[1991 Proceedings] Tenth Annual International Phoenix Conference on Computers and Communications
DOI: 10.1109/pccc.1991.113871
|View full text |Cite
|
Sign up to set email alerts
|

Automatic synthesis of protocol specifications from service specifications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(39 citation statements)
references
References 9 publications
0
39
0
Order By: Relevance
“…In the synthesis approach, the protocol design is constructed or completed in such a way that no further validation is needed. Some protocol synthesis methods start the derivation process from a complete service specification [4][5][6][7][8][9][10][12][13][14][15] and others do not [17,18]. The protocol synthesis methods can be further classified according to the models used, which include finite state machines [4,6,7,9,10,15], Petri nets [8,13], and LOTOS-like [5,12,14].…”
Section: Related Researchmentioning
confidence: 99%
See 4 more Smart Citations
“…In the synthesis approach, the protocol design is constructed or completed in such a way that no further validation is needed. Some protocol synthesis methods start the derivation process from a complete service specification [4][5][6][7][8][9][10][12][13][14][15] and others do not [17,18]. The protocol synthesis methods can be further classified according to the models used, which include finite state machines [4,6,7,9,10,15], Petri nets [8,13], and LOTOS-like [5,12,14].…”
Section: Related Researchmentioning
confidence: 99%
“…The synthesis method extends the sequentially based synthesis method introduced earlier by them in Saleh and Probert [4]. After applying the three steps of their original method, the extended method added transitions to solve the controlled concurrency problem.…”
Section: Related Researchmentioning
confidence: 99%
See 3 more Smart Citations