{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T08:24:56Z","timestamp":1698135896216},"reference-count":20,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1986,5,1]],"date-time":"1986-05-01T00:00:00Z","timestamp":515289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks and ISDN Systems"],"published-print":{"date-parts":[[1986,5]]},"DOI":"10.1016\/0169-7552(86)90042-5","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T15:09:00Z","timestamp":1062601740000},"page":"367-381","source":"Crossref","is-referenced-by-count":9,"title":["Protocol analysis and synthesis by structured partitions"],"prefix":"10.1016","volume":"11","author":[{"given":"Tat Y","family":"Choi","sequence":"first","affiliation":[]},{"given":"Raymond E","family":"Miller","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No. 1","key":"10.1016\/0169-7552(86)90042-5_BIB1","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1147\/rd.221.0060","article-title":"Automated Validation of a Communication Protocol: the CCITT X.21 Recommendation","volume":"Vol. 22","author":"West","year":"1978","journal-title":"IBM J. Res. Develop."},{"issue":"No. 4","key":"10.1016\/0169-7552(86)90042-5_BIB2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/TCOM.1980.1094695","article-title":"Executable Description and Validation of SNA","volume":"Vol. COM-48","author":"Schultz","year":"1980","journal-title":"IEEE Transactions on Communications"},{"issue":"No. 7","key":"10.1016\/0169-7552(86)90042-5_BIB3","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TC.1982.1676060","article-title":"A Validation Technique for Tightly Coupled Protocols","volume":"Vol. C-31","author":"Rudin","year":"1982","journal-title":"IEEE Transactions on Computers"},{"issue":"No. 7","key":"10.1016\/0169-7552(86)90042-5_BIB4","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1109\/TCOM.1982.1095652","article-title":"Using Automated Validation Techniques to Detect Lockups in Packet-Switched Networks","volume":"Vol. COM-30","author":"Sherman","year":"1982","journal-title":"IEEE Transactions on Communications"},{"issue":"No. 4","key":"10.1016\/0169-7552(86)90042-5_BIB5","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1109\/TCOM.1980.1094685","article-title":"Formal Methods in Communication Protocol Design","volume":"Vol. COM-18","author":"Bochmann","year":"1980","journal-title":"IEEE Transactions on Communications"},{"key":"10.1016\/0169-7552(86)90042-5_BIB6","first-page":"361","article-title":"Finite State Description of Communication Protocols","volume":"Vol. 2","author":"Bochmann","year":"1978","journal-title":"Computer Networks"},{"issue":"No. 4","key":"10.1016\/0169-7552(86)90042-5_BIB7","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1109\/TCOM.1980.1094686","article-title":"Protocol Representation with Finite State Models","volume":"Vol. COM-48","author":"Danthine","year":"1980","journal-title":"IEEE Transactions on Communications"},{"issue":"No. 2","key":"10.1016\/0169-7552(86)90042-5_BIB8","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/322374.322380","article-title":"On Communicating Finite State Machines","volume":"Vol. 30","author":"Brand","year":"1983","journal-title":"JACM"},{"issue":"No. 4","key":"10.1016\/0169-7552(86)90042-5_BIB9","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1109\/TCOM.1980.1094687","article-title":"Towards Analyzing and Synthesizing Protocols","volume":"Vol. COM-48","author":"Zafiropulo","year":"1980","journal-title":"IEEE Transactions on Communications"},{"issue":"No. 4\/5","key":"10.1016\/0169-7552(86)90042-5_BIB10","first-page":"373","article-title":"Automated Protocol Validation: One Chain of Development","volume":"Vol. 2","author":"Rudin","year":"1978","journal-title":"Computer Networks"},{"issue":"No. 4","key":"10.1016\/0169-7552(86)90042-5_BIB11","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1147\/rd.224.0393","article-title":"General Technique for Communication Protocol Validation","volume":"Vol. 22","author":"West","year":"1978","journal-title":"IBM J. Res. Develop."},{"key":"10.1016\/0169-7552(86)90042-5_BIB12","first-page":"371","article-title":"Validation of Protocols Using State Enumeration: A Summary of Some Experience","volume":"Vol. 1","author":"Rudin","year":"1981"},{"key":"10.1016\/0169-7552(86)90042-5_BIB13","article-title":"A Structured Approach to the Analysis and Design of Finite State Protocols","author":"Choi","year":"1983"},{"key":"10.1016\/0169-7552(86)90042-5_BIB14","volume":"Vol. VIII","year":"1981"},{"key":"10.1016\/0169-7552(86)90042-5_BIB15","volume":"Vol. VIII","year":"1981"},{"key":"10.1016\/0169-7552(86)90042-5_BIB16","first-page":"65","article-title":"An Improved Protocol Validation Technique","volume":"Vol. 6","author":"Rubin","year":"1982","journal-title":"Computer Networks"},{"issue":"No. 6","key":"10.1016\/0169-7552(86)90042-5_BIB17","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/TSE.1984.5010313","article-title":"Closed Covers: To Verify Progress for Communicating Finite State Machines","volume":"Vol. SE-10","author":"Gouda","year":"1984","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/0169-7552(86)90042-5_BIB18","series-title":"NBS Trends and Applications Symposium","first-page":"29","article-title":"Synthesis of Protocols for an Unlimited Number of Processes","author":"Brand","year":"1980"},{"issue":"No. 7","key":"10.1016\/0169-7552(86)90042-5_BIB19","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/TCOM.1984.1096134","article-title":"Synthesis of Communicating Finite State Machines with Guaranteed Progress","volume":"Vol. COM-32","author":"Gouda","year":"1984","journal-title":"IEEE Transactions on Communications"},{"issue":"No. 4","key":"10.1016\/0169-7552(86)90042-5_BIB20","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/6110.214400","article-title":"A Discipline for Constructing Multiphase Communication Protocols","volume":"Vol. 3","author":"Chow","year":"1985","journal-title":"ACM Transactions on Computer Systems"}],"container-title":["Computer Networks and ISDN Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0169755286900425?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0169755286900425?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T12:53:21Z","timestamp":1551099201000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0169755286900425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1986,5]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1986,5]]}},"alternative-id":["0169755286900425"],"URL":"https:\/\/doi.org\/10.1016\/0169-7552(86)90042-5","relation":{},"ISSN":["0169-7552"],"issn-type":[{"value":"0169-7552","type":"print"}],"subject":[],"published":{"date-parts":[[1986,5]]}}}