1990
DOI: 10.1109/37.56282
|View full text |Cite
|
Sign up to set email alerts
|

A method for specifying, implementing, and verifying media access control protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

1993
1993
2006
2006

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…However, this specification task has proved to be Ž . cumbersome even for simple cases Brooks et al, 1990 . It is difficult to provide specification methods enabling a compact and unambiguous representation of the operational objectives and constraints.…”
Section: Specification Of Closed-loop Behaviormentioning
confidence: 99%
“…However, this specification task has proved to be Ž . cumbersome even for simple cases Brooks et al, 1990 . It is difficult to provide specification methods enabling a compact and unambiguous representation of the operational objectives and constraints.…”
Section: Specification Of Closed-loop Behaviormentioning
confidence: 99%
“…The analysis we suggest provides a simple solution to many of the problems noted in [2]. It was observed that systems as complicated as networks are often impossible to model in a discrete event control context.…”
Section: Introductionmentioning
confidence: 96%
“…Recent work has been done in the formal modeling and analysis of network protocols [2,3]. As we become more dependent on wireless networks for communication, the design and implementation of secure network protocols will become more important.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation