{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T22:18:06Z","timestamp":1726525086212},"reference-count":100,"publisher":"Elsevier BV","issue":"17","license":[{"start":{"date-parts":[[1999,6,1]],"date-time":"1999-06-01T00:00:00Z","timestamp":928195200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[1999,6]]},"DOI":"10.1016\/s1389-1286(99)00063-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T08:08:22Z","timestamp":1027584502000},"page":"1835-1872","source":"Crossref","is-referenced-by-count":46,"title":["Test development for communication protocols: towards automation"],"prefix":"10.1016","volume":"31","author":[{"given":"R.","family":"Dssouli","sequence":"first","affiliation":[]},{"given":"K.","family":"Saleh","sequence":"additional","affiliation":[]},{"given":"E.","family":"Aboulhamid","sequence":"additional","affiliation":[]},{"given":"A.","family":"En-Nouaary","sequence":"additional","affiliation":[]},{"given":"C.","family":"Bourhfir","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(99)00063-8_BIB1","unstructured":"A. Aho et al., An optimization technique for protocol conformance test generation based on uio sequences and rural chinese postman tours, in: S. Aggarwal, K.K. Sabnani (Eds.), Protocol Specification, Testing and Verification VIII, North-Holland, Amsterdam, 1988."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB2","doi-asserted-by":"crossref","unstructured":"B. Algayres, Y. Lejeune, F. Hugonnet, GOAL: observing SDL behaviors with object code, in: Proc. 7th SDL Forum, Oslo, Norway, September 1995.","DOI":"10.1016\/B978-0-444-82269-7.50023-X"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB3","doi-asserted-by":"crossref","unstructured":"R. Alur, C. Courcoubetis, N. Halbwachs, D. Dill, H. Wong-Toi, Minimization of timed transition systems, in: Third International Conference on Concurrency Theory, 1992, pp. 340\u2013354.","DOI":"10.1007\/BFb0084802"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB4","doi-asserted-by":"crossref","unstructured":"R. Alur, D. Dill, Automata for modeling real-time systems, in: 17th ICALP (International Colloquium on Automata, Languages, and Programming), 1990, pp. 322\u2013335.","DOI":"10.1007\/BFb0032042"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB5","doi-asserted-by":"crossref","unstructured":"R. Alur, D. Dill, A theory of timed automata, Theoretical Computer Science 126 (1994) 183\u2013235.","DOI":"10.1016\/0304-3975(94)90010-8"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB6","unstructured":"B. Beizer, Software Testing Techniques, Van Nostrand Reinhold Electrical\/Computer Science and Engineering Series, 1983."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB7","doi-asserted-by":"crossref","unstructured":"G. Bernot, M.C. Gaudel, B. Marre, Software testing based on formal specifications: a theory and a tool, Software Engineering Journal (1991) 387\u2013405.","DOI":"10.1049\/sej.1991.0040"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB8","doi-asserted-by":"crossref","unstructured":"G. v. Bochmann, Protocol specification for OSL, Computer Networks and ISDN Systems 18 (1989) 167\u2013184.","DOI":"10.1016\/0169-7552(90)90132-C"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB9","unstructured":"G. v. Bochmann et al., Fault model in testing, in: R.J. Heijink, J. Kroon, E. Brinksma (Eds.), IFIP Transactions, Protocol Test Systems, IV (Proc. IFIP TC6 4th International Workshop on Protocol Test Systems, 1991) North-Holland, Amsterdam, 1992, pp. 17\u201330."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB10","unstructured":"G. v. Bochmann, A. Das, R. Dssouli, M. Dubuc, A. Ghedamsi, G. Luo, Fault model in testing, in: Proc. International Workshop on Protocol Test System (IWPTS'91), Leidschendam, the Netherlands, 1991."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB11","doi-asserted-by":"crossref","unstructured":"G. v. Bochmann, R. Dssouli, J.R. Zhao, Trace analysis for conformance and arbitration testing, IEEE Transactions on Software Engineering SE-15 (1989) 1347\u20131356.","DOI":"10.1109\/32.41328"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB12","doi-asserted-by":"crossref","unstructured":"G. v. Bochmann, A. Petrenko, O. Bellal, S. Maguiraga, Automating the process of test derivation from SDL specifications, in: Proc. Eighth SDL Forum, Evry, France, September 1997.","DOI":"10.1016\/B978-044482816-3\/50018-6"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB13","doi-asserted-by":"crossref","unstructured":"C. Bourhfir, R. Dssouli, El M. Aboulhamid, N. Rico, A guided incremental test case generation procedure for conformance testing CEFSM specified protocols, in: A. Petrenko, N. Yevtushenko (Eds.), IFIP International Workshop on Testing Communicating Systems 98, Chapman and Hall, London, 1998.","DOI":"10.1007\/978-0-387-35381-4_17"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB14","unstructured":"E. Brinksma, A theory of the derivation of tests, in: S. Aggarwal, K.K. Sabnani (Eds.), Protocol Specification, Testing and Verification VIII, North-Holland, Amsterdam, 1988, pp. 63\u201374."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB15","unstructured":"L. Bromstrup, D. Hogrefe, TESDL: Experience with generating test cases from SDL specifications, in: Proc. 4th SDL Forum, 1989."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB16","doi-asserted-by":"crossref","unstructured":"A. Cavalli, B.M. Chin, K. Chon, Testing methods for SDL systems, Computer Networks and ISDN Systems 28 (1996) 1669\u20131683.","DOI":"10.1016\/0169-7552(95)00125-5"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB17","doi-asserted-by":"crossref","unstructured":"A. Cavalli, J-P. Favreau, M. Falippou, Standardization of formal methods in conformance testing of communication protocols, Computer Networks and ISDN Systems 29 (1996) 3\u201314.","DOI":"10.1016\/S0169-7552(96)00015-3"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB18","doi-asserted-by":"crossref","unstructured":"A. Cavalli, B. Lee, T. Macavei, Test generation for the SSCOP-ATM network protocol, in: Proc. SDL FORUM'97, Evry, France, Elsevier, 1997.","DOI":"10.1016\/B978-044482816-3\/50019-8"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB19","unstructured":"A.R. Cavalli, R. Anido, Verification and testing techniques based on finite state machine model, Research Report 97-09-02 INT, France, 1997."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB20","unstructured":"CCITT, Specification and Description Language (SDL), Recommendation Z.100, International Standard Z.100, CCITT, Gen\u00e8ve, 1993."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB21","doi-asserted-by":"crossref","unstructured":"S.T. Chanson, J. Zhu, A unified approach to protocol test sequence generation, in: IEEE INFOCOM, San Francisco, CA, 1993.","DOI":"10.1109\/INFCOM.1993.253243"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB22","doi-asserted-by":"crossref","unstructured":"S.T. Chanson, J. Zhu, Automatic protocol test suite derivation, in: IEEE, 1994.","DOI":"10.1109\/INFCOM.1994.337659"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB23","unstructured":"O. Charles, Application des hypoth\u00e8s de test \u00e0 une d\u00e9finition de la couverture, PhD thesis, Universit\u00e9 Henri Poincar\u00e9-Nancy 1, 1997."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB24","doi-asserted-by":"crossref","unstructured":"T.S. Chow, Testing software design modeled by finite-state machines, IEEE Transactions on Software Engineering SE-4 (1978) 178\u2013187.","DOI":"10.1109\/TSE.1978.231496"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB25","unstructured":"W. Chun, P.D. Amer, Test case generation for protocols specified in ESTELLE, in: FORTE'90, Madrid, Spain, 1990."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB26","doi-asserted-by":"crossref","unstructured":"D. Clarke, I. Lee, Automatic generation of tests for timing constraints from requirements, in: Proc. Third International Workshop on Object-Oriented Real-Time Dependable Systems, Newport Beach, CA, February 1997.","DOI":"10.1109\/WORDS.1997.609955"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB27","doi-asserted-by":"crossref","unstructured":"L.A. Clarke, D.J. Richardson, Applications of symbolic evaluation, Journal of Systems and Software 5 (1985) 15\u201335.","DOI":"10.1016\/0164-1212(85)90004-4"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB28","doi-asserted-by":"crossref","unstructured":"M. Clatin, R. Groz, M. Phalippou, R. Thummel, Two approaches linking a test generation tool with verification techniques, in: Proc. International Workshop on Protocol Test System IFIP, North-Holland, Amsterdam, September 1995.","DOI":"10.1007\/978-0-387-34988-6_10"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB29","doi-asserted-by":"crossref","unstructured":"B. Dasarathy, Timing constraints of real-time systems: constructs for expressing them, IEEE Transactions on Software Engineering 11 (1985) 80\u201386.","DOI":"10.1109\/TSE.1985.231845"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB30","doi-asserted-by":"crossref","unstructured":"J. De Kleer, B.C. Williams, Diagnosing multiple faults, Artificial Intelligence 32 (1984) 97\u2013130.","DOI":"10.1016\/0004-3702(87)90063-4"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB31","doi-asserted-by":"crossref","unstructured":"R. Dechter, J. Pearl, Tree clustering for constraint networks, Artificial Intelligence 38 (1989) 353\u2013366.","DOI":"10.1016\/0004-3702(89)90037-4"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB32","doi-asserted-by":"crossref","unstructured":"R.A. DeMillo, J. Offutt, Constraint-based automatic test data generation, IEEE Transactions on Software Engineering SE-17 (1991).","DOI":"10.1109\/32.92910"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB33","doi-asserted-by":"crossref","unstructured":"D. Dill, Timing assumptions and verification of finite-state concurrent systems, in: 1st CAV (Conference on Computer-Aided Verification) 1989, pp. 197\u2013212.","DOI":"10.1007\/3-540-52148-8_17"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB34","unstructured":"R. Dssouli, Etude des m\u00e9thodes de test pour les implantations de protocoles de communication bas\u00e9es sur les sp\u00e9cifications formelles, PhD thesis, Universit\u00e9 de Montr\u00e9al, 1986."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB35","unstructured":"R. Dssouli, Les facteurs influancant l'observation de fautes dans les logiciels de communication. in: O. Rafiq (Ed.), Actes du Colloque Francophone pour l'Ing\u00e9nierie des Protocoles CFIP'91 (Pau, France), Paris, September 1991."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB36","unstructured":"A. En-Nouaary, R. Dssouli, A. Elqortobi, G\u00e9n\u00e9ration de tests temporis\u00e9s, in: Proc. 6th Colloque Francophone de l'Ing\u00e9nierie des Protocoles, 1997."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB37","unstructured":"A. En-Nouaary, R. Dssouli, F. Khendek, A. Elqortobi, Timed test cases generation based on state characterisation technique, in: 19th IEEE Real-Time Systems Symposium (RTSS'98), Madrid, Spain, December 1998."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB38","doi-asserted-by":"crossref","unstructured":"A. En-Nouaary, H. Fouchal, A. Elqortobi, R. Dssouli, E. Petitjean, Timed testing using clock zone vertices, Technical Report, 1998.","DOI":"10.1109\/REAL.1998.739748"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB39","doi-asserted-by":"crossref","unstructured":"R.E. Fikes, A system for solving problems stated as procedures, Artificial Intelligence 1 (1970) 27\u2013120.","DOI":"10.1016\/0004-3702(70)90003-2"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB40","doi-asserted-by":"crossref","unstructured":"S. Fujiwara, G. v. Bochmann, F. Khendek, M. Amalou, A. Ghedamsi, Test selection based on finite state models, IEEE Transactions on Communications 17 (1991) 591\u2013603.","DOI":"10.1109\/32.87284"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB41","doi-asserted-by":"crossref","unstructured":"M.C. Gaudel, Testing can be formal, too, TAPSOFT, 1995.","DOI":"10.1007\/3-540-59293-8_188"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB42","unstructured":"M.C. Gaudel, Test selection based on ADT specifications, in: Proc. 5th International Workshop on Protocol Test Systems (IWPTS'92), Montreal, Canada, 1998."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB43","unstructured":"A. Ghedamsi, G. v. Bochmann, R. Dssouli, Diagnosing distributed systems modeled by CFSMs, Journal R\u00e9seaux et Informatique R\u00e9partie, France, 1993."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB44","unstructured":"A. Gill, Introduction to the Theory of Finite State Machines, McGraw-Hill, New York, 1962."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB45","doi-asserted-by":"crossref","unstructured":"G. Gonenc, A method for the design of fault detection experiments, IEEE Transactions on Computers C-19 (1970) 551\u2013558.","DOI":"10.1109\/T-C.1970.222975"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB46","unstructured":"J. Grabowski, D. Hogrefe, R. Nahm, A method for the generation of test cases based on SDL and MSC, Technical Report Institut f\u00fcr Informatik, Universit\u00e4t Bern, April 1993."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB47","unstructured":"R. Groz, M. Phalippou, La g\u00e9n\u00e9ration automatique de tests est-elle possible, in: C. Jard, P. Rolin (Eds.), Colloque Francophone sur l'Ingenierie des Protocols CFIP'95, 1995."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB48","unstructured":"T. Higashino, G. v. Bochmann, X. Li, K. Yasumoto, K. Taniguchi, Test system for a restricted class of LOTOS expressions with data parameters, in: Proc. Fifth IFIP International Workshop On Protocol Test Systems (IWPTS'92), North-Holland, Amsterdam, 1992, pp. 205\u2013216."