2003
DOI: 10.1023/a:1022965204416
|View full text |Cite
|
Sign up to set email alerts
|

Experience with Applying Formal Methods to Protocol Specification and System Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…A research group, with extensive protocol verification experience, was using the Murφ verification system to model and verify one proposal [1]. Another development team, with significant experience developing protocols, was using TLA+ to create and model a new protocol proposal and verifying it with TLC [2].…”
Section: Protocol Fvmentioning
confidence: 99%
“…A research group, with extensive protocol verification experience, was using the Murφ verification system to model and verify one proposal [1]. Another development team, with significant experience developing protocols, was using TLA+ to create and model a new protocol proposal and verifying it with TLC [2].…”
Section: Protocol Fvmentioning
confidence: 99%
“…[4], [8], [3], [13]). The HLM is a simplified version of the component that still models key functionality.…”
Section: Introductionmentioning
confidence: 99%
“…We have applied this approach to a cache coherence protocol that is unusual (caches are maintained on doubly-linked lists) and complex (37 cache states) called SIMPL. We are not the first to do table-based design [1,2,4], but it is one thing to ask designers to write tables in a style intended for formal analysis, and it is another to take tables as they are written by the designers and make formal sense of them. We require no language or GUI for building the model, and impose no rigid philosophy on how protocols should be described.…”
mentioning
confidence: 99%