{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:37:45Z","timestamp":1725557865843},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201755"},{"type":"electronic","value":"9783540399797"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39979-7_14","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T18:52:22Z","timestamp":1277232742000},"page":"209-223","source":"Crossref","is-referenced-by-count":6,"title":["How Stop and Wait Protocols Can Fail over the Internet"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Billington","sequence":"first","affiliation":[]},{"given":"Guy Edward","family":"Gallasch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"CCITT Recommendation Z.100, Functional Specification and Description Language (SDL) (2002)"},{"key":"14_CR2","unstructured":"FSM Library, AT&T Research Labs, \n                  \n                    http:\/\/www.research.att.com\/sw\/tools\/fsm\/"},{"key":"14_CR3","unstructured":"Internet Engineering Task Force, \n                  \n                    http:\/\/www.ietf.org"},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1006\/inco.1996.0053","volume":"127","author":"P. Aziz Abdulla","year":"1996","unstructured":"Aziz Abdulla, P., Jonsson, B.: Verifying Programs with Unreliable Channels. Information and Computation\u00a0127(2), 91\u2013101 (1996)","journal-title":"Information and Computation"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/RELDIS.1989.72751","volume-title":"Proceedings of the 8th Symposium on Reliable Distributed Systems","author":"Y. Afek","year":"1989","unstructured":"Afek, Y., Brown, G.M.: Self-Stabilization of the Alternating Bit Protocol. In: Proceedings of the 8th Symposium on Reliable Distributed Systems, pp. 80\u201383. IEEE Comput. Soc. Press, Los Alamitos (1989)"},{"key":"14_CR6","unstructured":"Barrett, W.A., Couch, J.D.: Compiler Construction: Theory and Practice. Science Research Associates (1979)"},{"key":"14_CR7","first-page":"299","volume-title":"Encyclopedia of Microcomputers","author":"J. Billington","year":"1991","unstructured":"Billington, J.: Formal specification of protocols: Protocol Engineering. In: Encyclopedia of Microcomputers, vol.\u00a07, pp. 299\u2013314. Marcel Dekker, New York (1991)"},{"key":"14_CR8","unstructured":"Billington, J., Gallasch, G.E.: An Investigation of the Properties of Stop-and-Wait Protocols over Channels which can Re-order messages. Technical Report 15, Computer Systems Engineering Centre, School of Electrical and Information Engineering, University of South Australia, Australia (2003)"},{"issue":"1","key":"14_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/0169-7552(87)90085-7","volume":"14","author":"T. Bolognesi","year":"1987","unstructured":"Bolognesi, T., Brinksma, E.: Introduction to the ISO Specification Language LOTOS. Comput. Networks and ISDN Sys.\u00a014(1), 25\u201359 (1987)","journal-title":"Comput. Networks and ISDN Sys."},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0169-7552(87)90084-5","volume":"14","author":"S. Budkowski","year":"1987","unstructured":"Budkowski, S., Dembinski, P.: An Introduction to Estelle: A Specification Language for Distributed Systems. Comput. Networks and ISDN Sys.\u00a014(1), 3\u201323 (1987)","journal-title":"Comput. Networks and ISDN Sys."},{"key":"14_CR11","first-page":"3","volume-title":"Protocol Specification, Testing and Verification, V","author":"C.A. Vissers","year":"1986","unstructured":"Vissers, C.A., Logrippo, L.: The Importance of the Service Concept in the Design of Data Communications Protocols. In: Protocol Specification, Testing and Verification, V, pp. 3\u201317. North Holland, Amsterdam (1986)"},{"key":"14_CR12","unstructured":"CCITT. ISDN user-network interface data link layer specification. Technical report, Draft Recommendation Q.921, Working Party XI\/6, Issue 7 (January 1984)"},{"issue":"4","key":"14_CR13","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/242223.242257","volume":"28","author":"E.M. Clarke","year":"1996","unstructured":"Clarke, E.M., Wing, J.M.: Formal Methods: State of the Art and Future Directions. ACM Computing Surveys\u00a028(4), 626\u2013643 (1996)","journal-title":"ACM Computing Surveys"},{"key":"14_CR14","unstructured":"CPN ML: An Extension of Standard ML, \n                  \n                    http:\/\/www.daimi.au.dk\/designCPN\/sml\/cpnml.html"},{"key":"14_CR15","volume-title":"Protocol Specification, Testing and Verification","author":"M. Diaz","year":"1982","unstructured":"Diaz, M.: Modelling and Analysis of Communication and Co-operation Protocols Using Petri Net Based Models. In: Protocol Specification, Testing and Verification. North-Holland, Amsterdam (1982)"},{"key":"14_CR16","volume-title":"Design and Validation of Computer Protocols","author":"G.J. Holzmann","year":"1991","unstructured":"Holzmann, G.J.: Design and Validation of Computer Protocols. Prentice-Hall International Editions, Englewood Cliffs (1991)"},{"key":"14_CR17","unstructured":"ITU-T. Recommendation X.210, Information Technology - Open Systems Interconnection - Basic Reference Model: Conventions for the Definition of OSI Services (November 1993)"},{"key":"14_CR18","first-page":"301","volume-title":"IEEE Transactions on Software Engineering","author":"J. Billington","year":"1988","unstructured":"Billington, J., Wheeler, G.R., Wilbur-Ham, M.C.: PROTEAN: A High-level Petri Net Tool for the Specification and Verification of Communication Protocols. In: IEEE Transactions on Software Engineering, vol.