{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:15:43Z","timestamp":1758845743800,"version":"3.32.0"},"reference-count":74,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":4473,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1994,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>We have developed a user\u2010friendly CAD graphical tool for the design, verification, simulation, and synthesis of protocols based on an interactive tool for Petri net and state diagram designs. Special features of this tool are: the capability of modeling both control and data flows, reduction and analysis, simulation of network behavior and performance, coding (parametrized protocols and automatic implementation), synthesis (two party protocol and ordinary Petri nets), animation and flexible design. Since it is Petri\u2010net based, it allows simulation during all design phases and has extensive applications such as parallel debugging and simulation, expert systems, etc. Future enhancements of this tool are also discussed.<\/jats:p>","DOI":"10.1002\/spe.4380240805","type":"journal-article","created":{"date-parts":[[2006,11,17]],"date-time":"2006-11-17T17:06:02Z","timestamp":1163783162000},"page":"747-783","source":"Crossref","is-referenced-by-count":14,"title":["An interactive tool for design, simulation, verification, and synthesis of protocols"],"prefix":"10.1002","volume":"24","author":[{"given":"Daniel Y.","family":"Chao","sequence":"first","affiliation":[]},{"given":"David T.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094696"},{"key":"e_1_2_1_3_2","doi-asserted-by":"crossref","unstructured":"T. Y.ChoiandR. E.Miller \u2018Protocol analysis and synthesis by structured partitions\u2019 Computer Networks and ISDN Systems 1986 88\u201393pp.367\u2013381.","DOI":"10.1016\/0169-7552(86)90042-5"},{"issue":"2","key":"e_1_2_1_4_2","first-page":"88","article-title":"Protocol verification algorithm using reduced reachability analysis","volume":"66","author":"Ito M.","year":"1983","journal-title":"Trans. IECE of Japan"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010313"},{"issue":"1","key":"e_1_2_1_6_2","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/TCOM.1984.1095950","article-title":"Protocol validation by maximal progress state exploration","volume":"32","author":"Gouda M. G.","year":"1984","journal-title":"IEEE Trans. Communications"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(85)90086-8"},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/5001.5002"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233206"},{"volume-title":"Protocol, Specification Testing, and Verification, VIII","year":"1988","author":"Lundy G. M.","key":"e_1_2_1_10_2"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010246"},{"key":"e_1_2_1_12_2","first-page":"65","article-title":"An improved protocol validation technique","volume":"6","author":"Rubin J.","year":"1982","journal-title":"Computer Networks"},{"key":"e_1_2_1_13_2","first-page":"237","volume-title":"Protocol Specification, Testing, and Verification, III","author":"Sidhu D.","year":"1983"},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/26.35374"},{"key":"e_1_2_1_15_2","unstructured":"Z. R.ZhaoandG. V.Bochmann \u2018Reduced reachability analysis of communication protocols: A new approach\u2019 Technical Report Universite de Montreal 1986."},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1147\/rd.221.0060"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094687"},{"key":"e_1_2_1_18_2","unstructured":"D.BrandandP.Zafiropulo \u2018Synthesis of protocols for unlimited number of processes\u2019 Proc. Trends and Application: 1980 Computer Network Protocols Gaithersberg MD 1980."},{"key":"e_1_2_1_19_2","doi-asserted-by":"crossref","unstructured":"R.GotzheinandG. V.Bochmann \u2018Deriving protocol specifications from service specifications: an extended algorithm\u2019 Technical report DIRO Department Universite de Montreal 1986.","DOI":"10.1145\/18172.18190"},{"key":"e_1_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096134"},{"key":"e_1_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/357195.357196"},{"key":"e_1_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1013812.18191"},{"key":"e_1_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/1013812.18198"},{"key":"e_1_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1040119.1040122"},{"key":"e_1_2_1_25_2","first-page":"283","volume-title":"Procotol Specification Testing, and Verification","author":"Sidhu D.","year":"1982"},{"key":"e_1_2_1_26_2","unstructured":"D.Sidhu \u2018Synthesis of communication protocols\u2019 Proc. International Conf. on Communications 82\u2032 Conference Record Philadelphia PA June1982."},{"key":"e_1_2_1_27_2","unstructured":"D. P.SidhuandJ.Aristizabal \u2018Specifying modules for communication protocols\u2019 FIProc. IEEE Global Telecomm. Conf. Houston TX December1986."},{"key":"e_1_2_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.9045"},{"key":"e_1_2_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232547"},{"key":"e_1_2_1_30_2","unstructured":"R. Y.Al\u2010JaarandA. A.Desrochers \u2018A survey of Petri nets in automated manufacturing systems\u2019 IMACS World Congress Vol 2 Paris June1988 pp.503\u2013510."},{"key":"e_1_2_1_31_2","doi-asserted-by":"crossref","unstructured":"C. L.BeckandB. H.Krogh \u2018Models for simulation and discrete control of manufacturing systems\u2019 IEEE International Conference on Robotics and Automation San Francisco California 1986 pp.305\u2013310.","DOI":"10.1109\/ROBOT.1986.1087711"},{"key":"e_1_2_1_32_2","unstructured":"G.BrunaandP.Biglia \u2018Performance evaluation and validation of tool handling in flexible manufacturing systems using Petri nets\u2019 IEEE Int. Workshop on Timed Petri Nets Torino July1985 pp.64\u201371."},{"key":"e_1_2_1_33_2","unstructured":"B. H.KroghandC. L.Beck \u2018Synthesis of place\/transition nets for simulation and control of manufacturing systems\u2019 Proc. 4th IFAC\/IFORS Symp. Large Scale systems Zurich 1986."},{"key":"e_1_2_1_34_2","first-page":"389","volume-title":"Modeling and Design of Manufacturing Systems","author":"Martinez J.","year":"1986"},{"key":"e_1_2_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.1986.351700"},{"volume-title":"\u2018Modeling and Control of Automated Manufacturing Systems\u2019","year":"1990","author":"Desrochers A. A.","key":"e_1_2_1_36_2"},{"journal-title":"IEEE Trans RA.","article-title":"A hybrid methodology for Petri net synthesis of manufacturing systems","author":"Zhou M. C.","key":"e_1_2_1_37_2"},{"key":"e_1_2_1_38_2","doi-asserted-by":"crossref","unstructured":"C. V.Ramamoorthy Y.Yaw W. T.Tsai R.AggarwalandJ.Song \u2018Synthesis and performance evaluation of two\u2010party error\u2010recoverable protocols\u2019 COMSAC Symp. October1986 pp.214\u2013220.","DOI":"10.1145\/18172.18198"},{"key":"e_1_2_1_39_2","unstructured":"T. Y.Choi \u2018Sequence method for protocol construction\u2019 Proc. Sixth IFIP Int. Symp. Protocol Specification Testing Verification 1986 pp.307\u2013321."},{"key":"e_1_2_1_40_2","unstructured":"Y.KakudaandY.Wakahara \u2018Component\u2010based synthesis of protocols for unlimited number of processes\u2019 Proc. COMPSAC'87 1988 pp.721\u2013730."},{"key":"e_1_2_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/12.88465"},{"key":"e_1_2_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/12.88467"},{"key":"e_1_2_1_43_2","unstructured":"E. J.CameronandH.Srinidhi \u2018From description to simulation to architecture: an approach to service\u2010driven systems development\u2019 Proc. First Int. Conf. Syst. Integration Morristown NJ April1990."},{"key":"e_1_2_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/12.88474"},{"key":"e_1_2_1_45_2","doi-asserted-by":"crossref","unstructured":"D. M.CohenandT. M.Guinther \u2018The IC system for protocol development\u2019 Proc. ACM Workshop Frontiers in Comput. Commun. Technol. Stowe VT August1987.","DOI":"10.1145\/55482.55505"},{"key":"e_1_2_1_46_2","unstructured":"D. M.Cohen T. M.GuintherandL.Ness \u2018Rapid prototyping of a communication protocol using a new parallel language\u2019 Proc. First Int. Conf. Syst. Integration Morristown NJ April1990."},{"key":"e_1_2_1_47_2","unstructured":"C.NormanandH. N.Srinidhi \u2018The parallel executable specification language L.0 and its real world applications\u2019 Bellcors Tech. Rep. TM\u2010STS\u2010015895 11 January1990."},{"key":"e_1_2_1_48_2","unstructured":"S.Aggarwal F. S.DwoerkandP.Obenour \u2018An environment for studying switching system software architecture\u2019 Proc. IEEE GLOBECOM Hollywood FL. November1988."},{"key":"e_1_2_1_49_2","unstructured":"A. L. P.Chen E. J.Cameron G.ShuttleworthandE. C.Anderson \u2018A simulation approach for network operations performance studies\u2019 Proc. Twelfth Annu. Int. Comput. Software Appl. Conf. Chicago IL. October1988."},{"key":"e_1_2_1_50_2","unstructured":"Y.Yaw \u2018Analysis and synthesis of distributed systems and protocols\u2019 Ph.D. Dissertation Dept. EECS U.C. Berkeley 1987."