Computer Networks and ISDN Systems
Volume 25, Issue 9, April 1993, Pages 981-1017
Design and validation of protocols: a tutorial
References (16)
Myths about the mutual exclusion problem
- et al.
A note on reliable full-duplex transmission over half-duplex lines
Comm. ACM
(1969) - et al.
Petri net theory for the correctness of protocols
IEEE Trans. Comm.
(1982) Solution to a problem in concurrent programming control
Comm. ACM
(1965)Guarded commands, nondeterminacy and formal derivation of programs
Comm. ACM
(1975)A temporal logic to Promela “never clause” converter
Communicating sequential processes
Comm. ACM
(1978)- et al.
Validating SDL specifications: an experiment
There are more references available in the full text version of this article.
Cited by (53)
Reporting Code Coverage at Requirement Phase Using SPIN Model Checker
2023, Lecture Notes in Networks and SystemsPOET: A Self-learning Framework for PROFINET Industrial Operations Behaviour
2023, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICSTTranslating EULYNX SysML Models into Symbolic Transition Systems for Model-Based Testing of Railway Signaling Systems
2022, Proceedings - 2022 IEEE 15th International Conference on Software Testing, Verification and Validation, ICST 2022Verifying nondeterministic processes driven by broadcasts on Android
2019, Proceedings of 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2019Sound deadlock prediction
2018, Proceedings of the ACM on Programming Languages
Copyright © 1993 Published by Elsevier B.V.