{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:46:43Z","timestamp":1725662803668},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540151975"},{"type":"electronic","value":"9783642702853"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1985]]},"DOI":"10.1007\/978-3-642-70285-3_35","type":"book-chapter","created":{"date-parts":[[2012,2,24]],"date-time":"2012-02-24T15:19:33Z","timestamp":1330096773000},"page":"575-587","source":"Crossref","is-referenced-by-count":7,"title":["Time in Formal Protocol Specifications"],"prefix":"10.1007","author":[{"given":"Harry","family":"Rudin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","first-page":"51","volume-title":"Modelling elapsed time in protocol specification","author":"S Aggarwal","year":"1983","unstructured":"S. Aggarwal and R. P. Kurshan, \u201cModelling elapsed time in protocol specification,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, III, R\u00fcschlikon, Switzerland, May 1983, (North-Holland, Amsterdam, 1983) pp. 51\u201362."},{"key":"35_CR2","first-page":"253","volume-title":"Description, verification, and performance prediction of computer network protocols","author":"WL Bauerfeld","year":"1981","unstructured":"W. L. Bauerfeld, \u201cDescription, verification, and performance prediction of computer network protocols,\u201d Proc. INWG\/NPL Workshop on Protocols, Volume 1, Teddington, England, May 27\u201329, 1981, pp. 253\u2013269."},{"key":"35_CR3","first-page":"1311","volume-title":"Protocol performance prediction","author":"WL Bauerfeld","year":"1983","unstructured":"W. L. Bauerfeld, \u201cProtocol performance prediction,\u201d Proc. International Conference on Communications, IEEE, Boston, Mass., June 20\u201323, 1983, pp. 1311\u20131315."},{"key":"35_CR4","first-page":"519","volume-title":"Analytical techniques for the statistical evaluation of program running time","author":"B Beizer","year":"1970","unstructured":"B. Beizer, \u201cAnalytical techniques for the statistical evaluation of program running time,\u201d Proc. Fall Joint Computer Conference, 1970, pp. 519\u2013524."},{"key":"35_CR5","volume-title":"On the analysis of time-constrained protocols by network flow algorithms","author":"T Bolognesi","year":"1984","unstructured":"T. Bolognesi and H. Rudin, \u201cOn the analysis of time-constrained protocols by network flow algorithms,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, IV, Sky Top, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1984)."},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/TSE.1983.235261","volume":"SE-9","author":"JE Coolahan Jr","year":"1983","unstructured":"J. E. Coolahan, Jr. and N. Roussopoulos, \u201cTiming requirements for time-driven systems using augmented Petri nets,\u201d IEEE Trans. Software Eng., Vol. SE-9, No. 5, Sept. 1983, pp. 603\u2013616.","journal-title":"IEEE Trans. Software Eng."},{"key":"35_CR7","first-page":"419","volume":"6","author":"M Diaz","year":"1982","unstructured":"M. Diaz, \u201cModeling and analysis of communication and cooperation protocols using Petri-net based models,\u201d Computer Networks, Vol. 6, 1982, pp. 419\u2013441.","journal-title":"Computer Networks"},{"key":"35_CR8","volume-title":"PhD. thesis, University of Waterloo","author":"MG Gouda","year":"1978","unstructured":"M. G. Gouda, \u201cProtocol machines: towards a logical theory of communication protocols,\u201d PhD. thesis, University of Waterloo, Jan., 1978 (see especially Chapter 11)."},{"key":"35_CR9","first-page":"166","volume-title":"Performance evaluation of a digital system using a Petri net-like approach","author":"YW Han","year":"1978","unstructured":"Y. W. Han, \u201cPerformance evaluation of a digital system using a Petri net-like approach,\u201d Proc. National Electronics Conference, Chicago, 1978, pp. 166\u2013172."},{"key":"35_CR10","volume-title":"Analyzing the time efficiency of a communication protocol","author":"P Kritzinger","year":"1984","unstructured":"P. Kritzinger, \u201cAnalyzing the time efficiency of a communication protocol,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, IV, Sky Top, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1984)."