Proceedings of the Fourth Annual Symposium on Logic in computer science
A Performance Comparison of Energy Consumption for Mobile Ad Hoc Network Routing Protocols
MASCOTS '00 Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Model-Checking Algorithms for Continuous-Time Markov Chains
IEEE Transactions on Software Engineering
A logic for reasoning about time and reability
A logic for reasoning about time and reability
Logic in Computer Science: Modelling and Reasoning about Systems
Logic in Computer Science: Modelling and Reasoning about Systems
A formal analysis of bluetooth device discovery
International Journal on Software Tools for Technology Transfer (STTT)
ACM Transactions on Computer Systems (TOCS)
Proving the Correctness of Multiprocess Programs
IEEE Transactions on Software Engineering
Virtual routers on the move: live router migration as a network-management primitive
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Analysis of a gossip protocol in PRISM
ACM SIGMETRICS Performance Evaluation Review
Learning assumptions for compositional verification
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
International Journal of Communication Systems
Hi-index | 0.00 |
Formal verification tools have been extensively used in the past to assess the correctness of protocols, processes, and systems in general. Their most common use so far has been in identifying whether livelock or deadlock situations can occur during protocol execution, process, or system operation. In this paper we aim to showcase that an additional equally important and useful application of formal verification tools can be in protocol design and optimization itself. This can be achieved by using the tools in a rather different context compared to their traditional use. That is not only as means to assess the correctness of a protocol in terms of lack of livelock and deadlock situations but rather as tools capable of building profiles of protocols, associating performance related metrics, and identifying operational patterns and possible bottleneck operations in terms of metrics of interest. This process can provide protocol designers with an insight about the protocols' behavior and guide them towards further protocol design optimizations. We illustrate these principles using some existing protocol implementations as case studies.