Hierarchical correctness proofs for distributed algorithms
PODC '87 Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
Parallel program design: a foundation
Parallel program design: a foundation
A lattice-structured proof of a minimum spanning
PODC '88 Proceedings of the seventh annual ACM Symposium on Principles of distributed computing
A compositional approach to superimposition
POPL '88 Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A Relational Notation for State Transition Systems
IEEE Transactions on Software Engineering
Constructing Protocols with Alternative Functions
IEEE Transactions on Computers - Special issue on protocol engineering
Compositional specification and verification of distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
A discipline for constructing multiphase communication protocols
ACM Transactions on Computer Systems (TOCS)
An Improved Method for Constructing Multiphase Communications Protocols
IEEE Transactions on Computers
A Modular Proof of Correctness for a Network Synchronizer (Research Summary)
Proceedings of the 2nd International Workshop on Distributed Algorithms
Proceedings of the 3rd International Workshop on Distributed Algorithms
A decomposition method for the analysis and design of finite state protocols
SIGCOMM '83 Proceedings of the eighth symposium on Data communications
Constraint-based structuring of distributed protocols
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing
Hi-index | 0.00 |
We propose a compositional technique for designing protocols. The technique involves specifying constraints between the events of the component protocols. A constraint may either require synchronization between certain events of the component protocols or may require inhibiting an event in one protocol on the occurrence of an event in another component protocol. We find both types of constraints useful in composing protocols. We demonstrate the applicability of the technique by deriving several protocols. The technique facilitates modular design and verification. Our technique, in conjunction with the sequential composition technique, can be used to design complex protocols.