1980
DOI: 10.1109/tcom.1980.1094687
|View full text |Cite
|
Sign up to set email alerts
|

Towards Analyzing and Synthesizing Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0
1

Year Published

1985
1985
2002
2002

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 207 publications
(47 citation statements)
references
References 13 publications
0
46
0
1
Order By: Relevance
“…The second property states that every event generated by the protocol specification during the testing process must eventually be accepted by the test case, i.e., the test case is ready to receive any event generated by the protocol. Satisfaction of these two properties ensures that there is no blocking reception error in the test case [30].…”
Section: Init 1= (After(tsend(q E)) ~ After(sreeeive(q E))) and 2 mentioning
confidence: 93%
See 1 more Smart Citation
“…The second property states that every event generated by the protocol specification during the testing process must eventually be accepted by the test case, i.e., the test case is ready to receive any event generated by the protocol. Satisfaction of these two properties ensures that there is no blocking reception error in the test case [30].…”
Section: Init 1= (After(tsend(q E)) ~ After(sreeeive(q E))) and 2 mentioning
confidence: 93%
“…Third, the global state space is analyzed to detect errors such as unspecified receptions, deadlocks, synchronization errors, etc. [30]. This approach does not take into account many test system attributes such as test architectures, test management protocols, test purpose, etc.…”
Section: Related Researchmentioning
confidence: 99%
“…One can apply our algorithm for deriving interoperability test cases based on the single stimulus principle as well, especially when resources (such as available points of control and observation) are limited. The input-enumeration procedure used in our approach is similar to what is known as state-perturbation [15]. However, the goal of our procedure is to build a reachability tree and then generate interoperability test cases based on its stable states, while the goal of stateperturbation is to build a reachability tree for validating protocols between interacting processes without the concept of stable state.…”
Section: 1mentioning
confidence: 99%
“…Moreover, generating interoperability test cases mainly focuses on inputs and outputs to and from the systems of machines, which are regarded as black-or greyboxes. However, the model (labelled transition systems) used in paper [15] is focused on internal interactions between systems of machines only.…”
Section: 1mentioning
confidence: 99%
“…Furthermore it is now intended to arrive at a tool with a graphical interface for the development of provably correct SLspecifications including a possibility to transform the specifications to correct code [19]. This paper is related to work on synthesis of systems [28] (see also the introduction of [8] for an overview). These approaches mainly support the development of asynchronous systems with their related problems like calculations w.r.t, the size of buffers.…”
Section: Fig 1 Summary Of the Development Stepsmentioning
confidence: 99%