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB49","unstructured":"D. Hogrefe, MUTEST: OSI Formal Specification Case Study: The INRES Protocol and Service, Internal Report, 1992."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB50","doi-asserted-by":"crossref","unstructured":"W.E. Howden, Reliability of the path analysis testing strategy, IEEE Transactions on Software Engineering SE-2 (3) (1976).","DOI":"10.1109\/TSE.1976.233816"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB51","doi-asserted-by":"crossref","unstructured":"W.E. Howden, An evaluation of the effectiveness of symbolic testing, Software Practice and Experience 8 (1978) 381\u2013397.","DOI":"10.1002\/spe.4380080402"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB52","unstructured":"E. Htite, R. Dssouli, G. v. Bochmann, S\u00e9lection des tests \u00e0 partir de sp\u00e9cifications orient\u00e9es objets, in: Proc. Third Maghrebian Conf. on Software Eng. and Art. Intelligence, Rabat, Maroc, April 1994."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB53","unstructured":"S. Htite, R. Dssouli, A. Ghedamsi, Diagnostique automatic avec l'outil MFDT, in: Proc. 6th bi-Annual Colloque Francophone de l'ing\u00e9nierie des Protocoles, Li\u00e8ges, Belgique, 1997."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB54","doi-asserted-by":"crossref","unstructured":"C.M. Huang, Y.C. Lin, M.Y. Jang, Executable data flow and control flow protocol test sequence generation for EFSM-specified protocol, in: International Workshop on Protocol Test Systems (IWPTS), Evry, France, 1995.","DOI":"10.1007\/978-0-387-34988-6_2"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB55","unstructured":"ISO, Information Processing Systems \u2013 Open Systems Interconnection \u2013 LOTOS \u2013 A Formal Description Technique Based on the Temporal Ordering of Observational Behaviour, ISO\/TC97\/SC21\/N DIS8807, 1987."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB56","unstructured":"ISO9646, International Standard 9646, International Organization for Standardization \u2014 Information Technology \u2014 Open Systems Interconnection, Gen\u00e8ve 1991."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB57","doi-asserted-by":"crossref","unstructured":"J. Jaffar, J.L. Lassez, Constraint logic programming system, in: Proc. 14th ACM POPL Conference, Munich, Germany, 1987.","DOI":"10.1145\/41625.41635"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB58","doi-asserted-by":"crossref","unstructured":"J.C. King, T.J. Watson, Symbolic execution and program testing, Communications of the ACM 19 (7) (1976).","DOI":"10.1145\/360248.360252"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB59","unstructured":"Z. Kohavi, Switching and Finite Automata Theory, McGraw-Hill Computer Science Series, New York, 1978."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB60","doi-asserted-by":"crossref","unstructured":"K.G. Larsen, W. Yi, Time abstracted bisimulation: implicit specifications and decidability, in: Proc. Mathematical Foundations of Programming Semantics (MFPS 9), Lecture Notes in Computer Science, vol. 802, Springer, Berlin, 1993.","DOI":"10.1007\/3-540-58027-1_8"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB61","unstructured":"G. Leduc, On the role of implementation relations in the design of distributed system, PhD thesis, Publications de la Facult\u00e9 des Sciences Appliqu\u00e9es de l'Universit\u00e9 de Li\u00e8ge, vol. 130, Li\u00e8ge 1991."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB62","doi-asserted-by":"crossref","unstructured":"D.Y. Lee, J.Y. Lee, A well-defined ESTELLE specification for automatic test generation, IEEE Transactions on Communications 40 (1991) 526\u2013542.","DOI":"10.1109\/12.88471"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB63","doi-asserted-by":"crossref","unstructured":"L.P. Lima, A. Cavalli, A pragmatic approach to generating test sequences for embedded systems, in: Proc. IWTCS'97, Cheju Islands, Korea, 1997.","DOI":"10.1007\/978-0-387-35198-8_18"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB64","unstructured":"F. Liu, Test generation based on an FSM model with timers and counters, Master thesis, D\u00e9partement d'Informatique et de Recherche Op\u00e9rationnelle, Universit\u00e9 de Montr\u00e9al, 1993."