{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:54:55Z","timestamp":1743033295181,"version":"3.40.3"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031626449"},{"type":"electronic","value":"9783031626456"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62645-6_10","type":"book-chapter","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:01:51Z","timestamp":1718168511000},"page":"177-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Network Simulator-Centric Compositional Testing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9590-3241","authenticated-orcid":false,"given":"Tom","family":"Rousseaux","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8635-2098","authenticated-orcid":false,"given":"Christophe","family":"Crochet","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7213-146X","authenticated-orcid":false,"given":"John","family":"Aoga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2287-8925","authenticated-orcid":false,"given":"Axel","family":"Legay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"10_CR1","unstructured":"https:\/\/groups.google.com\/g\/ns-3-users\/c\/NyX71jXHgr4?pli=1. Accessed 12 Oct 2023"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Bernardeschi, C., Dini, G., Palmieri, M., Racciatti, F.: A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks. J. Comput. Virol. Hacking Tech. 17(3), 249\u2013263 (2021). https:\/\/doi.org\/10.1007\/s11416-021-00392-0","DOI":"10.1007\/s11416-021-00392-0"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.Y.: Implementing TLS with verified cryptographic security. In: 2013 IEEE Symposium on Security and Privacy, pp. 445\u2013459. IEEE (2013)","DOI":"10.1109\/SP.2013.37"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3243650","volume":"66","author":"S Bishop","year":"2018","unstructured":"Bishop, S., et al.: Engineering with logic: rigorous test-oracle specification and validation for TCP\/IP and the sockets API. J. ACM (JACM) 66(1), 1\u201377 (2018)","journal-title":"J. ACM (JACM)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Black, D.L.: RFC 8311: relaxing restrictions on explicit congestion notification (ECN) experimentation, January 2018. https:\/\/datatracker.ietf.org\/doc\/html\/rfc8311","DOI":"10.17487\/RFC8311"},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/0169-7552(87)90085-7","volume":"14","author":"T Bolognesi","year":"1987","unstructured":"Bolognesi, T., Brinksma, E.: Introduction to the ISO specification language LOTOS. Comput. Netw. ISDN Syst. 14(1), 25\u201359 (1987)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Bolognesi, T., Lucidi, F.: A timed full LOTOS with time\/action tree semantics. In: Theories and Experiences for Real-Time System Development, pp. 205\u2013237. World Scientific (1994)","DOI":"10.1142\/9789812831583_0008"},{"issue":"2","key":"10_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0920-5489(94)90002-7","volume":"16","author":"T Bolognesi","year":"1994","unstructured":"Bolognesi, T., Lucidi, F., Trigila, S.: Converging towards a timed LOTOS standard. Comput. Stand. Interfaces 16(2), 87\u2013118 (1994)","journal-title":"Comput. Stand. Interfaces"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-40196-1_12","volume-title":"Quantitative Evaluation of Systems","author":"B Boyer","year":"2013","unstructured":"Boyer, B., Corre, K., Legay, A., Sedwards, S.: PLASMA-lab: a flexible, distributable statistical model checking library. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 160\u2013164. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40196-1_12"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Bozic, J., Marsso, L., Mateescu, R., Wotawa, F.: A formal TLS handshake model in LNT. In: 3rd Workshop on Models for Formal Analysis of Real Systems and 6th International Workshop on Verification and Program Transformation, MARSVPT 2018, pp. 1\u201340 (2018)","DOI":"10.4204\/EPTCS.268.1"},{"issue":"5","key":"10_CR11","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/2.841785","volume":"33","author":"L Breslau","year":"2000","unstructured":"Breslau, L., et al.: Advances in network simulation. Computer 33(5), 59\u201367 (2000)","journal-title":"Computer"},{"key":"10_CR12","unstructured":"Cadar, C., Dunbar, D., Engler, D.R., et\u00a0al.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: OSDI, vol.\u00a08, pp. 209\u2013224 (2008)"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Cappart, Q., Limbr\u00e9e, C., Schaus, P., Quilbeuf, J., Traonouez, L.M., Legay, A.: Verification of interlocking systems using statistical model checking. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 61\u201368 (2017). https:\/\/doi.org\/10.1109\/HASE.2017.10","DOI":"10.1109\/HASE.2017.10"},{"key":"10_CR14","unstructured":"Cardwell, N., Cheng, Y., Yeganeh, S.H., Swett, I., Jacobson, V.: BBR congestion control. https:\/\/datatracker.ietf.org\/doc\/html\/draft-cardwell-iccrg-bbr-congestion-control"},{"key":"10_CR15","unstructured":"Christian Huitema: picoquic. https:\/\/github.com\/private-octopus\/picoquic, 4f11445"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-319-96142-2_26","volume-title":"Computer Aided Verification","author":"A Chudnov","year":"2018","unstructured":"Chudnov, A., et al.: Continuous formal verification of Amazon S2N. In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10982, pp. 430\u2013446. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96142-2_26"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Clarke, E.M., Donz\u00e9, A., Legay, A.: On simulation-based probabilistic model checking of mixed-analog circuits. Formal Methods Syst. Des. 36(2), 97\u2013113 (2010). https:\/\/doi.org\/10.1007\/S10703-009-0076-Y","DOI":"10.1007\/S10703-009-0076-Y"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BFb0025774","volume-title":"Logics of Programs","author":"EM Clarke","year":"1982","unstructured":"Clarke, E.M., Emerson, E.A.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol. 131, pp. 52\u201371. Springer, Heidelberg (1982). https:\/\/doi.org\/10.1007\/BFb0025774"},{"key":"10_CR19","unstructured":"Clarke, E.M., Grumberg, O., Kroening, D., Peled, D.A., Veith, H.: Model Checking, 2nd edn. MIT Press (2018). https:\/\/mitpress.mit.edu\/books\/model-checking-second-edition"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Classen, A., Heymans, P., Schobbens, P.Y., Legay, A.: Symbolic model checking of software product lines. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 321\u2013330 (2011)","DOI":"10.1145\/1985793.1985838"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Crochet, C., Rousseaux, T., Piraux, M., Sambon, J.F., Legay, A.: Verifying QUIC implementations using Ivy. In: Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (2021). https:\/\/doi.org\/10.1145\/3488660.3493803","DOI":"10.1145\/3488660.3493803"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10009-014-0361-y","volume":"17","author":"A David","year":"2015","unstructured":"David, A., Larsen, K.G., Legay, A., Miku\u010dionis, M., Poulsen, D.B.: Uppaal SMC tutorial. Int. J. Softw. Tools Technol. Transfer 17, 397\u2013415 (2015)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"De Coninck, Q., Bonaventure, O.: Multipath QUIC. In: Proceedings of the 13th International Conference on Emerging Networking EXperiments and Technologies. ACM, November 2017. https:\/\/doi.org\/10.1145\/3143361.3143370","DOI":"10.1145\/3143361.3143370"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Floyd, S., Ramakrishnan, D.K.K., Black, D.L.: RFC 3168: the addition of explicit congestion notification (ECN) to IP, September 2001. https:\/\/datatracker.ietf.org\/doc\/html\/rfc3168","DOI":"10.17487\/rfc3168"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Fujimoto, R.M.: Parallel and distributed simulation systems. In: Proceeding of the 2001 Winter Simulation Conference (Cat. No. 01CH37304), vol.\u00a01, pp. 147\u2013157. IEEE (2001)","DOI":"10.1109\/WSC.2001.977259"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Fujimoto, R.M., Riley, G.F., Perumalla, K.S.: Network Simulators. Springer, Cham (2007). https:\/\/doi.org\/10.1007\/978-3-031-79977-8","DOI":"10.1007\/978-3-031-79977-8"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Holzmann, G.J.: The model checker SPIN. IEEE Trans. Software Eng. 23(5), 279\u2013295 (1997). https:\/\/doi.org\/10.1109\/32.588521","DOI":"10.1109\/32.588521"},{"key":"10_CR28","doi-asserted-by":"publisher","unstructured":"Issariyakul, T., Hossain, E., Issariyakul, T., Hossain, E.: Introduction to Network Simulator (NS2). Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-71760-9","DOI":"10.1007\/978-0-387-71760-9"},{"key":"10_CR29","unstructured":"Iyengar, J., Swett, I.: RFC 9002. https:\/\/www.rfc-editor.org\/rfc\/rfc9002.html"},{"key":"10_CR30","unstructured":"Iyengar, J., Swett, I., K\u00fchlewind, M.: QUIC acknowledgement frequency. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-ack-frequency-05"},{"key":"10_CR31","unstructured":"Iyengar, J., Thomson, M.: RFC 9000. https:\/\/www.rfc-editor.org\/rfc\/rfc9000"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Jansen, R., Hopper, N.J.: Shadow: running tor in a box for accurate and efficient experimentation (2011)","DOI":"10.21236\/ADA559181"},{"key":"10_CR33","unstructured":"Jansen, R., Newsome, J., Wails, R.: Co-opting Linux processes for high-performance network simulation. In: 2022 USENIX Annual Technical Conference (USENIX ATC 22), pp. 327\u2013350. USENIX Association, Carlsbad, CA, July 2022. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/jansen"},{"key":"10_CR34","doi-asserted-by":"publisher","unstructured":"Katoen, J.P.: The probabilistic model checking landscape. In: Proceedings of the 31st Annual ACM\/IEEE Symposium on Logic in Computer Science, LICS 2016, pp. 31\u201345. Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2933575.2934574","DOI":"10.1145\/2933575.2934574"},{"key":"10_CR35","doi-asserted-by":"publisher","unstructured":"Kumar, R., Stoelinga, M.: Quantitative security and safety analysis with attack-fault trees. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 25\u201332 (2017). https:\/\/doi.org\/10.1109\/HASE.2017.12","DOI":"10.1109\/HASE.2017.12"},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-030-61362-4_18","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles","author":"KG Larsen","year":"2020","unstructured":"Larsen, K.G., Legay, A.: 30 years of statistical model checking. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12476, pp. 325\u2013330. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61362-4_18"},{"key":"10_CR37","unstructured":"Larsen, K.G., Mikucionis, M., Nielsen, B.: UPPAAL TRON User Manual. CISS, BRICS, Aalborg University, Aalborg, Denmark (2009)"},{"issue":"4","key":"10_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2714565","volume":"17","author":"H Lee","year":"2015","unstructured":"Lee, H., Seibert, J., Fistrovic, D., Killian, C., Nita-Rotaru, C.: Gatling: automatic performance attack discovery in large-scale distributed systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1\u201334 (2015)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Legay, A., Sedwards, S.: On statistical model checking with plasma. In: The 8th International Symposium on Theoretical Aspects of Software Engineering (2014)","DOI":"10.1109\/TASE.2014.20"},{"issue":"3","key":"10_CR40","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0169-7552(96)00078-5","volume":"29","author":"L L\u00e9onard","year":"1997","unstructured":"L\u00e9onard, L., Leduc, G.: An introduction to ET-LOTOS for the description of time-sensitive systems. Comput. Netw. ISDN Syst. 29(3), 271\u2013292 (1997)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Li, Y., Pierce, B.C., Zdancewic, S.: Model-based testing of networked applications. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 529\u2013539 (2021)","DOI":"10.1145\/3460319.3464798"},{"key":"10_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-319-54876-0_3","volume-title":"Risks and Security of Internet and Systems","author":"R Lounas","year":"2017","unstructured":"Lounas, R., Jafri, N., Legay, A., Mezghiche, M., Lanet, J.-L.: A formal verification of safe update point detection in dynamic software updating. In: Cuppens, F., Cuppens, N., Lanet, J.-L., Legay, A. (eds.) CRiSIS 2016. LNCS, vol. 10158, pp. 31\u201345. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54876-0_3"},{"key":"10_CR43","doi-asserted-by":"publisher","unstructured":"McMillan, K.L.: Symbolic Model Checking. Kluwer (1993). https:\/\/doi.org\/10.1007\/978-1-4615-3190-6","DOI":"10.1007\/978-1-4615-3190-6"},{"key":"10_CR44","doi-asserted-by":"publisher","unstructured":"McMillan, K.L., Padon, O.: Ivy: a multi-modal verification tool for distributed algorithms. Comput. Aided Verification, 190\u2013202 (2020). https:\/\/doi.org\/10.1007\/978-3-030-53291-8_12","DOI":"10.1007\/978-3-030-53291-8_12"},{"key":"10_CR45","doi-asserted-by":"publisher","unstructured":"McMillan, K.L., Zuck, L.D.: Compositional testing of internet protocols. In: 2019 IEEE Cybersecurity Development (SecDev) (2019). https:\/\/doi.org\/10.1109\/secdev.2019.00031","DOI":"10.1109\/secdev.2019.00031"},{"key":"10_CR46","doi-asserted-by":"publisher","unstructured":"McMillan, K.L., Zuck, L.D.: Formal specification and testing of QUIC. In: Proceedings of the ACM Special Interest Group on Data Communication (2019). https:\/\/doi.org\/10.1145\/3341302.3342087","DOI":"10.1145\/3341302.3342087"},{"issue":"239","key":"10_CR47","first-page":"2","volume":"2014","author":"D Merkel","year":"2014","unstructured":"Merkel, D.: Docker: lightweight Linux containers for consistent development and deployment. Linux J. 2014(239), 2 (2014)","journal-title":"Linux J."},{"key":"10_CR48","doi-asserted-by":"publisher","unstructured":"Michel, F., De\u00a0Coninck, Q., Bonaventure, O.: QUIC-FEC: bringing the benefits of forward erasure correction to QUIC. In: 2019 IFIP Networking Conference (IFIP Networking), pp.\u00a01\u20139 (2019). https:\/\/doi.org\/10.23919\/IFIPNetworking.2019.8816838","DOI":"10.23919\/IFIPNetworking.2019.8816838"},{"key":"10_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-319-41528-4_5","volume-title":"Computer Aided Verification","author":"VC Ngo","year":"2016","unstructured":"Ngo, V.C., Legay, A., Joloboff, V.: PSCV: a runtime verification tool for probabilistic SystemC models. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9779, pp. 84\u201391. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41528-4_5"},{"key":"10_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-46852-8_30","volume-title":"\u00abUML\u00bb\u201999 \u2014 The Unified Modeling Language","author":"J Offutt","year":"1999","unstructured":"Offutt, J., Abdurazik, A.: Generating tests from UML specifications. In: France, R., Rumpe, B. (eds.) UML 1999. LNCS, vol. 1723, pp. 416\u2013429. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-46852-8_30"},{"issue":"6","key":"10_CR51","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1145\/2980983.2908118","volume":"51","author":"O Padon","year":"2016","unstructured":"Padon, O., McMillan, K.L., Panda, A., Sagiv, M., Shoham, S.: Ivy: safety verification by interactive generalization. ACM SIGPLAN Not. 51(6), 614\u2013630 (2016). https:\/\/doi.org\/10.1145\/2980983.2908118","journal-title":"ACM SIGPLAN Not."},{"key":"10_CR52","doi-asserted-by":"crossref","unstructured":"Paris, J., Arts, T.: Automatic testing of TCP\/IP implementations using QuickCheck. In: Proceedings of the 8th ACM SIGPLAN Workshop on Erlang, pp. 83\u201392 (2009)","DOI":"10.1145\/1596600.1596612"},{"key":"10_CR53","doi-asserted-by":"publisher","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October\u20131 November 1977, pp. 46\u201357. IEEE Computer Society (1977). https:\/\/doi.org\/10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"key":"10_CR54","doi-asserted-by":"crossref","unstructured":"Rath, F., Schemmel, D., Wehrle, K.: Interoperability-guided testing of QUIC implementations using symbolic execution. In: Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC, pp. 15\u201321 (2018)","DOI":"10.1145\/3284850.3284853"},{"key":"10_CR55","doi-asserted-by":"crossref","unstructured":"Rhee, I., Xu, L., Ha, S., Zimmermann, A., Eggert, L., Scheffenegger, R.: RFC 8312: cubic for fast long-distance networks, February 2018. https:\/\/datatracker.ietf.org\/doc\/html\/rfc8312","DOI":"10.17487\/RFC8312"},{"key":"10_CR56","doi-asserted-by":"publisher","unstructured":"Riley, G.F., Henderson, T.R.: The ns-3 network simulator. In: Wehrle, K., G\u00fcne\u015f, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 15\u201334. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12331-3_2","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"10_CR57","doi-asserted-by":"crossref","unstructured":"Tazaki, H., et al.: Direct code execution: revisiting library OS architecture for reproducible network experiments. In: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, pp. 217\u2013228 (2013)","DOI":"10.1145\/2535372.2535374"},{"key":"10_CR58","unstructured":"Thomson, M., Turner, S.: RFC 9001. https:\/\/www.rfc-editor.org\/rfc\/rfc9001.html"},{"key":"10_CR59","unstructured":"Tretmans, G., van\u00a0de Laar, P.: Model-based testing with TorXakis: the mysteries of Dropbox revisited (2019)"},{"key":"10_CR60","doi-asserted-by":"publisher","unstructured":"Varga, A.: OMNeT++. In: Wehrle, K., G\u00fcne\u015f, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 35\u201359. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12331-3_3","DOI":"10.1007\/978-3-642-12331-3_3"},{"key":"10_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-78917-8_2","volume-title":"Formal Methods and Testing","author":"M Veanes","year":"2008","unstructured":"Veanes, M., Campbell, C., Grieskamp, W., Schulte, W., Tillmann, N., Nachmanson, L.: Model-based testing of object-oriented reactive systems with spec explorer. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) Formal Methods and Testing. LNCS, vol. 4949, pp. 39\u201376. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78917-8_2"},{"key":"10_CR62","unstructured":"V\u00f6lker, T., Volodina, E., T\u00fcxen, M., Rathgeb, E.P.: A QUIC simulation model for INET and its application to the acknowledgment ratio issue. In: 2020 IFIP Networking Conference (Networking), pp. 737\u2013742. IEEE (2020)"},{"key":"10_CR63","doi-asserted-by":"publisher","unstructured":"Volodina, E., Rathgeb, E.P.: Impact of ack scaling policies on QUIC performance. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 41\u201348 (2021). https:\/\/doi.org\/10.1109\/LCN52139.2021.9524947","DOI":"10.1109\/LCN52139.2021.9524947"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62645-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T17:01:59Z","timestamp":1732208519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62645-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031626449","9783031626456"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62645-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The artefacts of this paper are available at.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Artefacts"}},{"value":"FORTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Techniques for Distributed Objects, Components, and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"forte2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}