{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:11:10Z","timestamp":1760202670589,"version":"3.41.2"},"reference-count":1,"publisher":"Centre pour la Communication Scientifique Directe (CCSD)","license":[{"start":{"date-parts":[[2015,3,31]],"date-time":"2015-03-31T00:00:00Z","timestamp":1427760000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/arxiv.org\/licenses\/nonexclusive-distrib\/1.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:p>We present a timed process calculus for modelling wireless networks in which\nindividual stations broadcast and receive messages; moreover the broadcasts are\nsubject to collisions. Based on a reduction semantics for the calculus we\ndefine a contextual equivalence to compare the external behaviour of such\nwireless networks. Further, we construct an extensional LTS (labelled\ntransition system) which models the activities of stations that can be directly\nobserved by the external environment. Standard bisimulations in this LTS\nprovide a sound proof method for proving systems contextually equivalence. We\nillustrate the usefulness of the proof methodology by a series of examples.\nFinally we show that this proof method is also complete, for a large class of\nsystems.<\/jats:p>","DOI":"10.2168\/lmcs-11(1:18)2015","type":"journal-article","created":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T07:33:27Z","timestamp":1431934407000},"source":"Crossref","is-referenced-by-count":2,"title":["Modelling MAC-Layer Communications in Wireless Systems"],"prefix":"10.46298","volume":"Volume 11, Issue 1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1349-6693","authenticated-orcid":false,"given":"Andrea","family":"Cerone","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Hennessy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1712-7492","authenticated-orcid":false,"given":"Massimo","family":"Merro","sequence":"additional","affiliation":[]}],"member":"25203","published-online":{"date-parts":[[2015,3,31]]},"reference":[{"key":"948:not-found"}],"container-title":["Logical Methods in Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/lmcs.episciences.org\/1138\/pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/lmcs.episciences.org\/1138\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T20:04:21Z","timestamp":1681243461000},"score":1,"resource":{"primary":{"URL":"https:\/\/lmcs.episciences.org\/1138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,31]]},"references-count":1,"URL":"https:\/\/doi.org\/10.2168\/lmcs-11(1:18)2015","relation":{"is-same-as":[{"id-type":"arxiv","id":"1411.0490","asserted-by":"subject"},{"id-type":"doi","id":"10.48550\/arXiv.1411.0490","asserted-by":"subject"}],"is-referenced-by":[{"id-type":"doi","id":"10.1007\/s00236-018-0329-6","asserted-by":"subject"}]},"ISSN":["1860-5974"],"issn-type":[{"type":"electronic","value":"1860-5974"}],"subject":[],"published":{"date-parts":[[2015,3,31]]},"article-number":"1138"}}