{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T20:47:36Z","timestamp":1698353256845},"reference-count":25,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1990,3,1]],"date-time":"1990-03-01T00:00:00Z","timestamp":636249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1990,3]]},"DOI":"10.1016\/0140-3664(90)90175-g","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T22:34:07Z","timestamp":1060295647000},"page":"83-92","source":"Crossref","is-referenced-by-count":9,"title":["Method of analysing extended finite-state machine specifications"],"prefix":"10.1016","volume":"13","author":[{"given":"Beh\u00e7et","family":"Sarikaya","sequence":"first","affiliation":[]},{"given":"Vassilios","family":"Koukoulidis","sequence":"additional","affiliation":[]},{"given":"Gregor V","family":"Bochmann","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(90)90175-G_BIB1","series-title":"Proc. INFOCOM '88","first-page":"1D.3.1","article-title":"A computer-aided design tool for protocol test design","author":"Barbeau","year":"1988"},{"key":"10.1016\/0140-3664(90)90175-G_BIB2","series-title":"Proc. IFIP 77","first-page":"229","article-title":"A unified method for the specification and verification of protocols","author":"Bochmann","year":"1977"},{"key":"10.1016\/0140-3664(90)90175-G_BIB3","first-page":"361","article-title":"Finite state description of communication protocols","volume":"Vol 2","author":"Bochmann","year":"1978","journal-title":"Comput. Netw."},{"key":"10.1016\/0140-3664(90)90175-G_BIB4","unstructured":"Bochmann, G v \u2018Specifications of a simplified transport protocol using different formal description techniques\u2019 Comput. Netw. ISDN Syst."},{"key":"10.1016\/0140-3664(90)90175-G_BIB5","series-title":"Proc. 7th IFIP Symp. on Protocols","first-page":"139","article-title":"Usage of protocol development tools: the results of a survey","author":"Bochmann","year":"1987"},{"key":"10.1016\/0140-3664(90)90175-G_BIB6","series-title":"Proc. 8th IFIP Symp. on Protocols","first-page":"19","article-title":"Adding performance aspects to specification languages","author":"Bochmann","year":"1988"},{"key":"10.1016\/0140-3664(90)90175-G_BIB7","first-page":"351","article-title":"Verification of protocols using symbolic execution","volume":"Vol 2","author":"Brand","year":"1978","journal-title":"Comput. Netw."},{"issue":"No 1","key":"10.1016\/0140-3664(90)90175-G_BIB8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0169-7552(87)90084-5","article-title":"An introduction to Estelle: a specification language for distributed systems","volume":"Vol 14","author":"Budkowski","year":"1987","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"No 4","key":"10.1016\/0140-3664(90)90175-G_BIB9","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/TSE.1979.234207","article-title":"Symbolic evaluation and the analysis of programs","volume":"Vol SE-5","author":"Cheatham","year":"1979","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/0140-3664(90)90175-G_BIB10","series-title":"Program Flow Analysis","article-title":"Symbolic evaluation methods for program analysis","author":"Clarke","year":"1981"},{"key":"10.1016\/0140-3664(90)90175-G_BIB11","series-title":"Proc. 8th Symp. on Protocols","first-page":"171","article-title":"Estelle\u2217: a powerful dialect of Estelle for OSI protocol description","author":"Courtiat","year":"1988"},{"key":"10.1016\/0140-3664(90)90175-G_BIB12","series-title":"Estelle: A FDT based on an extended state transition model","year":"1988"},{"key":"10.1016\/0140-3664(90)90175-G_BIB13","series-title":"Proc. SIGCOMM '83","first-page":"68","article-title":"Maximal progress state exploration","author":"Gouda","year":"1983"},{"key":"10.1016\/0140-3664(90)90175-G_BIB14","series-title":"A survey on FIFO nets","author":"Finkel","year":"1987"},{"key":"10.1016\/0140-3664(90)90175-G_BIB15","series-title":"Lotos: A FDT based on the temporal ordering of observational behaviour","year":"1988"},{"key":"10.1016\/0140-3664(90)90175-G_BIB16","article-title":"Full implementation of a test design methodology for protocol testing","author":"Koukoulidis","year":"1989"},{"issue":"No 1","key":"10.1016\/0140-3664(90)90175-G_BIB17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/357195.357196","article-title":"On the construction of submodule specification and communication protocols","volume":"Vol 5","author":"Merlin","year":"1983","journal-title":"ACM TOPLAS"},{"key":"10.1016\/0140-3664(90)90175-G_BIB18","first-page":"65","article-title":"An improved protocol validation technique","volume":"Vol 6","author":"Rubin","year":"1982","journal-title":"Comput. Netw."},{"key":"10.1016\/0140-3664(90)90175-G_BIB19","article-title":"Test design for computer network protocols","author":"Sarikaya","year":"1984"},{"key":"10.1016\/0140-3664(90)90175-G_BIB20","series-title":"Technical Report","article-title":"A formal description based test generation tool","author":"Sarikaya","year":"1988"},{"key":"10.1016\/0140-3664(90)90175-G_BIB21","first-page":"710","article-title":"A test design methodology for protocol testing","author":"Sarikaya","year":"1987","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/0140-3664(90)90175-G_BIB22","series-title":"Proc. COMNET '85","first-page":"601","article-title":"Obtaining normal form specifications for protocols","author":"Sarikaya","year":"1985"},{"key":"10.1016\/0140-3664(90)90175-G_BIB23","series-title":"Specification and description language (SDL) \u2014 CCITT Recommendation Z100 Geneva, Switzerland","year":"1987"},{"issue":"No 4","key":"10.1016\/0140-3664(90)90175-G_BIB24","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1109\/TCOM.1980.1094687","article-title":"Towards analyzing and synthesizing protocols","volume":"Vol COM-28","author":"Zafiropoulo","year":"1980","journal-title":"IEEE Trans. Comm."},{"key":"10.1016\/0140-3664(90)90175-G_BIB25","series-title":"Proc. 6th IFIP Workshop on Protocols","first-page":"243","article-title":"Reduced reachability analysis of communication protocols: a new approach","author":"Zhao","year":"1986"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649090175G?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649090175G?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T08:28:01Z","timestamp":1552638481000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014036649090175G"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,3]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1990,3]]}},"alternative-id":["014036649090175G"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(90)90175-g","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1990,3]]}}}