Filters








631,129 Hits in 3.3 sec

Timing Constraints in Message Sequence Chart Specifications [chapter]

Hanêne Ben-Abdallah, Stefan Leue
1997 Formal Description Techniques and Protocol Specification, Testing and Verification  
Secondly, the paper describes an analysis technique for timing consistency in iterating and branching MSC specifications.  ...  This paper first reviews proposed extensions of MSCs to describe timing constraints.  ...  Formal Description Techniques and Protocol Specification, Testing and Verification T. Mizuno, N. Shiratori, T. Higashino & A. Togashi (Eds.) © 1997 IFIP.  ... 
doi:10.1007/978-0-387-35271-8_6 fatcat:r7rqkaliejgqfey3iw7g3vwkma

A TLA+ Formal Specification and Verification of a New Real-Time Communication Protocol

Paul Regnier, George Lima, Aline Andrade
2009 Electronical Notes in Theoretical Computer Science  
The protocol conception was improved by using information provided by its formal specification and verification. In the end, a precise and highly reliable protocol description is provided.  ...  We describe the formal specification and verification of a new fault-tolerant real-time communication protocol, called DoRiS , which is designed for supporting distributed real-time systems that use a  ...  Presenting the case study of the specification and verification of a new real-time communication protocol, called DoRiS (a Double Ring Service protocol for Real-Time Systems), we illustrate how formal  ... 
doi:10.1016/j.entcs.2009.05.054 fatcat:3ztf7u6yerartjx7tefxcwlklq

Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude

Peter Csaba Ölveczky, José Meseguer, Carolyn L. Talcott
2006 Formal methods in system design  
This paper describes the application of the Real-Time Maude tool and the Maude formal methodology to the specification and analysis of the AER/NCA suite of active network multicast protocol components.  ...  Real-Time Maude has proved to be well-suited to meet the AER/NCA modeling challenges, and its methods have been effective in uncovering subtle and important errors in the informal use case specification  ...  Bhattacharyya for his help in the initial stages of designing the Maude specification, and Narciso Martí-Oliet for his comments on earlier versions of this paper.  ... 
doi:10.1007/s10703-006-0015-0 fatcat:bw63r72rebbrncu6xlfdhuaqbm

Formal specification of the FlexRay protocol using FocusST [article]

Maria Spichkova
2017 arXiv   pre-print
This work extends our previous research of formal specifications of this protocol using Focus formal language.  ...  This paper presents a formal specification of the FlexRay protocol using the FocusST framework.  ...  That formalization was based on the "Protocol Specification 2.0" [12] .  ... 
arXiv:1801.04979v1 fatcat:ajvdcbc4e5b7vdvn3gbwha7t24

A Formal Framework for Interaction Protocol Engineering [chapter]

Fernando Alonso, Sonia Frutos, Genoveva López, Javier Soriano
2005 Lecture Notes in Computer Science  
This paper presents a formal framework devised to support interaction protocol (IP) engineering.  ...  This semantics allows protocol property verification and eases automatic code generation from the ACSL specification for the purpose of simulating code execution at design time, as well as improving and  ...  On the other hand, the developed formalism automatically outputs code from the ACSL specification for the purpose of (1) simulating protocol execution at design time and (2) improving and assuring correct  ... 
doi:10.1007/11559221_3 fatcat:z2e27uv2bngpndruds2r27p4ya

Using Process Algebra to Design Better Protocols [chapter]

Peter Höfner
2016 The Role and Importance of Mathematics in Innovation  
Despite the maturity of formal description languages and formal methods for analyzing them, the description of real protocols is still overwhelmingly informal.  ...  The consequences of informal protocol description drag down industrial productivity and impede research progress". Pamela Zave [18]  ...  Designing Protocols: State of The Art Protocols are mainly specified in natural languages, such as English, without presenting a formal specification or some sort of pseudo code.  ... 
doi:10.1007/978-981-10-0962-4_8 fatcat:tvoe74227ndntds5qolrdb2gta

A new Approach to Performance Evaluation of Formally Specified Protocols [chapter]

Stefan Böhmer, Ralf Klafka
1995 IFIP Advances in Information and Communication Technology  
A main focus is on semi-automatic generation of a program for stochastic simulation directly from a given protocol specification in SDL.  ...  A concept as well as an implementation is shortly described which combines the techniques of formal specification and stochastic simulation.  ...  SPEET: a Toolset for Stochastic Simulation of Formally Specified Protocols As described above the following approach places formal protocol specifications in SDL in the centre of an entire software development  ... 
doi:10.1007/978-0-387-34878-0_37 fatcat:lutznlk5hjgdler6hiqtw2bryu

Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude [chapter]

