{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:08Z","timestamp":1750306208523,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,13]],"date-time":"2016-11-13T00:00:00Z","timestamp":1478995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006360","name":"Bundesministerium f\u00fcr Wirtschaft und Energie","doi-asserted-by":"publisher","award":["0325629D"],"award-info":[{"award-number":["0325629D"]}],"id":[{"id":"10.13039\/501100006360","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,13]]},"DOI":"10.1145\/2988287.2989148","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T19:39:50Z","timestamp":1478288390000},"page":"140-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Formal Analysis and Verification of the IEEE 802.15.4 DSME Slot Allocation"],"prefix":"10.1145","author":[{"given":"Florian","family":"Kauer","sequence":"first","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"given":"Maximilian","family":"K\u00f6stler","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"given":"Tobias","family":"L\u00fcbkert","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"given":"Volker","family":"Turau","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IEC 62591:2010 - Industrial communication networks - Wireless communication network and communication profiles - WirelessHART#8482; 2010.  IEC 62591:2010 - Industrial communication networks - Wireless communication network and communication profiles - WirelessHART#8482; 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC sublayer","author":"Local IEEE","year":"2012","unstructured":"IEEE 802.15.4e#8482;-2012 -IEEE Standard for Local and metropolitan area networks--Part 15.4 : Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC sublayer , 2012 . IEEE 802.15.4e#8482;-2012 -IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC sublayer, 2012."},{"key":"e_1_3_2_1_3_1","volume-title":"Low-Rate Wireless Personal Area Networks (WPANs)","author":"Local IEEE","year":"2016","unstructured":"IEEE 802.15.4#8482;-2015 - IEEE Standard for Local and metropolitan area networks--Part 15.4 : Low-Rate Wireless Personal Area Networks (WPANs) , 2016 . IEEE 802.15.4#8482;-2015 - IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (WPANs), 2016."},{"key":"e_1_3_2_1_4_1","volume-title":"International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","author":"Accettura N.","year":"2013","unstructured":"N. Accettura , M. R. Palattella , G. Boggia , L. A. Grieco , and M. Dohler . Decentralized Traffic Aware Scheduling for Multi-hop Low Power Lossy Networks in the Internet of Things . In International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) . IEEE , 2013 . N. Accettura, M. R. Palattella, G. Boggia, L. A. Grieco, and M. Dohler. Decentralized Traffic Aware Scheduling for Multi-hop Low Power Lossy Networks in the Internet of Things. In International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897667.2897674"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.08.024"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Advanced Aspects of Software Engineering (ICAASE)","author":"Boucebsi R.","year":"2014","unstructured":"R. Boucebsi , F. Belala , and L. Derdouri . Modeling Channel Allocation via BRS: Case of WMNs . In International Conference on Advanced Aspects of Software Engineering (ICAASE) , 2014 . R. Boucebsi, F. Belala, and L. Derdouri. Modeling Channel Allocation via BRS: Case of WMNs. In International Conference on Advanced Aspects of Software Engineering (ICAASE), 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Programming Languages and Systems, number 9632 in Lecture Notes in Computer Science","author":"Bres E.","year":"2016","unstructured":"E. Bres , R. v. Glabbeek, and P. H\u00f6fner. A Timed Process Algebra for Wireless Networks with an Application in Routing . In Programming Languages and Systems, number 9632 in Lecture Notes in Computer Science . Springer , Apr. 2016 . E. Bres, R. v. Glabbeek, and P. H\u00f6fner. A Timed Process Algebra for Wireless Networks with an Application in Routing. In Programming Languages and Systems, number 9632 in Lecture Notes in Computer Science. Springer, Apr. 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"Hydrocarbon Engineering","author":"Colpo J.","year":"2011","unstructured":"J. Colpo and D. Mols . No strings attached . Hydrocarbon Engineering , 16, Nov. 2011 . J. Colpo and D. Mols. No strings attached. Hydrocarbon Engineering, 16, Nov. 