{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:55:47Z","timestamp":1725551747285},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540297970"},{"type":"electronic","value":"9783540322504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11576280_12","type":"book-chapter","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T14:01:26Z","timestamp":1130162486000},"page":"156-172","source":"Crossref","is-referenced-by-count":6,"title":["Sweep-Line Analysis of TCP Connection Management"],"prefix":"10.1007","author":[{"given":"Guy Edward","family":"Gallasch","sequence":"first","affiliation":[]},{"given":"Bing","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Billington","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Allman, M., Paxson, V., Stevens, W.: TCP Congestion Control. RFC 2581 (April 1999)","DOI":"10.17487\/rfc2581"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-27755-2_6","volume-title":"Lectures on Concurrency and Petri Nets","author":"J. Billington","year":"2004","unstructured":"Billington, J., Gallasch, G.E., Han, B.: A Coloured Petri Net Approach to Protocol Verification. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) Lectures on Concurrency and Petri Nets. LNCS, vol.\u00a03098, pp. 210\u2013290. Springer, Heidelberg (2004)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Braden, R.: Requirements for Internet Host \u2013 Communication Layers. RFC 1122 (October 1989)","DOI":"10.17487\/rfc1122"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Burdett, D.: Internet Open Trading Protocol - IOTP Version 1.0. RFC 2801, IETF (April 2000)","DOI":"10.17487\/rfc2801"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/3-540-45319-9_31","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Christensen","year":"2001","unstructured":"Christensen, S., Kristensen, L.M., Mailund, T.: A Sweep-Line Method for State Space Exploration. In: Margaria, T., Yi, W. (eds.) TACAS 2001. LNCS, vol.\u00a02031, pp. 450\u2013464. Springer, Heidelberg (2001)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Stewart, R., et al.: Stream Control Transmission Protocol. RFC 2960 (October 2000)","DOI":"10.17487\/rfc2960"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Paxson, V., et al.: Known TCP Implementation Problems. RFC 2525 (March 1999)","DOI":"10.17487\/rfc2525"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Floyd, S.: HighSpeed TCP for Large Congestion Windows. RFC 3649 (December 2003)","DOI":"10.17487\/rfc3649"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Floyd, S., Henderson, T.: The NewReno Modification to TCP\u2019s Fast Recovery Algorithm. RFC 2582 (April 1999)","DOI":"10.17487\/rfc2582"},{"key":"12_CR10","unstructured":"Gallasch, G.E., Ouyang, C., Billington, J., Kristensen, L.M.: Experimenting with Progress Mappings for the Application of the Sweep-Line Analysis fo the Internet Open Trading Protocol. In: Fifth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, University of Aarhus. Department of Computer Science (2004), Available via http:\/\/www.daimi.au.dk\/CPnets\/workshop04\/cpn\/papers\/"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-48068-4_12","volume-title":"Application and Theory of Petri Nets 2002","author":"S. Gordon","year":"2002","unstructured":"Gordon, S., Kristensen, L.M., Billington, J.: Verification of a Revised WAP Wireless Transaction Protocol. In: Esparza, J., Lakos, C.A. (eds.) ICATPN 2002. LNCS, vol.\u00a02360, pp. 182\u2013202. Springer, Heidelberg (2002)"},{"key":"12_CR12","unstructured":"Han, B.: Formal Specification of the TCP Service and Verification of TCP Connection Management. PhD thesis, Computer Systems Engineering Centre, School of Electrical and Information Engineering, University of South Australia, Adelaide, Australia (December 2004)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/11494744_14","volume-title":"Applications and Theory of Petri Nets 2005","author":"B. Han","year":"2005","unstructured":"Han, B., Billington, J.: Termination Properties of TCP\u2019s Connection Management Procedures. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol.\u00a03536, pp. 228\u2013249. Springer, Heidelberg (2005)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Braden, R.: TCP Extensions for Long Delay Paths. RFC 1072 (October 1988)","DOI":"10.17487\/rfc1072"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Braden, R., Borman, D.: TCP Extensions for High Performance. RFC 1323 (May 1992)","DOI":"10.17487\/rfc1323"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Braden, R., Zhang, L.: TCP Extension for High-Speed Paths. RFC 1185 (October 1990)","DOI":"10.17487\/rfc1185"},{"key":"12_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-60794-3","volume-title":"Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol.\u00a01, Basic Concepts","author":"K. Jensen","year":"1997","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol.\u00a01, Basic Concepts, 2nd edn. Springer, Heidelberg (1997)","edition":"2"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Kohler, E., Handley, M., Floyd, S.: Datagram Congestion Control Protocol. draft-ietf-dccp-spec-11 (March 2005)","DOI":"10.17487\/rfc4340"},{"issue":"2","key":"12_CR19","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s100090050021","volume":"2","author":"L.M. Kristensen","year":"1998","unstructured":"Kristensen, L.M., Christensen, S., Jensen, K.: The Practitioner\u2019s Guide to Coloured Petri Nets. International Journal on Software Tools for Technology Transfer\u00a02(2), 98\u2013132 (1998)","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/3-540-45614-7_31","volume-title":"FME 2002: Formal Methods - Getting IT Right","author":"L.M. Kristensen","year":"2002","unstructured":"Kristensen, L.M., Mailund, T.: A Generalised Sweep-Line Method for Safety Properties. In: Eriksson, L.-H., Lindsay, P.A. (eds.) FME 2002. LNCS, vol.\u00a02391, pp. 549\u2013567. Springer, Heidelberg (2002)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Postel, J.: Transmission Control Protocol. RFC 793 (September 1981)","DOI":"10.17487\/rfc0793"},{"issue":"6","key":"12_CR22","first-page":"346","volume":"2","author":"C.A. Sunshine","year":"1978","unstructured":"Sunshine, C.A., Dalal, Y.K.: Connection Management in Transport Protocols. Computer Networks\u00a02(6), 346\u2013350 (1978)","journal-title":"Computer Networks"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-65306-6_21","volume-title":"Lectures on Petri Nets I: Basic Models","author":"A. Valmari","year":"1998","unstructured":"Valmari, A.: The State Explosion Problem. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol.\u00a01491, pp. 429\u2013528. Springer, Heidelberg (1998)"},{"key":"12_CR24","volume-title":"TCP\/IP Illustrated, Vol.\u00a02 : The Implementation","author":"G.R. Wright","year":"1995","unstructured":"Wright, G.R., Stevens, W.R.: TCP\/IP Illustrated, Vol.\u00a02: The Implementation. Addison-Wesley, Reading (1995)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11576280_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:59:31Z","timestamp":1605643171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11576280_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297970","9783540322504"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11576280_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}