Heuristics: intelligent search strategies for computer problem solving
Heuristics: intelligent search strategies for computer problem solving
Mechanical verification and automatic implementation of communication protocols
IEEE Transactions on Software Engineering
Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching
IEEE Transactions on Software Engineering
Reasoning About Probabilistic Behavior in Concurrent Systems
IEEE Transactions on Software Engineering
A discipline for constructing multiphase communication protocols
ACM Transactions on Computer Systems (TOCS)
On Communicating Finite-State Machines
Journal of the ACM (JACM)
Fundamentals of Computer Alori
Fundamentals of Computer Alori
Applications and Limitations of Automated Protocol Validation
Proceedings of the IFIP WG6.1 Second International Workshop on Protocol Specification, Testing and Verification
Issues and Tools for Protocol Specification
Distributed Systems: Methods and Tools for Specification, An Advanced Course, April 3-12, 1984 and April 16-25, 1985 Munich
A decomposition method for the analysis and design of finite state protocols
SIGCOMM '83 Proceedings of the eighth symposium on Data communications
Automated techniques for specification and validation of communications protocols
Automated techniques for specification and validation of communications protocols
Protocol validation in complex systems
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
Timed protocol verification for Estelle-specified protocols
ACM SIGCOMM Computer Communication Review
Generalized fair reachability analysis for cyclic protocols
IEEE/ACM Transactions on Networking (TON)
An Improved Method for Constructing Multiphase Communications Protocols
IEEE Transactions on Computers
Web Recency Maintenance Protocol
IWDC '02 Proceedings of the 4th International Workshop on Distributed Computing, Mobile and Wireless Computing
IEEE/ACM Transactions on Networking (TON)
An incremental specification of the sliding-window protocol
Distributed Computing
Enhancing random walk state space exploration
Proceedings of the 10th international workshop on Formal methods for industrial critical systems
Decidability of the termination problem for completely specified protocols
Distributed Computing
More efficient on-the-fly LTL verification with Tarjan's algorithm
Theoretical Computer Science - Tools and algorithms for the construction and analysis of systems (TACAS 2004)
Formal Verification of Concurrent Systems via Directed Model Checking
Electronic Notes in Theoretical Computer Science (ENTCS)
Resource-Aware Verification Using Randomized Exploration of Large State Spaces
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
Backward validation of communicating complex state machines in web services environments
Distributed and Parallel Databases
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 3
Specification guidelines to avoid the state space explosion problem
FSEN'11 Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering
Research: Throughput efficiency of an enhanced link management procedure
Computer Communications
An approach to cyclic protocol validation
Computer Communications
On constructing communication protocols from component-based service specifications
Computer Communications
Research: Protocol validation by simultaneous reachability analysis
Computer Communications
PPP (P3): an Estelle-based probabilistic partial protocol verification system
Computer Communications
Proceedings of the Winter Simulation Conference
Proceedings of the 2012 Extreme Modeling Workshop
Hi-index | 0.00 |
Reachability analysis has proved to be one of the most effective methods in verifying correctness of communication protocols based on the state transition model. Consequently, many protocol verification tools have been built based on the method of reachability analysis. Nevertheless, it is also well known that state space explosion is the most severe limitation to the applicability of this method. Although researchers in the field have proposed various strategies to relieve this intricate problem when building the tools, a survey and evaluation of these strategies has not been done in the literature. In searching for an appropriate approach to tackling such a problem for a grammar-based validation tool, we have collected and evaluated these relief strategies, and have decided to develop our own from yet another but more systematic approach. The results of our research are now reported in this paper. Essentially, the paper is to serve two purposes: first, to give a survey and evaluation of existing relief strategies; second, to propose a new strategy, called PROVAT (PROtocol VAlidation Testing), which is inspired by the heuristic search techniques in Artificial Intelligence. Preliminary results of incorporating the PROVAT strategy into our validation tool are reviewed in the paper. These results show the empirical evidence of the effectiveness of the PROVAT strategy.