{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:59:36Z","timestamp":1725544776114},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540341840"},{"type":"electronic","value":"9783540341857"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11754008_13","type":"book-chapter","created":{"date-parts":[[2006,4,26]],"date-time":"2006-04-26T17:22:40Z","timestamp":1146072160000},"page":"197-212","source":"Crossref","is-referenced-by-count":2,"title":["Analyzing the Impact of Protocol Changes on Tests"],"prefix":"10.1007","author":[{"given":"Mahadevan","family":"Subramaniam","sequence":"first","affiliation":[]},{"given":"Zolt\u00e1n","family":"Pap","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/186258.187153","volume-title":"ISSTA 1994: Proceedings of the 1994 ACM SIGSOFT international symposium on Software testing and analysis","author":"G.V. Bochmann","year":"1994","unstructured":"Bochmann, G.V., Petrenko, A.: Protocol testing: review of methods and relevance for software testing. In: ISSTA 1994: Proceedings of the 1994 ACM SIGSOFT international symposium on Software testing and analysis, pp. 109\u2013124. ACM Press, New York (1994)"},{"volume-title":"Conformance testing methodologies and architectures for OSI protocols","year":"1995","key":"13_CR2","unstructured":"Linn, R.J., Uyar, M. (eds.): Conformance testing methodologies and architectures for OSI protocols. IEEE Computer Society Press, Los Alamitos (1995)"},{"issue":"8","key":"13_CR3","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D. Lee","year":"1996","unstructured":"Lee, D., Yiannakakis, M.: Principles and methods of testing finite state machines \u2013 a survey. Proceedings of the IEEE\u00a084(8), 1090\u20131123 (1996)","journal-title":"Proceedings of the IEEE"},{"issue":"5","key":"13_CR4","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TC.2004.1275300","volume":"53","author":"A.Y. Duale","year":"2004","unstructured":"Duale, A.Y., Uyar, M.: A method enabling feasible conformance test sequence generation for efsm models. IEEE Trans. Comput.\u00a053(5), 614\u2013627 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Brand, D., Martin, A., Zafiropulo, P.: On communicating finite state machines. Journal of Associating Computing Machinery, JACM\u00a030(2) (1983)","DOI":"10.1145\/322374.322380"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Peng, W., Purushothaman, S.: Data flow analyses of communicating finite state machines. In: Transactions on Programming Languagaes and Systems TOPLAS, vol.\u00a013 (1991)","DOI":"10.1145\/117009.117015"},{"key":"13_CR7","volume-title":"Design and validation of computer protocols","author":"G.J. Holzmann","year":"1991","unstructured":"Holzmann, G.J.: Design and validation of computer protocols. Prentice-Hall, Inc, Upper Saddle River (1991)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30482-1_30","volume-title":"Formal Methods and Software Engineering","author":"M. Subramaniam","year":"2004","unstructured":"Subramaniam, M., Chundi, P.: Preserving consistency and executability of protocols across updates. In: Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. LNCS, vol.\u00a03308. Springer, Heidelberg (2004)"},{"key":"13_CR9","volume-title":"Software Change Impact Analysis","author":"R.S. Arnold","year":"1996","unstructured":"Arnold, R.S.: Software Change Impact Analysis. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Ryder, B.G., Tip, F.: Change impact analysis for object-oriented programs. In: Proceedings of PASTE 2001 (2001)","DOI":"10.1145\/379605.379661"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Rothermal, G., Harrold, M.J.: A safe, efficient regression test selection technique. ACM Transactions on Software Engineering and Methodology\u00a06(2) (1997)","DOI":"10.1145\/248233.248262"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Subramaniam, M.: Preserving consistency of runtime monitors across protocol changes. In: Proc. of Tenth IEEE International Conference on Engineering of Complex Computer Systems ICECCS (2005)","DOI":"10.1109\/ICECCS.2005.67"},{"key":"13_CR13","unstructured":"Schmitt, M.: Automatic Test Generation Based on Formal Specifications. Ph.d., Georg-August-University of Goettingen (2003)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Kaufmann, M., Martin, A., Pixely, C.: Design constraints in symbolic model checking. In: Proc. of Intl. Conference on Computer-Aided Verification CAV, vol.\u00a0LNCS (1998)","DOI":"10.1007\/BFb0028768"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-40922-X_21","volume-title":"Formal Methods in Computer-Aided Design","author":"K. Shimizu","year":"2000","unstructured":"Shimizu, K., Dill, D.L., Hu, A.J.: Monitor-based formal specification of pci. In: Johnson, S.D., Hunt Jr., W.A. (eds.) FMCAD 2000. LNCS, vol.\u00a01954, pp. 335\u2013353. Springer, Heidelberg (2000)"},{"key":"13_CR16","unstructured":"Bunke, H.: Graph matching: Theoretical foundations, algorithms, and applications. In: Proceedings of Vision Interface 2000, Montreal, pp. 82\u201388 (2000)"},{"issue":"1-2","key":"13_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0020-0255(94)00057-I","volume":"82","author":"J.T.L. Wang","year":"1995","unstructured":"Wang, J.T.L., Zhang, K., Chirn, G.W.: Algorithms for approximate graph matching. Information Sciences\u00a082(1-2), 45\u201374 (1995)","journal-title":"Information Sciences"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Pap, Z., Csopaki, G., Dibuz, S.: On the theory of patching. In: Proceedings of the 3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM, pp. 263\u2013271 (2005)","DOI":"10.1109\/SEFM.2005.31"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Subramaniam, M., Shi, J.: Using dominators to extract protocol contexts. In: Proceedings of the 3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM (2005)","DOI":"10.1109\/SEFM.2005.53"}],"container-title":["Lecture Notes in Computer Science","Testing of Communicating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11754008_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,7]],"date-time":"2023-05-07T06:22:25Z","timestamp":1683440545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11754008_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540341840","9783540341857"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11754008_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}