1998
DOI: 10.1007/bfb0028772
|View full text |Cite
|
Sign up to set email alerts
|

Verifying mobile processes in the HAL environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2000
2000
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…These automata can be seen as concrete realisations of the more abstract framework [12,2]. By automatically distilling a concrete, minimised representation of a process as a history dependent automata, we can expect applications in model checking and verification along the lines of [1].…”
Section: Resultsmentioning
confidence: 99%
“…These automata can be seen as concrete realisations of the more abstract framework [12,2]. By automatically distilling a concrete, minimised representation of a process as a history dependent automata, we can expect applications in model checking and verification along the lines of [1].…”
Section: Resultsmentioning
confidence: 99%
“…The finiteness property given by the HD-automata has been exploited to automatize the check of behavioral properties. Indeed, a semantic-based verification environment for the π-calculus, called HD Automata Laboratory (HAL) [1,2] has been implemented and experimented (http://fmt.isti.cnr.it:8080/hal). HAL is written in C++ and compiles with the GNU C++ compiler (the GUI is written in Tcl/Tk), and runs on SUN stations (under SUN Solaris 2.x) and on Linux machines.…”
Section: Preliminariesmentioning
confidence: 99%
“…In other words, the toolkit can be dynamically encompass a variety of verification techniques. Finally, the toolkit has been developed by targeting also the goal of extending an available verification environment (HAL [1,2]) with new facilities provided as WEB services. This has given us the opportunity to verify the effective power of the WEB service approach to deal with the reuse and integration of "old" modules.…”
Section: Introductionmentioning
confidence: 99%
“…In this section we model the Hand-over protocol for mobile phones as described in [3]. The example scenario consists of a mobile station, a switching center and two base stations.…”
Section: Example: the Hand-over Protocolmentioning
confidence: 99%