\u00a014, pp. 301\u2013316. IEEE Press, Los Alamitos (1988)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Application of Petri Nets to Communication Networks","year":"1999","unstructured":"Billington, J., Diaz, M., Rozenberg, G. (eds.): APN 1999. LNCS, vol.\u00a01605. Springer, Heidelberg (1999)"},{"key":"14_CR20","first-page":"59","volume-title":"Protocol Specification, Testing and Verification, V","author":"J. Billington","year":"1986","unstructured":"Billington, J., Wilbur-Ham, M.C., Bearman, M.Y.: Automated Protocol Verification. In: Protocol Specification, Testing and Verification, V, pp. 59\u201370. North Holland, Amsterdam (1986)"},{"key":"14_CR21","series-title":"Basic Concepts","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-06289-0","volume-title":"Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use","author":"K. Jensen","year":"1992","unstructured":"Jensen, K.: Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use. Basic Concepts, vol.\u00a01. Springer, Heidelberg (1992)"},{"issue":"5","key":"14_CR22","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1145\/362946.362970","volume":"12","author":"K.A. Bartlett","year":"1969","unstructured":"Bartlett, K.A., Scantlebury, R.A., Wilkinson, P.T.: A Note on Reliable Full-Duplex Transmission over Half-Duplex Links. Communications of the ACM\u00a012(5), 260\u2013261 (1969)","journal-title":"Communications of the ACM"},{"issue":"2","key":"14_CR23","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s100090050021","volume":"2","author":"L.M. Kristensen","year":"1998","unstructured":"Kristensen, L.M., Christensen, S., Jensen, K.: The Practitioner\u2019s Guide to Coloured Petri Nets. International Journal on Software Tools for Technology Transfer\u00a02(2), 98\u2013132 (1998)","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"14_CR24","unstructured":"Standard ML of New Jersey, \n                  \n                    http:\/\/cm.bell-labs.com\/cm\/cs\/what\/smlnj\/"},{"key":"14_CR25","unstructured":"Design\/CPN Online, \n                  \n                    http:\/\/www.daimi.au.dk\/designCPN\/"},{"key":"14_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03687-7","volume-title":"Elements of Distributed Algorithms: Modelling and Analysis with Petri Nets","author":"W. Reisig","year":"1998","unstructured":"Reisig, W.: Elements of Distributed Algorithms: Modelling and Analysis with Petri Nets, vol.\u00a04. Springer, Heidelberg (1998)"},{"key":"14_CR27","volume-title":"Data and Computer Communications","author":"W. Stallings","year":"2000","unstructured":"Stallings, W.: Data and Computer Communications, 6th edn. Prentice Hall, Englewood Cliffs (2000)","edition":"6"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Steggles, L.J., Kosiuczenko, P.: A Timed Rewriting Logic Semantics for SDL: a case study of the Alternating Bit Protocol. Electronic Notes in Theoretical Computer Science\u00a015 (1998)","DOI":"10.1016\/S1571-0661(05)82554-X"},{"issue":"11","key":"14_CR29","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/32.60315","volume":"16","author":"I. Suzuki","year":"1990","unstructured":"Suzuki, I.: Formal Analysis of the Alternating Bit Protocol by Temporal Petri Nets. IEEE Transactions on Software Engineering\u00a016(11), 1273\u20131281 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"14_CR30","volume-title":"Proceedings of the 32nd Midwest Symposium on Circuits and Systems","author":"I. Suzuki","year":"1990","unstructured":"Suzuki, I.: Specification and Verification of the Alternating Bit Protocol by Temporal Petri Nets. In: Proceedings of the 32nd Midwest Symposium on Circuits and Systems. IEEE Press, Los Alamitos (1990)"},{"key":"14_CR31","volume-title":"Computer Networks","author":"A. Tanenbaum","year":"2003","unstructured":"Tanenbaum, A.: Computer Networks, 4th edn. Prentice Hall, Englewood Cliffs (2003)","edition":"4"},{"key":"14_CR32","unstructured":"The Internet Engineering Task Force. Transmission Control Protocol. RFC 793 (1981)"},{"key":"14_CR33","unstructured":"The Internet Engineering Task Force. TCP Extensions for High Performance. RFC 1323 (1992)"},{"volume-title":"Using Formal Description Techniques: An Introduction to Estelle, Lotos and SDL","year":"1993","key":"14_CR34","unstructured":"Turner, K.J. (ed.): Using Formal Description Techniques: An Introduction to Estelle, Lotos and SDL. John Wiley & Sons, Chichester (1993)"},{"issue":"9","key":"14_CR35","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/2.58215","volume":"23","author":"J.M. Wing","year":"1990","unstructured":"Wing, J.M.: A Specifier\u2019s Introduction to Formal Methods. IEEE Computer\u00a023(9), 8\u201324 (1990)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Networked and Distributed Systems - FORTE 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39979-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T13:28:45Z","timestamp":1547904525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39979-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201755","9783540399797"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39979-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}