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB65","doi-asserted-by":"crossref","unstructured":"G. Luo, G. v. Bochmann, A. Petrenko, Test selection based on communicating nondeterministic finite state machines using a generalised WP-method, IEEE Transactions on Software Engineering SE-20 (2) (1994).","DOI":"10.1109\/32.265636"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB66","doi-asserted-by":"crossref","unstructured":"G. Luo, R. Dssouli, G. v. Bochmann, P. Vankataram, A. Ghedamsi, Test generation with respect to distributed interfaces, Computer Standards and Interfaces 16 (1994) 119\u2013132.","DOI":"10.1016\/0920-5489(94)90003-5"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB67","unstructured":"G. Luo, A. Petrenko, G. v. Bochmann, Selecting test sequences for communicating partially-specified nondeterministic finite state machines, Technical report TR-864 IRO, Universit\u00e9 de Montr\u00e9al, 1993."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB68","doi-asserted-by":"crossref","unstructured":"A.K. Mackworth, Consistency of network relations, Artificial Intelligence 8 (1977) 99\u2013118.","DOI":"10.1016\/0004-3702(77)90007-8"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB69","doi-asserted-by":"crossref","unstructured":"D. Mandrioli, S. Morasca, A. Morzenti, Generating test cases for real-time systems from logic specifications, ACM Transactions on Computer Systems 13 (1995) 365\u2013398.","DOI":"10.1145\/210223.210226"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB70","doi-asserted-by":"crossref","unstructured":"R.E. Miller, S. Paul, Generating conformance test sequences for combined control and data flow of communication protocols, in: Proc. Protocol Specification, Testing, and Verification (PSTV'92), Florida, USA, 1992.","DOI":"10.1016\/B978-0-444-89874-6.50008-8"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB71","doi-asserted-by":"crossref","unstructured":"R. Milner, A Calculus of Communicating Systems, Lecture Notes in Computer Science, vol. 92, Springer, Berlin, 1980.","DOI":"10.1007\/3-540-10235-3"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB72","unstructured":"R. Milner, Communication and Concurrency, Prentice-Hall International, Englewood Cliffs, NJ, 1989."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB73","doi-asserted-by":"crossref","unstructured":"U. Montanari, Networks of constraints: fundamental properties and applications to picture processing, Information Science 7 (1974) 95\u2013132.","DOI":"10.1016\/0020-0255(74)90008-5"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB74","doi-asserted-by":"crossref","unstructured":"L.J. Morell, A theory of fault-based testing, IEEE Transactions on Software Engineering SE-16 (8) (1990).","DOI":"10.1109\/32.57623"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB75","unstructured":"S. Naito, M. Tsunoyama, Fault detection for sequential machines by transition tours, in: Proc. Fault Tolerant Computer Systems, 1981, pp. 238\u2013243."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB76","unstructured":"A. Petrenko, Checking experiments with protocol machines, in: J. Kroon, R. Heijink, E. Brinksma (Eds.), IFIP International Workshop on Protocol Test Systems IV, North-Holland, Amsterdam, 1991."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB77","doi-asserted-by":"crossref","unstructured":"A. Petrenko, N. Yevtushenko, G. v. Bochmann, R. Dssouli, Testing in context: A framework and test derivation, Special Issue on Protocol Engineering of Computer Communication, 1997.","DOI":"10.1016\/S0140-3664(96)01157-7"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB78","unstructured":"M. Phalippou, Relation d'implantation et hypoth\u00e8ses de test sur des automates \u00e0 entr\u00e9es et sorties, PhD thesis, Universit\u00e9 de Bordeaux I, 1994."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB79","unstructured":"D. Pountain, Constraint logic programming, Byte Magazine, February 1995."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB80","doi-asserted-by":"crossref","unstructured":"T. Ramalingom, A. Das, K. Thulasiraman, A unified test case generation method for the EFSM model using context independent unique sequences, in: Proc. International Workshop on Protocol Test System (IWPTS'95), Evry, France, 1995.","DOI":"10.1007\/978-0-387-34988-6_18"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB81","doi-asserted-by":"crossref","unstructured":"C.V. Ramamoorthy, S.B.F. Ho, W.T. Chan, On the automated generation of program test data, IEEE Transactions on Software Engineering SE-2 (4) (1976).","DOI":"10.1109\/TSE.1976.233835"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB82","doi-asserted-by":"crossref","unstructured":"D. Rayner, OSI conformance testing, Computer Networks and ISDN Systems 14 (1987) 79\u201398.","DOI":"10.1016\/0169-7552(87)90087-0"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB83","doi-asserted-by":"crossref","unstructured":"K. Sabnani, A.T. Dahbura, A protocol testing procedure, Computer Networks and ISDN Systems 15 (1988) 285\u2013297.","DOI":"10.1016\/0169-7552(88)90064-5"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB84","doi-asserted-by":"crossref","unstructured":"B. Sarikaya, G. v. Bochmann, Synchronization and specification issues in protocol testing, IEEE Transaction on Communications 32 (1984) 389\u2013395.","DOI":"10.1109\/TCOM.1984.1096074"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB85","doi-asserted-by":"crossref","unstructured":"B. Sarikaya, G. v. Bochmann, E. Cerny, A test methodology for protocol testing, IEEE Transactions on Software Engineering SE-13 (1987) 518\u2013531.","DOI":"10.1109\/TSE.1987.233197"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB86","unstructured":"Y.N. Shen et al., Protocol conformance testing using multiple UIO sequences, in: Protocol Specification, Testing and Verification IX, Twente, Netherlands, 1989."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB87","doi-asserted-by":"crossref","unstructured":"D.P. Sidhu, T.K. Leung, Formal methods for protocol testing: a detailed study, IEEE Transactions on Software Engineering SE-15 (4) (1989).","DOI":"10.1109\/32.16602"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB88","unstructured":"J. Springintveld, F. Vaandrager, P.R. d'Argenio, Testing timed automata, invited talk at TAPSOFT'97, 1997, http:\/\/www.cs.kun.nl\/fvaan\/publications.html"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB89","unstructured":"B. Taylor, Introducing real-time constraints into requirements and high level design of operating systems, in: Proc. 1980 Nat. Telecommunications Conference, Houston, TX, 1980, vol. 1, pp. 18.5.1\u201318.5.5."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB90","unstructured":"Telelogic, ITEX User Manual, 1995."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB91","unstructured":"Telelogic, SDT User Manual, 1995."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB92","unstructured":"J. Tretmans, A formal approach to conformance testing, in: Proc. 6th International Workshop on Protocol Test Systems (IWPTS'93), Pau, France, 1993."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB93","unstructured":"J. Tretmans, Testing labelled transition systems with inputs and outputs, Technical report 95-26, University of Twente, August 1995."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB94","doi-asserted-by":"crossref","unstructured":"H. Ural, B. Yang, A test sequence selection method for protocol testing, IEEE Transactions on Communication 39 (4) (1991).","DOI":"10.1109\/26.81739"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB95","unstructured":"S.T. Vuong, W.W.L. Chan, M.R. Ito, The UIOV method for protocol test sequence generation, in: Proc. 2nd International Workshop on Protocol Test Systems, Berlin, Germany, 1989."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB96","doi-asserted-by":"crossref","unstructured":"E.J. Weyuker, S. Rapps, Selecting software test data using data flow information, IEEE Transactions on Software Engineering SE-11 (4) (1985).","DOI":"10.1109\/TSE.1985.232226"},{"key":"10.1016\/S1389-1286(99)00063-8_BIB97","unstructured":"J.P. Wu, S.T. Chanson, Test sequence derivation based on external behavior expression, in: Proc. 2nd International Workshop on Protocol Test Systems, 1989."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB98","unstructured":"B. Yang, H. Ural, Protocol conformance test generation ising multiple UIO sequences with overlapping, Computer Communication Review 4 (1997) 118\u2013125."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB99","unstructured":"M. Yao, On the development of conformance test suites in view of their fault coverage, PhD thesis, Universit\u00e9 de Montr\u00e9al, D\u00e9partement IRO, 1995."},{"key":"10.1016\/S1389-1286(99)00063-8_BIB100","unstructured":"L.D. Zhang et al., A further optimization technique for conformance testing based on multiple UIO sequences, in: G. v. Bochmann, R. Dssouli, A. Das (Eds.), Protocol Test Systems V (Montreal 1992), North-Holland, Amsterdam, 1993."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128699000638?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128699000638?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T04:37:40Z","timestamp":1578458260000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128699000638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,6]]},"references-count":100,"journal-issue":{"issue":"17","published-print":{"date-parts":[[1999,6]]}},"alternative-id":["S1389128699000638"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(99)00063-8","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[1999,6]]}}}