{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:05:53Z","timestamp":1725663953277},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540581840"},{"type":"electronic","value":"9783540484776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58184-7_94","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T10:27:55Z","timestamp":1330252075000},"page":"109-121","source":"Crossref","is-referenced-by-count":0,"title":["Protocol validation: A parallel technique to reduce the reachability tree"],"prefix":"10.1007","author":[{"given":"Abderrahim","family":"Benslimane","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"10_CR1","first-page":"34","volume-title":"An Algebraic Approach to Validate Communication Protocols","author":"A. Benslimane","year":"1992","unstructured":"A. Benslimane, \u201c An Algebraic Approach to Validate Communication Protocols\u201d Proc. of the Third workshop on the Future Trends of Distributed Computing Systems, Taipei Taiwan, IEEE Computer Society Press, (14\u201316 April 1992), pp. 34\u201340."},{"key":"10_CR2","first-page":"361","volume":"N\u21342","author":"G. V. Bochmann","year":"1978","unstructured":"G. V. Bochmann, \u201c Finite State Description of Communication Protocols\u201d Computer Networks, N\u21342, (1978), pp. 361\u2013372.","journal-title":"Computer Networks"},{"issue":"N\u21342","key":"10_CR3","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D. Brand","year":"1983","unstructured":"D. Brand and P. Zafiropulo, \u201cOn Communicating Finite-State Machines\u201d Journal of the Association for Computing Machinery, vol. 30, N\u2134 2, (April 1983), pp. 323\u2013342.","journal-title":"Journal of the Association for Computing Machinery"},{"issue":"N\u21344","key":"10_CR4","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1109\/TCOM.1980.1094686","volume":"COM-28","author":"A.S. Danthine","year":"1980","unstructured":"A.S. Danthine, \u201cProtocol Representation with Finite State Models\u201d, IEEE Trans. on Commun., Vol. COM-28, N\u2134 4, (April 1980), pp. 632\u2013642.","journal-title":"IEEE Trans. on Commun."},{"issue":"N\u21341","key":"10_CR5","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/TCOM.1984.1095950","volume":"COM-32","author":"M.G. Gouda","year":"1984","unstructured":"M.G. Gouda and Y.T. Yu, \u201cProtocol Validation by Maximal Progress State Exploration\u201d IEEE Trans. on Commun., Vol. COM-32, N\u2134 1, (January 1984), pp. 94\u201397.","journal-title":"IEEE Trans. on Commun."},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/S0019-9958(84)80014-5","volume":"63","author":"M.G. Gouda","year":"1984","unstructured":"M.G. Gouda, E.G. Manning, and Y.T. Yu, \u201cOn the Progress of Communication between Two Finite State Machines\u201d, Information and Control 63, (1984), pp. 200\u2013216.","journal-title":"Information and Control"},{"issue":"N\u21348","key":"10_CR7","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1109\/TC.1982.1676079","volume":"C-31","author":"G.J. Holzmann","year":"1982","unstructured":"G.J. Holzmann, \u201cA Theory for Protocol Validation\u201d IEEE Trans. on Comp., Vol. C-31, N\u2134 8, (August 1982), pp. 730\u2013738.","journal-title":"IEEE Trans. on Comp."},{"issue":"N\u21342","key":"10_CR8","first-page":"88","volume":"E-60","author":"M. Itho","year":"1983","unstructured":"M. Itho and H. Ichikawa, \u201cProtocol Verification Algorithm Using Reduced Reachability Analysis\u201d Trans. of the IECE of Japan, Vol. E-60, N\u2134 2, (February 1983), pp. 88\u201393.","journal-title":"Trans. of the IECE of Japan"},{"issue":"N\u21348","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/32.7616","volume":"14","author":"Y. Kakuda","year":"1988","unstructured":"Y. Kakuda, Y. Wakahara and M. Norigoe, \u201cAn Acyclic Expansion Algorithm for Fast Protocol Validation\u201d IEEE Trans. on Soft. Eng., Vol 14, N\u2134 8, (August 1988), pp. 1059\u20131069.","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"10_CR10","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/S0022-0000(69)80011-5","volume":"3","author":"R.M. Karp","year":"1969","unstructured":"R.M. Karp and R.E. Miller, \u201cParallel Program Schemata\u201d Journal of Comp. Syst. and Sci., Vol. 3, (1969), pp. 147\u2013195.","journal-title":"Journal of Comp. Syst. and Sci."