Formal Methods for Industrial Critical Systems 2012
DOI: 10.1002/9781118459898.ch7
|View full text |Cite
|
Sign up to set email alerts
|

Practical Applications of Probabilistic Model Checking to Communication Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…To reason about the correctness of network protocols, prior work has employed a variety of program analysis techniques, such as model checking [15], [21], [35], [41], [43], static analysis [16], [46], [49], theorem proving [50], and refinement checking [2].…”
Section: Related Workmentioning
confidence: 99%
“…To reason about the correctness of network protocols, prior work has employed a variety of program analysis techniques, such as model checking [15], [21], [35], [41], [43], static analysis [16], [46], [49], theorem proving [50], and refinement checking [2].…”
Section: Related Workmentioning
confidence: 99%
“…PTAs have real-valued clocks and, like MDPs [24] and therefore allow us to model systems with a range of different characteristics (non-determinism, probability, and real time). In this section, we illustrate a number of basic PTA concepts using the example in Fig.…”
Section: A Probabilistic Timed Automatamentioning
confidence: 99%
“…Further, these models are analysed by specifying properties in PCTL, continuoustime stochastic logic (CSL) and linear temporal logic (LTL) logics and their extensions in terms of rewards [19]. The analysis of communication protocols is performed in [20] using probabilistic timed automata and probabilistic model checking. An overview of advantages and disadvantages of both techniques is also given.…”
Section: Prism Model Checkermentioning
confidence: 99%