2007
DOI: 10.1002/stvr.385
|View full text |Cite
|
Sign up to set email alerts
|

Error‐preserving reductions on communication protocols

Abstract: Common logical design errors in communication protocols are typically detected through reachability analysis or state‐based model checking techniques. These techniques suffer from a state explosion problem and a variety of methods have been explored to deal with it. In this paper, two transformation rules are proposed to be applied specifically on the specifications of communication protocols to reduce their sizes while preserving common logical design errors. These rules are applied on the specification of ea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Both EPLTs, in the following called Θ 1 and Θ 2 , are very elementary, but when applied to a CSM in an adequate combination, they facilitate elimination of its globally insignificant states and exploitation of commutation of its mutually independent transitions . It is, hence, not surprising that, as demonstrated by Duan and Chen 3, their application to individual system components complements partial order reduction (POR) 5, 6, the most typical EPLT applied during reachability analysis, whose essence is exploitation of commutation of mutually independent transitions belonging to different CSMs of the considered system. Pre‐processing with Θ 1 and Θ 2 is helpful 3 also if the employed reachability analysis technique is simultaneous reachability analysis (SRA) 7, 8, another technique exploiting commutation of transitions belonging to different system components.…”
Section: Introductionmentioning
confidence: 98%
See 4 more Smart Citations
“…Both EPLTs, in the following called Θ 1 and Θ 2 , are very elementary, but when applied to a CSM in an adequate combination, they facilitate elimination of its globally insignificant states and exploitation of commutation of its mutually independent transitions . It is, hence, not surprising that, as demonstrated by Duan and Chen 3, their application to individual system components complements partial order reduction (POR) 5, 6, the most typical EPLT applied during reachability analysis, whose essence is exploitation of commutation of mutually independent transitions belonging to different CSMs of the considered system. Pre‐processing with Θ 1 and Θ 2 is helpful 3 also if the employed reachability analysis technique is simultaneous reachability analysis (SRA) 7, 8, another technique exploiting commutation of transitions belonging to different system components.…”
Section: Introductionmentioning
confidence: 98%
“…It is, hence, not surprising that, as demonstrated by Duan and Chen 3, their application to individual system components complements partial order reduction (POR) 5, 6, the most typical EPLT applied during reachability analysis, whose essence is exploitation of commutation of mutually independent transitions belonging to different CSMs of the considered system. Pre‐processing with Θ 1 and Θ 2 is helpful 3 also if the employed reachability analysis technique is simultaneous reachability analysis (SRA) 7, 8, another technique exploiting commutation of transitions belonging to different system components. After exhaustive pre‐processing with Θ 1 and Θ 2 , there is, however, no need to use the more advanced blocking SRA (BSRA) 4, whose advantage is in treating specific sequences of transitions of individual system components as compound transitions, where the pre‐processing already transforms every such sequence into one transition.…”
Section: Introductionmentioning
confidence: 98%
See 3 more Smart Citations