},{"key":"e_1_2_1_51_2","unstructured":"Y.Yaw C. V.RamamoorthyandW. T.Tsai \u2018A synthesis technique for designing concurrent systems\u2019 Second Parallel Processing Symposium April1988 pp.143\u2013166."},{"key":"e_1_2_1_52_2","unstructured":"Y.Yaw C. V.RamamoorthyandW. T.Tsai \u2018Synthesis rules for cyclic interactions among processes in concurrent systems\u2019 COMPSAC Symp.October1988 pp.496\u2013504."},{"key":"e_1_2_1_53_2","doi-asserted-by":"crossref","unstructured":"Y.YawandF. L.Foun \u2018The algorithm of a synthesis technique for concurrent systems\u2019 3rd International Petri Net Conf. December1989 pp.266\u2013276.","DOI":"10.1109\/PNPM.1989.68560"},{"issue":"1","key":"e_1_2_1_54_2","first-page":"1","article-title":"Extending knitting technique to Petri net synthesis of automated manufacturing systems","volume":"37","author":"Chao D. Y.","year":"1994","journal-title":"Computer Journal"},{"journal-title":"International Journal of Flexible Manufacturing Systems.","article-title":"XPN\u2010FMS: a modeling and simulation software for FMS using Petri nets and X Window","author":"Chao D. Y.","key":"e_1_2_1_55_2"},{"key":"e_1_2_1_56_2","doi-asserted-by":"crossref","unstructured":"Y.Yaw B.Wei.C. V.RamamoorthyandW. T.Tsai \u2018Extensions on performance evaluation technique for concurrent systems\u2019 COMPSAC Symp October1988 pp.480\u2013484.","DOI":"10.1109\/CMPSAC.1988.17223"},{"key":"e_1_2_1_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01975673"},{"key":"e_1_2_1_58_2","doi-asserted-by":"crossref","unstructured":"T.AgerwalaandY.Choed\u2010Amphai \u2018A synthesis rule for concurrent systems\u2019 Proc. Design Automation Conference 1978 pp.305\u2013311.","DOI":"10.1109\/DAC.1978.1585190"},{"key":"e_1_2_1_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02023780"},{"key":"e_1_2_1_60_2","unstructured":"M. D.JengandF.DiCesare \u2018A modular synthesis techniques for Petri nets\u2019 1992 Japan\u2010USA Sym. on Flexible Automation 1991 pp.1163\u20131170."},{"key":"e_1_2_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/21.47812"},{"key":"e_1_2_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/21.135693"},{"key":"e_1_2_1_63_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-17179-7_18"},{"key":"e_1_2_1_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90050-3"},{"key":"e_1_2_1_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(83)90029-6"},{"key":"e_1_2_1_66_2","unstructured":"M. C.Zhou F.DicesareandG.Goldbogen \u2018Computer\u2010aided design of discrete event dynamic systems\u2019 1989 Beijing Int. Conf. on CAD and Computer Graphics August1989 pp.766\u2013771."},{"key":"e_1_2_1_67_2","unstructured":"J.EsparzaandM.Silva \u2018Top\u2010down synthesis of live and bounded free choise Petri nets\u2019 Technical Report GISI\u2010RR\u201090.01 Universidad De Zaragoza 1990."},{"key":"e_1_2_1_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/828.322441"},{"key":"e_1_2_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/71.219756"},{"key":"e_1_2_1_70_2","first-page":"19","volume-title":"Checking properties of nets using transformations","author":"Berthelot G.","year":"1985"},{"key":"e_1_2_1_71_2","first-page":"359","volume-title":"Transformations and decompositions of nets","author":"Berthelot G.","year":"1986"},{"key":"e_1_2_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/81.244917"},{"journal-title":"Computer Journal.","article-title":"Conversion and iteration bound of multi\u2010rate data flow graphs","author":"Chao D. Y.","key":"e_1_2_1_73_2"},{"key":"e_1_2_1_74_2","first-page":"265","volume-title":"MASCOTS'93, Simulation Series","author":"Chao D. Y.","year":"1993"},{"volume-title":"Petri Net Theory and the Modeling of Systems","year":"1981","author":"Peterson J. L.","key":"e_1_2_1_75_2"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380240805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380240805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:53:55Z","timestamp":1736639635000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380240805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,8]]},"references-count":74,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1994,8]]}},"alternative-id":["10.1002\/spe.4380240805"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380240805","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"type":"print","value":"0038-0644"},{"type":"electronic","value":"1097-024X"}],"subject":[],"published":{"date-parts":[[1994,8]]}}}