2010
DOI: 10.1007/978-3-642-15375-4_22
|View full text |Cite
|
Sign up to set email alerts
|

Parameterized Verification of Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
137
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 73 publications
(143 citation statements)
references
References 14 publications
3
137
1
Order By: Relevance
“…models based on wqos on bounded-depth trees or graphs, whose complexity has not been analyzed [GMSZ08,DSZ10,Mey08,BKWZ13,KS14]. This is part of our current research agenda on complexity for well-structured systems [SS12].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…models based on wqos on bounded-depth trees or graphs, whose complexity has not been analyzed [GMSZ08,DSZ10,Mey08,BKWZ13,KS14]. This is part of our current research agenda on complexity for well-structured systems [SS12].…”
Section: Discussionmentioning
confidence: 99%
“…The exact complexity of verification problems in the aforementioned models is currently unknown [GMSZ08,DSZ10,Mey08,BKWZ13,KS14]. Our encoding suggests they might be F ε 0 -complete.…”
Section: Applications Of the Priority Embedding To Treesmentioning
confidence: 97%
“…[8,12,11,5,6]. Ad hoc networks consist of wireless hosts that, in absence of a fixed infrastructure, communicate sending broadcast messages.…”
Section: Introductionmentioning
confidence: 99%
“…In the AHN model proposed in [5] undirected graphs are used to represent a network in which each node executes an instance of a fixed (untimed) interaction protocol based on broadcast communication. Since individual nodes are not aware of the network topology, in the ad hoc setting it is natural to parameterize verification problems in the size and shape of the initial configuration as in the untimed case in [5]. We observe however that protocols for ad hoc networks are often based on time-sensitive conditions like time-outs or time-stamps (added to flooded data).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation