{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:43:46Z","timestamp":1694627026384},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[1979,11,1]],"date-time":"1979-11-01T00:00:00Z","timestamp":310262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[1979,11]]},"DOI":"10.1109\/tcom.1979.1094323","type":"journal-article","created":{"date-parts":[[2004,4,28]],"date-time":"2004-04-28T20:29:18Z","timestamp":1083184158000},"page":"1671-1680","source":"Crossref","is-referenced-by-count":57,"title":["Specification and Validation of Protocols"],"prefix":"10.1109","volume":"27","author":[{"given":"P.","family":"Merlin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref11b","year":"1978","journal-title":"Proceedings of IBM-University of Newcastle Seminar"},{"key":"ref30b","year":"0"},{"key":"ref11a","author":"dijkstra","year":"0","journal-title":"Two Starvation-free Solutions of a General Exclusion Problem"},{"key":"ref30a","author":"merlin","year":"1977","journal-title":"Consistent state restoration in distributed systems"},{"key":"ref38a","author":"postel","year":"1974","journal-title":"A Graph Model Analysis of Computer Communications Protocols"},{"key":"ref38b","first-page":"65","article-title":"Graph modelling of computer communication protocols","author":"postel","year":"1976","journal-title":"6th Texas Conf Comput Syst"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90016-8"},{"key":"ref29a","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094552"},{"key":"ref44b","year":"1976","journal-title":"A General Graphical Model of Processing Systems Using NPNs A Generalization of Petri Nets"},{"key":"ref44a","author":"symons","year":"1976","journal-title":"Modelling and Analysis of Communication Protocols Using Petri Nets"},{"key":"ref33","article-title":"Graph Theoretic Models of Parallel Computation","author":"miller","year":"1978","journal-title":"Proceedings of IBM-University of Newcastle Seminar"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360253"},{"key":"ref15a","first-page":"256","article-title":"On the Modelling, Analysis and Design of Protocols?A Special Class of Software Structures","author":"gouda","year":"1976","journal-title":"Proc 2nd Internl Conf on Soft Eng"},{"key":"ref15b","article-title":"Protocol Machines: A Concise formal Model and its Automatic Implementation","author":"gouda","year":"1976","journal-title":"Proc Third International Conf on Computer Communications"},{"key":"ref6a","first-page":"229","article-title":"A Unified Method for Specification and Verification of Protocols","author":"bochmann","year":"1977","journal-title":"Proc of IFIP"},{"key":"ref6b","year":"0"},{"key":"ref29b","author":"segall","year":"1978","journal-title":"1978 ICC"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1145\/356698.356702","article-title":"Petri Nets","volume":"9","author":"peterson","year":"1977","journal-title":"ACM Computing Surveys"},{"key":"ref35","year":"0","journal-title":"PDP-11 Peripherals Handbook"},{"key":"ref34","author":"mullery","year":"1975","journal-title":"The Distributed Control of Multiple Copies of Data"},{"key":"ref4b","year":"1976"},{"key":"ref4a","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90015-6"},{"key":"ref37b","first-page":"89","volume":"1","year":"1965","journal-title":"Tech Rep"},{"key":"ref37a","volume":"2","author":"petri","year":"1962","journal-title":"Kommunikation mit Automaten"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093347"},{"key":"ref26a","author":"merlin","year":"1974","journal-title":"A study of the recoverability of computing systems"},{"key":"ref26b","doi-asserted-by":"publisher","DOI":"10.1145\/1499949.1500099"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/362946.362970"},{"key":"ref1","first-page":"281","article-title":"The ALOHA System?Another Alternative for Computer Communications","volume":"37","author":"abramson","year":"1970","journal-title":"AFIPS Conf Proc Fall JT Computer Conf"},{"key":"ref20","article-title":"Events and Conditions","author":"holt","year":"1970","journal-title":"Proc Project MAC Conf on Concurrent Systems and parallel Computation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360251"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1971.1090729"},{"key":"ref24","author":"krogdahl","year":"1977","journal-title":"Verification of Some Link-Level Protocols"},{"key":"ref23","article-title":"Insight Into