black-box behavior is not considered.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…The main rationale for introducing the three event semantics in Timed STAIRS is to be able to distinguish between reception and consumption of messages in order to specify time-constraints on black-box behavior as well as message consumption. Hence, the purpose of the three event semantics is quite different from [EMR97] where time and black-box behavior is not considered.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Communication between the runs is asynchronous (buffered). In order to conveniently model the intruder behaviour, we will route communication through two buffers: one output buffer from the sending run and one input buffer from the receiving run (for a discussion on the expressive power of such construction, see [7]). The intruder capabilities will determine how the messages are transferred from the output buffer to the input buffer.…”
Section: Runsmentioning
confidence: 99%
“…Especially in small systems, the problems caused by non-local choice and race choice can be solved by extra assumptions about the underlying communication system [12,4]. Typical properties that may help are communication synchrony, message order preservation, bounded buffer capacities and confirmed communications.…”
Section: Related Problems and Solutionsmentioning
confidence: 99%