This poster presents the first Java Pathfinder extension to model realistic User Datagram Protocol (UDP) networking communications, which is used to verify a UDP network software simulator, RF. Java Pathfinder is a model checking software system developed by NASA and used frequently for verifying that concurrent software systems avoid deadlock states and other errors. It does not natively support network modeling. NetIOCache is a Java Pathfinder extension for verifying TCP/IP networks, but no similar UDP extensions currently exist. NetStub, a Java Pathfinder extension, can simulate UDP behavior as a collection of threads, but it does not simulate important and common UDP properties such as packet loss and reordering that are often necessary...
Complex heterogeneous systems such as networked systems, composed of hardware and software, are vali...
The TCP models in ns-2 have been validated and are widely used in network research. They are however...
Network protocol construction is a complex and error prone task. The challenges originate both from...
This paper describes a tool for black-box testing of UDP-based distributed Java programs. UDP provid...
This paper examines the cost of testing network applications using the User Datagram Protocol (UDP)....
Existing network simulators perform reasonably well in evaluating the performance of network protoco...
Verification and Validation (V&V) is a critically important phase in the development life cycle of a...
peer reviewedAlthough automated unit test generation techniques can in principle generate test suit...
Software model checkers work directly on single-process programs, but not on multiple processes. Con...
Software model checking is a method for verifying various kinds of software including applications t...
In this dissertation, we focus on the verification of distributed Java applications composed of comm...
Live network tests are often used to obtain performance metrics associated with the transmission of ...
©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
Network protocols are often analyzed using simulations. We demonstrate how to extend such simulation...
Although automated unit test generation techniques can in principle generate test suites that achiev...
Complex heterogeneous systems such as networked systems, composed of hardware and software, are vali...
The TCP models in ns-2 have been validated and are widely used in network research. They are however...
Network protocol construction is a complex and error prone task. The challenges originate both from...
This paper describes a tool for black-box testing of UDP-based distributed Java programs. UDP provid...
This paper examines the cost of testing network applications using the User Datagram Protocol (UDP)....
Existing network simulators perform reasonably well in evaluating the performance of network protoco...
Verification and Validation (V&V) is a critically important phase in the development life cycle of a...
peer reviewedAlthough automated unit test generation techniques can in principle generate test suit...
Software model checkers work directly on single-process programs, but not on multiple processes. Con...
Software model checking is a method for verifying various kinds of software including applications t...
In this dissertation, we focus on the verification of distributed Java applications composed of comm...
Live network tests are often used to obtain performance metrics associated with the transmission of ...
©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
Network protocols are often analyzed using simulations. We demonstrate how to extend such simulation...
Although automated unit test generation techniques can in principle generate test suites that achiev...
Complex heterogeneous systems such as networked systems, composed of hardware and software, are vali...
The TCP models in ns-2 have been validated and are widely used in network research. They are however...
Network protocol construction is a complex and error prone task. The challenges originate both from...