{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T23:27:09Z","timestamp":1699054029213},"reference-count":25,"publisher":"Elsevier BV","issue":"4-5","license":[{"start":{"date-parts":[[1978,9,1]],"date-time":"1978-09-01T00:00:00Z","timestamp":273456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks (1976)"],"published-print":{"date-parts":[[1978,9]]},"DOI":"10.1016\/0376-5075(78)90017-x","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T19:11:16Z","timestamp":1060283476000},"page":"381-395","source":"Crossref","is-referenced-by-count":10,"title":["Modelling and verification of end-to-end transport protocols"],"prefix":"10.1016","volume":"2","author":[{"given":"A","family":"Danthine","sequence":"first","affiliation":[]},{"given":"J","family":"Bremer","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No. 6","key":"10.1016\/0376-5075(78)90017-X_BIB1","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MC.1974.6323582","article-title":"Interprocess Communication Facilities for Network Operating Systems","volume":"Vol. 7","author":"Akkoynlu","year":"1974","journal-title":"Computer (IEEE)"},{"key":"10.1016\/0376-5075(78)90017-X_BIB2","first-page":"477","article-title":"Finite State Automaton \u2014 Definition of Data Communication Line Control Procedures","volume":"Vol. 37","author":"Bjorner","year":"1970"},{"key":"10.1016\/0376-5075(78)90017-X_BIB3","series-title":"Proc. 4th Data Comm. Symp.","first-page":"7.15","article-title":"Logical Verification and Implementation of Protocols","author":"Bochmann","year":"1975"},{"key":"10.1016\/0376-5075(78)90017-X_BIB4","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/TCOM.1974.1092259","article-title":"A Protocol for Packet Network Intercommunication","author":"Cerf","year":"1974","journal-title":"IEEE Trans. on Comm."},{"key":"10.1016\/0376-5075(78)90017-X_BIB5","first-page":"115","article-title":"D\u00e9finition, repr\u00e9sentation et simulation de protocoles dans un contexte r\u00e9seau","author":"Danthine","year":"1975","journal-title":"Journ. AIM Mini-Ordinateurs et Transmission de donn\u00e9es"},{"key":"10.1016\/0376-5075(78)90017-X_BIB6","series-title":"Proc. ACM Interprocess Comm. Workshop","first-page":"87","article-title":"Communication Protocols in a Network Context","author":"Danthine","year":"1975"},{"key":"10.1016\/0376-5075(78)90017-X_BIB7","series-title":"IFIP-IIASA Workshop on Data Comm.","first-page":"9","article-title":"Host-Host Protocols and Hierarchy","author":"Danthine","year":"1975"},{"key":"10.1016\/0376-5075(78)90017-X_BIB8","series-title":"Rechnernetze und Datenfernverarbeitung","first-page":"259","article-title":"An axiomatic Description of the Transport Protocol of Cyclades","author":"Danthine","year":"1976"},{"key":"10.1016\/0376-5075(78)90017-X_BIB9","series-title":"1st Europ. Workshop on Comp. Networks","first-page":"493","article-title":"A Theory of Colloquies","author":"Le Moli","year":"1973"},{"issue":"No. 5","key":"10.1016\/0376-5075(78)90017-X_BIB10","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/TCOM.1976.1093347","article-title":"A methodology for the Design and Implementation of Communication Protocols","volume":"Vol. Com-24","author":"Merlin","year":"1976","journal-title":"IEEE Trans. Commun."},{"issue":"No. 9","key":"10.1016\/0376-5075(78)90017-X_BIB11","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","article-title":"Recoverability of Communication Protocols. Implications of a Theoretical Study","volume":"Vol. COM-24","author":"Merlin","year":"1976","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0376-5075(78)90017-X_BIB12","first-page":"20","article-title":"On the Recovery of Communication Protocols, ICC 76","volume":"Vol. 11","author":"Merlin","year":"1976"},{"key":"10.1016\/0376-5075(78)90017-X_BIB13","unstructured":"P.M. Metcalfe, Strategies for Interprocess Communication in a Distributed Computing System, Proc. Symp. on Comp. Commun. Networks and Teletraffic, New York, Polytechnic Press, p. 519\u2013528."},{"key":"10.1016\/0376-5075(78)90017-X_BIB14","series-title":"1st Europ. Workshop on Comp. Networks","first-page":"351","article-title":"Designing Colloquies","author":"Mezzalira","year":"1973"},{"key":"10.1016\/0376-5075(78)90017-X_BIB15","first-page":"184","article-title":"A Graph Model Analysis of Computer Communications Protocols","author":"Postel","year":"1974","journal-title":"PhD Dissertation, UCLA-ENG 7410"},{"key":"10.1016\/0376-5075(78)90017-X_BIB16","first-page":"20","article-title":"Formal Representation of Protocols for Computer Networks","author":"Rusbridge","year":"1974","journal-title":"Report AFRE-R-7826, UKAEA, Harwell, England"},{"issue":"No. 2","key":"10.1016\/0376-5075(78)90017-X_BIB17","first-page":"99","article-title":"A Data Transfer Protocol","volume":"Vol. 1","author":"Stenning","year":"1976","journal-title":"Computer Networks"},{"issue":"No. 4","key":"10.1016\/0376-5075(78)90017-X_BIB18","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1145\/356608.356609","article-title":"Data Communication Control Procedures","volume":"Vol. 4","author":"Stutzman","year":"1972","journal-title":"Comput. Surv."},{"key":"10.1016\/0376-5075(78)90017-X_BIB19","first-page":"258","article-title":"Interprocess Communication Protocols for Computer Networks","author":"Sunshine","year":"1975","journal-title":"Stanford Univ., Digital Syst. Lab., Tech. Report 105"},{"key":"10.1016\/0376-5075(78)90017-X_BIB20","series-title":"Symposium Networks: Trend and Appl.","article-title":"Survey of Communications Protocol Verification Techniques","author":"Sunshine","year":"1976"},{"issue":"No. 4","key":"10.1016\/0376-5075(78)90017-X_BIB21","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1145\/361284.361288","article-title":"A System for Interprocess Communication in a Resource Sharing Computer Network","volume":"Vol. 15","author":"Walden","year":"1972","journal-title":"Commun. ACM"},{"key":"10.1016\/0376-5075(78)90017-X_BIB22","unstructured":"C.H. West, An Automated Technique of Communications Protocol Validation, ICC 77."},{"key":"10.1016\/0376-5075(78)90017-X_BIB23","unstructured":"P. Zafiropulo, A New Approach to Protocol Validation, ICC 77."},{"key":"10.1016\/0376-5075(78)90017-X_BIB24","series-title":"Proc. 4th Data Comm. Symp.","first-page":"7.21","article-title":"The Cyclades End-to-End Protocol","author":"Zimmermann","year":"1975"},{"key":"10.1016\/0376-5075(78)90017-X_BIB25","first-page":"10","article-title":"Rapporteur. Report on Project 17, Communication Systems Architecture and End-to-End Protocols","author":"Zimmermann","year":"1977","journal-title":"ISO\/TC 97\/SC6N1417"}],"container-title":["Computer Networks (1976)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:037650757890017X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:037650757890017X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T03:50:59Z","timestamp":1552621859000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/037650757890017X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978,9]]},"references-count":25,"journal-issue":{"issue":"4-5","published-print":{"date-parts":[[1978,9]]}},"alternative-id":["037650757890017X"],"URL":"https:\/\/doi.org\/10.1016\/0376-5075(78)90017-x","relation":{},"ISSN":["0376-5075"],"issn-type":[{"value":"0376-5075","type":"print"}],"subject":[],"published":{"date-parts":[[1978,9]]}}}