2011
DOI: 10.1145/1883612.1883614
|View full text |Cite
|
Sign up to set email alerts
|

One step forward

Abstract: Wireless self-organizing networks (WSONs) have attracted considerable attention from the network research community; however, the key for their success is the rigorous validation of the properties of the network protocols. Applications of risk or those demanding precision (like alert-based systems) require a rigorous and reliable validation of deployed network protocols. While the main goal is to ensure the reliability of the protocols, validation techniques also allow the establishment of their correctness re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(2 citation statements)
references
References 89 publications
0
2
0
Order By: Relevance
“…Most of the existing critical node detection schemes including [8, 9] lack rigorous validation and only use non-formal techniques (e.g., simulation) [23]. Simulation results are only effective for quantitative performance validation and do not guarantee correctness of the approach that is vital for safety-critical applications.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the existing critical node detection schemes including [8, 9] lack rigorous validation and only use non-formal techniques (e.g., simulation) [23]. Simulation results are only effective for quantitative performance validation and do not guarantee correctness of the approach that is vital for safety-critical applications.…”
Section: Related Workmentioning
confidence: 99%
“…Nonformal techniques are unable to verify the correctness and detect design errors while modeling functional behaviors (e.g., interactions) of algorithms. Recently, some researchers have advocated the use of formal methods for algorithm validation in wireless networks [23, 27]. However, most schemes only use formal specification and did not use complementary verification and validation techniques.…”
Section: Related Workmentioning
confidence: 99%