},{"key":"35_CR11","series-title":"IBM Zurich Research Laboratory Research Report","volume-title":"A performance model of the OSI communication architecture","author":"P Kritzinger","year":"1984","unstructured":"P. Kritzinger, \u201cA performance model of the OSI communication architecture,\u201d IBM Zurich Research Laboratory Research Report, R\u00fcschlikon, Switzerland, Nov., 1984."},{"key":"35_CR12","first-page":"161","volume-title":"Time Petri nets for analyzing and verifying time dependent communication protocols","author":"M Menasche","year":"1983","unstructured":"M. Menasche and B. Berthomieu, \u201cTime Petri nets for analyzing and verifying time dependent communication protocols,\u201d Proc. of the Workshop on Protocol Specification, Testing, and Verification, III, R\u00fcschlikon, Switzerland, May 1983, (North-Holland, Amsterdam, 1983) pp. 161\u2013172."},{"key":"35_CR13","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","volume":"COM-24","author":"P Merlin","year":"1976","unstructured":"P. Merlin and D. J. Farber, \u201cRecoverability of communication protocols: implications of a theoretical study,\u201d IEEE Trans. Commun., Vol. COM-24, Sept. 1976, pp. 1036\u20131043.","journal-title":"IEEE Trans. Commun."},{"key":"35_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-10235-3","volume-title":"A Calculus of Communicating Systems","author":"R Milner","year":"1980","unstructured":"R. Milner, \u201cA Calculus of Communicating Systems,\u201d Lecture Notes in Computer Science, (Springer Verlag, Berlin, 1980)."},{"key":"35_CR15","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/TC.1982.1676110","volume":"C-31","author":"MK Molloy","year":"1982","unstructured":"M. K. Molloy, \u201cPerformance analysis using stochastic Petri nets,\u201d IEEE Trans. Computers, Vol. C-31, Sept. 1982, pp. 913\u2013917.","journal-title":"IEEE Trans. Computers"},{"key":"35_CR16","volume-title":"Algebraic specification-based performance analysis of communication protocols","author":"N Nounou","year":"1984","unstructured":"N. Nounou and Y. Yemini, \u201cAlgebraic specification-based performance analysis of communication protocols,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, TV, Sky Top, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1984)."},{"key":"35_CR17","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/356698.356702","volume":"9","author":"JL Peterson","year":"1977","unstructured":"J. L. Peterson, \u201cPetri Nets,\u201d Computing Surveys, Vol. 9, September 1977, pp. 223\u2013252.","journal-title":"Computing Surveys"},{"key":"35_CR18","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/TSE.1980.230492","volume":"SE-6","author":"CV Ramamoorthy","year":"1980","unstructured":"C. V. Ramamoorthy and G. S. Ho, \u201cPerformance evaluation of asynchronous concurrency systems using Petri nets,\u201d IEEE Trans. Software Eng., Vol. SE-6, Sept. 1980, pp. 440\u2013449.","journal-title":"IEEE Trans. Software Eng."},{"key":"35_CR19","volume-title":"Ph.D. Thesis, M. I. T., Dept. of E. E.","author":"C Ramchandani","year":"1973","unstructured":"C. Ramchandani, \u201cAnalysis of asynchronous concurrent systems by timed Petri nets,\u201d Ph.D. Thesis, M. I. T., Dept. of E. E., AD-775618, July, 1973."},{"key":"35_CR20","volume-title":"Performance analysis using timed Petri nets","author":"RR Razouk","year":"1984","unstructured":"R. R. Razouk and C.V. Phelps, \u201cPerformance analysis using timed Petri nets,\u201d Proc. of the Workshop on Protocol Specification, Testing, and Verification, IV, Sky Top, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1984)."},{"key":"35_CR21","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/TC.1982.1676060","volume":"C-31","author":"H Rudin","year":"1982","unstructured":"H. Rudin and C.H. West, \u201cA validation technique for tightly-coupled protocols,\u201d IEEE Trans. Computers, Vol. C-31, July, 1982, pp. 630\u2013636.","journal-title":"IEEE Trans. Computers"},{"key":"35_CR22","first-page":"373","volume-title":"Proc. Intl. Symposium on Local Computer Networks, Florence, April, 1982","author":"H Rudin","year":"1982","unstructured":"H. Rudin, \u201cValidation of a token-ring protocol,\u201d in Proc. Intl. Symposium on Local Computer Networks, Florence, April, 1982, (North-Holland, Amsterdam, 1982) pp. 373\u2013387."