Interfacing","volume":"12","author":"knoblock","year":"1975","journal-title":"Spectrum"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref50","volume":"viii 2","year":"1976","journal-title":"CCITT Recommendation X 25"},{"key":"ref51","first-page":"307","article-title":"Behavioral Descriptions of Communication Switching Systems Using Extended Petri Nets","volume":"3","author":"yoeli","year":"1977","journal-title":"Digital Processes"},{"key":"ref27a","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093424"},{"key":"ref27b","author":"merlin","year":"1976","journal-title":"1976 International Conf on Comm"},{"key":"ref27c","first-page":"614","volume":"com 24","year":"1976","journal-title":"IEEE Trans on Comm"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1978.810549"},{"key":"ref52","author":"zafiropulo","year":"1977","journal-title":"Protocol Validation by Duologue Matrix Analysis"},{"key":"ref31a","article-title":"Deadlock Avoidance in Store-and-Forward Networks, I: Store-and Forward Deadlock, II: Other Deadlock Types","author":"merlin","year":"0","journal-title":"IEEE Trans on Comm"},{"key":"ref31b","year":"0"},{"key":"ref10","article-title":"A Bibliography on the Formal Specification and Verification of Computer Network Protocols","author":"day","year":"1978","journal-title":"Proc Comput Network Protocols Symp"},{"key":"ref31c","year":"1978","journal-title":"Proc 3rd Jerusalem Conf on Information Technology (JCIT)"},{"key":"ref40","year":"1975","journal-title":"IBM synchronous data link control general information"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/800214.806548"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094473"},{"key":"ref14","article-title":"Verifiable communications processing in GYPSY","author":"good","year":"1978","journal-title":"Proc Compcon"},{"key":"ref16","article-title":"Prevention of Buffer Deadlocks in Packet-switching Networks","author":"gunther","year":"1975","journal-title":"IFIP-IIASA Workshop on Data Communications"},{"key":"ref17","first-page":"749","article-title":"Automatically verifying data transfer protocols","author":"hajek","year":"1978","journal-title":"Proc ICCC"},{"key":"ref18","article-title":"Protocol Definition with Formal Grammars","author":"haranqozo","year":"1978","journal-title":"Proc Computer Network Protocols Symposium"},{"key":"ref19","author":"harangozo","year":"0","journal-title":"Formal Language Description of a Communication Protocol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1972.1091190"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/563905.810898"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90014-4"},{"key":"ref49","year":"1976","journal-title":"Recommendation X 21 (Revised) AP VI-No 55E"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90017-X"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/800110.803557"},{"key":"ref45","first-page":"114","article-title":"A formal model for automatic implementation and logical validation of network communication protocol","author":"teng","year":"1978","journal-title":"Proceedings of the Computer Networking Symposium"},{"key":"ref7a","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TSE.1987.233521","article-title":"semiautomatic implementation of communication protocols","volume":"se 13","author":"bochmann","year":"1987","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1147\/rd.221.0060"},{"key":"ref7b","year":"0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1147\/rd.224.0393"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90013-2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(76)90015-5"},{"key":"ref43","first-page":"24","article-title":"Survey of Communication Protocol Verification Techniques","author":"sunshine","year":"1976","journal-title":"Proc Computer Network Symp"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/26\/23909\/01094323.pdf?arnumber=1094323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T15:41:28Z","timestamp":1638200488000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1094323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1979,11]]},"references-count":68,"journal-issue":{"issue":"11","published-print":{"date-parts":[[1979,11]]}},"URL":"https:\/\/doi.org\/10.1109\/tcom.1979.1094323","relation":{},"ISSN":["0096-2244"],"issn-type":[{"value":"0096-2244","type":"print"}],"subject":[],"published":{"date-parts":[[1979,11]]}}}