1982
DOI: 10.1109/tc.1982.1676079
|View full text |Cite
|
Sign up to set email alerts
|

A Theory for Protocol Validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0
1

Year Published

1985
1985
2005
2005

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 7 publications
0
15
0
1
Order By: Relevance
“…2 possible states of the protocol variables. Each process can be in one of 10 2 different states, so two processes can generate 10 4 states. Finally, each buffer can hold between zero and five messages, where each message can be one out of ten possible messages.…”
Section: The Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…2 possible states of the protocol variables. Each process can be in one of 10 2 different states, so two processes can generate 10 4 states. Finally, each buffer can hold between zero and five messages, where each message can be one out of ten possible messages.…”
Section: The Problemmentioning
confidence: 99%
“…In the last few years some experience has been gained with the capabilities and the restrictions of automated protocol validators [2,3,4,8,10,11,12,13]. The first validation methods required considerable effort from the user to translate an abstract protocol specification into the formal code used in the validation process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Other related approaches applied to different aspects of the problem of analyzing distributed software systems include Taylor's method for static analysis of Ada programs [32] and Holzmann's technique for protocol validation [16]. Numerous researchers have investigated the alternative of using proof techniques [lo] and proof rules [E] for establishing properties of distributed software systems (e.g., [l, 18, 20, 24, 251).…”
Section: An Approach To Analysismentioning
confidence: 99%
“…Some formalized methods to verify the mecanism of the communication are developed [1,2,7,8,11,12,13,14,15]. …”
Section: Introductionmentioning
confidence: 99%