Peter Csaba Ölveczky, Mark Keaton, José Meseguer, Carolyn Talcott, Steve Zabele
2001 Lecture Notes in Computer Science  
This paper describes the application of the Real-Time Maude tool and the Maude formal methodology to the specification and analysis of the AER/NCA suite of active network multicast protocol components.  ...  Real-Time Maude has proved to be well-suited to meet the AER/NCA modeling challenges, and its methods have been effective in uncovering subtle and important errors in the informal use case specification  ...  Bhattacharyya for his help in the initial stages of designing the Maude specification, and Narciso Martí-Oliet for his comments on earlier versions of this paper.  ... 
doi:10.1007/3-540-45314-8_24 fatcat:rvooi6minvehtkm65ir7omifcm

The Use of Aggregate Approach for Formal Specification and Simulation of Real-Time Systems [chapter]

Henrikas Pranevicius, Dalius Makackas
2001 Databases and Information Systems  
The goal of performed investigations was to analyze protocol application possibilities in ABS.  ...  Paper presents model of Control Area Network (CAN) protocol. The model was created using piecelinear aggregate formalism. CAN protocol is a component part of Anti-lock Braking System (ABS).  ...  Section 2 gives formal specification of CAN protocol using piece-linear aggregate formalism. Simulation results showing waiting times for packets with different priorities are presented in section 3.  ... 
doi:10.1007/978-94-015-9636-7_15 fatcat:dxb2mzusv5eu3k3me3oxwj4sgm

Formal FocusST Specification of CAN [article]

Maria Spichkova
2018 arXiv   pre-print
This paper presents a formal specification of the Controller Area Network (CAN) protocol using FocusST framework.  ...  We formally describe core components of the protocol, which provides a basis for further formal analysis using the Isabelle/HOL theorem prover.  ...  Van Osch and Smolka proposed a finite-state method for analysis of the CAN bus protocol. Saha and Roy presented a formal specification of the time triggered version of CAN Protocol, see [11] .  ... 
arXiv:1811.08128v1 fatcat:v5uihb3ttvbxjjpeju2lhvkiaa

Towards Standardized Conformance Test Suite for ISO Transport Layer Protocol

Hazem Mostafa El-Gendy, Ihab ElSayed Talkhan
2013 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
The protocol is formally specified in Lotos; the ISO/IEC Formal Description Technique for computer/communications protocols and distributed systems.  ...  In this paper, we develop a sound Conformance Test Suite for the Transport Layer Protocol Internationally standardized by both ISO and IEC.  ...  We use formal methods for the generation of testing sequences and formal specification of the protocol in the ISO/IEC Lotos standard Formal Description Technique for protocols.  ... 
doi:10.24297/ijct.v12i2.3291 fatcat:h3ofk2geabfctpptfzjsjpfzcu

Using a formal specification and a model checker to monitor and direct simulation

Serdar Tasiran, Yuan Yu, Brannon Batson
2003 Proceedings of the 40th conference on Design automation - DAC '03  
We describe a technique for verifying that a hardware design correctly implements a protocol-level formal specification.  ...  Simulation steps are translated to protocol state transitions using a refinement map and then verified against the specification using a model checker.  ...  In this way, coverage information is collected at the same time protocol conformance is being tested.  ... 
doi:10.1145/775925.775926 fatcat:u2rbyb6255bslc3d3kfw2q7t7q

Using a formal specification and a model checker to monitor and direct simulation

Serdar Tasiran, Yuan Yu, Brannon Batson
2003 Proceedings of the 40th conference on Design automation - DAC '03  
We describe a technique for verifying that a hardware design correctly implements a protocol-level formal specification.  ...  Simulation steps are translated to protocol state transitions using a refinement map and then verified against the specification using a model checker.  ...  In this way, coverage information is collected at the same time protocol conformance is being tested.  ... 
doi:10.1145/775832.775926 dblp:conf/dac/TasiranYB03 fatcat:qgx72lljarf7ngxljnvi5ksu2y

Protocol specification for OSI

Gregor V Bochmann
1990 Computer networks and ISDN systems  
Special attention is given to the specification formalisms used for OSI protocol and service descriptions, including semi-formal languages such as state tables, ASN.1 and TTCN, and formal description techniques  ...  In this context, the protocol specifications are of particular importance, since they represent the standards which are the basis for the implementation and testing of compatible OSI systems.  ...  TTCN) and the FDT used for the formal protocol specification.  ... 
doi:10.1016/0169-7552(90)90132-c fatcat:avhuude4dbclfiz5j5yellrqkm

Formal Verification of Authenticated AODV Protocol using AVISPA

Kinchit Vishesh, Amandeep Verma
2012 International Journal of Computer Applications  
In this paper we analyze ad hoc on-demand distance vector routing protocol (AODV) using formal verification technique.  ...  To overcome the weak authentication problem found, we incorporate a secure authentication technique in AODV specification and prove it to be secure by formally verifying the results.  ...  The formal analysis of correctness for routing protocols from IETF standards and drafts shown in [7] , by proving the correctness of the RIP standard, automated proof of a sharp real-time bound on the  ... 
doi:10.5120/7914-1179 fatcat:f2yzvj2uofctpd3wjfrcaiqn3e
« Previous Showing results 1 — 15 out of 631,129 results