Distributed Feature Composition: A Virtual Architecture for Telecommunications Services
IEEE Transactions on Software Engineering
An open architecture for next-generation telecommunication services
ACM Transactions on Internet Technology (TOIT)
Address translation in telecommunication features
ACM Transactions on Software Engineering and Methodology (TOSEM)
A layered naming architecture for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Separate handles from names on the internet
Communications of the ACM - The semantic e-business vision
Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis
A formal model of addressing for interoperating networks
FM'05 Proceedings of the 2005 international conference on Formal Methods
IEEE Communications Magazine
An axiomatic basis for communication
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Requirements for routing in the application layer
COORDINATION'07 Proceedings of the 9th international conference on Coordination models and languages
ICTAC'10 Proceedings of the 7th International colloquium conference on Theoretical aspects of computing
Towards formalizing network architectural descriptions
ABZ'10 Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
ParAlloy: towards a framework for efficient parallel analysis of alloy models
ABZ'10 Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
Dynamite: A tool for the verification of alloy models based on PVS
ACM Transactions on Software Engineering and Methodology (TOSEM)
Hi-index | 0.00 |
This paper considers network services that bind identifiers in the course of delivering messages, and also persistent, point-to-point connections made in the context of such bindings. Five patterns represent the different ways that identifier binding can be accomplished. A formal model incorporating these patterns is used to compare the properties of the patterns, to define desirable network properties related to identifier binding, and to establish sufficient conditions for guaranteeing them. The results provide new insights into connections between mobile endpoints.