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30793-5_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809714"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06410-9_44"},{"key":"e_1_3_2_1_14_1","volume-title":"Formal Methods for the Analysis of Wireless Network Protocols. Ph. D. Thesis","author":"Fruth M.","year":"2011","unstructured":"M. Fruth . Formal Methods for the Analysis of Wireless Network Protocols. Ph. D. Thesis , University of Oxford , 2011 . M. Fruth. Formal Methods for the Analysis of Wireless Network Protocols. Ph. D. Thesis, University of Oxford, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Decision-theoretic Recursive Modeling and the Coordinated Attack Problem. In International Conference on Artificial Intelligence Planning Systems","author":"Gmytrasiewicz P. J.","year":"1992","unstructured":"P. J. Gmytrasiewicz and E. H. Durfee . Decision-theoretic Recursive Modeling and the Coordinated Attack Problem. In International Conference on Artificial Intelligence Planning Systems , 1992 . P. J. Gmytrasiewicz and E. H. Durfee. Decision-theoretic Recursive Modeling and the Coordinated Attack Problem. In International Conference on Artificial Intelligence Planning Systems, 1992."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/79147.79161"},{"key":"e_1_3_2_1_17_1","unstructured":"L. Lamport. Specifying Concurrent Systems with TLA  L. Lamport. Specifying Concurrent Systems with TLA"},{"key":"e_1_3_2_1_18_1","unstructured":". 2000.  . 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9837625"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2844108"},{"key":"e_1_3_2_1_22_1","volume-title":"An Analytical Model for Fast and Verifiable Assessment of Large Scale Wireless Mesh Networks. In 11th International Conference on the Design of Reliable Communication Networks (DRCN)","author":"Meier F.","year":"2015","unstructured":"F. Meier and V. Turau . An Analytical Model for Fast and Verifiable Assessment of Large Scale Wireless Mesh Networks. In 11th International Conference on the Design of Reliable Communication Networks (DRCN) , Mar. 2015 . F. Meier and V. Turau. An Analytical Model for Fast and Verifiable Assessment of Large Scale Wireless Mesh Networks. In 11th International Conference on the Design of Reliable Communication Networks (DRCN), Mar. 2015."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699417"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5772\/9532"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252679"},{"key":"e_1_3_2_1_26_1","volume-title":"Performance Evaluation of WirelessHART for Factory Automation. In Conference on Emerging Technologies Factory Automation (ETFA). IEEE","author":"Petersen S.","year":"2009","unstructured":"S. Petersen and S. Carlsen . Performance Evaluation of WirelessHART for Factory Automation. In Conference on Emerging Technologies Factory Automation (ETFA). IEEE , Sept. 2009 . S. Petersen and S. Carlsen. Performance Evaluation of WirelessHART for Factory Automation. In Conference on Emerging Technologies Factory Automation (ETFA). IEEE, Sept. 2009."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2519247"},{"key":"e_1_3_2_1_28_1","volume-title":"Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement. RFC","author":"Watteyne T.","year":"2015","unstructured":"T. Watteyne , M. R. Palattella , and L. A. Grieco . Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement. RFC 7554, May 2015 . T. Watteyne, M. R. Palattella, and L. A. Grieco. Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement. RFC 7554, May 2015."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737958"},{"key":"e_1_3_2_1_30_1","volume-title":"Apr.","author":"Yousefi B.","year":"2016","unstructured":"B. Yousefi , F. Ghassemi , and R. Khosravi . Modeling and Efficient Verification of Wireless Ad hoc Networks. arXiv:1604.07179 {cs} , Apr. 2016 . B. Yousefi, F. Ghassemi, and R. Khosravi. Modeling and Efficient Verification of Wireless Ad hoc Networks. arXiv:1604.07179 {cs}, Apr. 2016."}],"event":{"name":"MSWiM '16: 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Malta Malta","acronym":"MSWiM '16"},"container-title":["Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988287.2989148","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2988287.2989148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:37Z","timestamp":1750218637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988287.2989148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,13]]},"references-count":30,"alternative-id":["10.1145\/2988287.2989148","10.1145\/2988287"],"URL":"https:\/\/doi.org\/10.1145\/2988287.2989148","relation":{},"subject":[],"published":{"date-parts":[[2016,11,13]]},"assertion":[{"value":"2016-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}