},{"issue":"N\u21346","key":"10_CR11","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TCOM.1976.1093347","volume":"COM-24","author":"P.M. Merlin","year":"1976","unstructured":"P.M. Merlin, \u201cA Methodology for the Design and Implementation of Communication Protocols\u201d, IEEE Trans. on Commun., Vol. COM-24, N\u2134 6, (June 1976), pp. 614\u2013621.","journal-title":"IEEE Trans. on Commun."},{"issue":"11","key":"10_CR12","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1109\/TCOM.1979.1094323","volume":"COM-27","author":"P. M. Merlin","year":"1979","unstructured":"P. M. Merlin, \u201cSpecification and validation of protocols\u201d, IEEE Trans. Commun., COM-27, 11, pp 1671\u20131680, Nov. 1979.","journal-title":"IEEE Trans. Commun."},{"key":"10_CR13","unstructured":"J. L. Peterson, \u201cIn Petri net theory and the modeling of systems\u201d. Prentice Hall, 1981."},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/0376-5075(82)90029-0","volume":"6","author":"J. Rubin","year":"1982","unstructured":"J. Rubin and C.H. West, \u201cAn Improved Protocol Validation Technique\u201d Computer Networks, 6, (1982), pp. 65\u201373.","journal-title":"Computer Networks"},{"key":"10_CR15","unstructured":"C.A. Sunshine, \u201cFormal Modeling of Communication Protocols\u201d Computer Networks and Simulation II, S. Schoemaker (ed.), North-Holland Publishing Compagny, (1982), pp. 53\u201375."},{"issue":"N\u21344","key":"10_CR16","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1147\/rd.224.0393","volume":"22","author":"C.H. West","year":"1978","unstructured":"C.H. West, \u201cGeneral Technique for Communications Protocol Validation\u201d IBM J. Res. Devel., Vol. 22, N\u2134 4, (July 1978), pp. 393\u2013404.","journal-title":"IBM J. Res. Devel."},{"issue":"N\u21348","key":"10_CR17","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TCOM.1978.1094227","volume":"COM-26","author":"P. Zafiropulo","year":"1978","unstructured":"P. Zafiropulo, \u201cProtocol Validation by Duologue-Matrix Analysis\u201d IEEE Trans. on Commun., Vol. COM-26, N\u2134 8, (August 1978), pp. 1187\u20131194.","journal-title":"IEEE Trans. on Commun."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1109\/TCOM.1980.1094687","volume":"COM 28","author":"P. Zafiropulo","year":"1980","unstructured":"P. Zafiropulo, C.H. West, H. Rudin, D.D. Cowan and D. Brand, \u201cTowards analyzing and synthesizing protocols\u201d, IEEE transactions on communication, Vol. COM 28, pp 651\u2013661, April 1980.","journal-title":"IEEE transactions on communication"},{"key":"10_CR19","unstructured":"J. Zhao and G.V. Bochmann, \u201cReduced Reachability Analysis of Communication Protocols: A new approach\u201d PSTV, VI, B. Sarikaya and G.V. Bochmann (ed.), North-Holland Pub. Compagny IFIP, (1987), pp. 243\u2013254."},{"key":"10_CR20","unstructured":"A. Benslimane \u201cContribution \u00e0 la Validation des Protocoles: r\u00e9duction de l'espace d'\u00e9tats et d\u00e9cidabilit\u00e9 du caract\u00e8re born\u00e9\u201d Th\u00e8se de docteur de l'Universit\u00e9 de Franche-Comt\u00e9, (1993)."},{"key":"10_CR21","unstructured":"E. Chabbar \u201cEtude et Analyse de la communication des processus\u201d LaBRI, Universit\u00e9 de Bordeaux I, Rapport de recherche intern N\u2134 I-8918, (1989)."},{"key":"10_CR22","unstructured":"L. Cacciari and O. Rafiq \u201cOn Improving Reduced Reachability Analysis\u201d FORTE'92, Perros-Guirec France, (13\u201316 September 1992), pp.1\u20136."}],"container-title":["Lecture Notes in Computer Science","PARLE'94 Parallel Architectures and Languages Europe"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58184-7_94.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:12:24Z","timestamp":1619557944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58184-7_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540581840","9783540484776"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-58184-7_94","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}