},{"key":"35_CR23","first-page":"257","volume-title":"From formal protocol specification towards automated performance prediction","author":"H Rudin","year":"1983","unstructured":"H. Rudin, \u201cFrom formal protocol specification towards automated performance prediction,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, III, R\u00fcschlikon, Switzerland, May 1983, (North-Holland, Amsterdam, 1983) pp. 257\u2013269."},{"key":"35_CR24","volume-title":"An improved algorithm for estimating protocol performance","author":"H Rudin","year":"1984","unstructured":"H. Rudin, \u201cAn improved algorithm for estimating protocol performance,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, IV, Sky Top, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1984)."},{"key":"35_CR25","volume-title":"An informal overview of formal protocol specification","author":"H Rudin","year":"1985","unstructured":"H. Rudin, \u201cAn informal overview of formal protocol specification,\u201d IEEE Communications Magazine, probably February, 1985."},{"key":"35_CR26","series-title":"Net Theory and Applications, Lecture Notes in Computer Science","first-page":"307","volume-title":"Performance evaluation using nets","author":"J Sifakis","year":"1979","unstructured":"J. Sifakis, \u201cPerformance evaluation using nets,\u201d Net Theory and Applications, Lecture Notes in Computer Science No. 84, (Springer Verlag, Heidelberg, 1979), pp. 307\u2013319."},{"key":"35_CR27","volume-title":"Ph.D. Thesis at University of Essex, England","author":"FJW Symons","year":"1978","unstructured":"F. J. W. Symons, \u201cModeling and analysis of communication protocols using numerical Petri nets,\u201d Ph.D. Thesis at University of Essex, England, May, 1978."},{"key":"35_CR28","first-page":"1356","volume":"71","author":"CA Vissers","year":"1983","unstructured":"C. A. Vissers, R. L. Tenney, and G. V. Bochmann, \u201cFormal Description Techniques,\u201d Special issue on OSI, Proc. IEEE, Vol. 71, No. 12, December, 1983, pp. 1356\u20131364.","journal-title":"Special issue on OSI, Proc. IEEE"},{"key":"35_CR29","first-page":"149","volume-title":"Timed Petri-nets for modelling and analyzing protocols with real-time characteristics","author":"B Walter","year":"1983","unstructured":"B. Walter, \u201cTimed Petri-nets for modelling and analyzing protocols with real-time characteristics,\u201d Proc. Workshop on Protocol Specification, Testing, and Verification, III, R\u00fcschlikon, Switzerland, May 1983, (North-Holland, Amsterdam, 1983) pp. 149\u2013159."},{"key":"35_CR30","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1147\/rd.224.0393","volume":"22","author":"CH West","year":"1978","unstructured":"C.H. West, \u201cGeneral technique for communications protocol validation,\u201d IBM J. Res. Develop., Vol. 22, July 1978, pp. 393\u2013404.","journal-title":"IBM J. Res. Develop."},{"key":"35_CR31","first-page":"585","volume-title":"Analysis of timing aspects of communication computer systems using timed places Petri nets","author":"CY Wong","year":"1984","unstructured":"C. Y. Wong, T. S. Dillon, and K. E. Forward, \u201cAnalysis of timing aspects of communication computer systems using timed places Petri nets,\u201d Proc. Seventh International Conference on Computer Communication, Sydney, October 30 -November 2, 1984, pp. 585\u2013590."},{"key":"35_CR32","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TCOM.1978.1094227","volume":"COM-26","author":"P Zafiropulo","year":"1978","unstructured":"P. Zafiropulo, \u201cProtocol validation by duologue-matrix analysis,\u201d IEEE Trans. Commun., Vol. COM-26, Aug. 1978, pp. 1187\u20131194.","journal-title":"IEEE Trans. Commun."},{"key":"35_CR33","first-page":"88","volume-title":"Timed Petri nets and preliminary performance evaluation","author":"WM Zuberek","year":"1980","unstructured":"W. M. Zuberek, \u201cTimed Petri nets and preliminary performance evaluation,\u201d Proc. 7th Annual IEEE Symposium on Computer Architecture, 1980, pp. 88\u201396."}],"container-title":["Informatik-Fachberichte","Kommunikation in Verteilten Systemen I"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-70285-3_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T22:51:17Z","timestamp":1606258277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-70285-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985]]},"ISBN":["9783540151975","9783642702853"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-70285-3_35","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1985]]}}}