2015
DOI: 10.1016/j.procs.2015.08.325
|View full text |Cite
|
Sign up to set email alerts
|

Formalizing Mobile Ad Hoc and Sensor Networks Using VDM-SL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Z-notation and X-machine are used for the formal specification of multi-agent systems with a dynamic behaviour and structures (Ali et al 2012). VDM-SL and Z based formal models are developed for WSANs for safety critical systems Alnuem et al 2014;Riaz et al 2015).…”
Section: Literature Review Of Cas Using Formal Methodsmentioning
confidence: 99%
“…Z-notation and X-machine are used for the formal specification of multi-agent systems with a dynamic behaviour and structures (Ali et al 2012). VDM-SL and Z based formal models are developed for WSANs for safety critical systems Alnuem et al 2014;Riaz et al 2015).…”
Section: Literature Review Of Cas Using Formal Methodsmentioning
confidence: 99%
“…In this way, the recovery process is completed by cascading, that is, backup B of A is moved to position of A and newly backup of B is moved to position of B (lines [34][35][36][37][38][39]. If backup node B is critical and its backup is other than its primary, then it notifies to its backup and moves to position of its primary by cascading (lines [40][41][42][43] [34][35][36][37][38][39]. If the backup is critical and its backup is other than its primary, then the recovery procedure takes time NK (lines [40][41][42][43].…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…If backup node B is critical and its backup is other than its primary, then it notifies to its backup and moves to position of its primary by cascading (lines [40][41][42][43] [34][35][36][37][38][39]. If the backup is critical and its backup is other than its primary, then the recovery procedure takes time NK (lines [40][41][42][43]. In this way, the maximum time complexity of the algorithm in terms of Big O is N K .…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…For various safety and mission critical systems, formal methods have been used [13]. The algorithms are proposed for WSANs using Z notation in [14][15][16] and VDM-SL [17].…”
Section: Related Workmentioning
confidence: 99%