Errors such as deadlock and race condition are very common yet extremely difficult to debug in the communications design of client/server models based on remote procedure call and multi-threading. This paper presents an effective approach to detect these errors. It shows how to apply the specification and validation techniques in Protocol Engineering to discover those errors in the early stage of a client/server software development. The work is based on the protocol specification and validation tool PROMELA/SPIN. PROMELA is extended to a new language called PROMELA-C/S for additional expressive power of specifying client/server communications. A PROMELA-C/S translator then is built to convert PROMELA-C/S to PROMELA for running validation u...
AbstractMany of the communication protocols developed for the resource constrained devices are rarel...
As a result of using Information Technology (IT) in different technological processes it is necessar...
Historically, the consequences of implementing faulty designs of concurrent/ distributed systems hav...
Errors such as deadlock and race conditions are very common yet extremely difficult to debug in the ...
Formal verification of behavior of a component application requires a suitable specification languag...
Abstract: The need of communication protocols in today’s envi-ronment increases as much as the netwo...
Formal verification of behavior of a component application requires a suitable specification languag...
Communication protocol design consists essentially of the construction of interacting protocol entit...
The Session Management Protocol (SMP) is an important part of a session layer for mobile, disconnect...
User-level network architectures that provide applications with direct access to network hardware ha...
As new and complex multi-party edge services are deployed on the Internet, application-layer protoco...
Using software components is a modern approach for building extensible and reliable applications. To...
As a result of using Information Technology (IT) in different technological processes it is necessar...
Software model checkers work directly on single-process programs, but not on multiple processes. Con...
AbstractNext generation mobile protocols have become very complex and it is becoming increasingly di...
AbstractMany of the communication protocols developed for the resource constrained devices are rarel...
As a result of using Information Technology (IT) in different technological processes it is necessar...
Historically, the consequences of implementing faulty designs of concurrent/ distributed systems hav...
Errors such as deadlock and race conditions are very common yet extremely difficult to debug in the ...
Formal verification of behavior of a component application requires a suitable specification languag...
Abstract: The need of communication protocols in today’s envi-ronment increases as much as the netwo...
Formal verification of behavior of a component application requires a suitable specification languag...
Communication protocol design consists essentially of the construction of interacting protocol entit...
The Session Management Protocol (SMP) is an important part of a session layer for mobile, disconnect...
User-level network architectures that provide applications with direct access to network hardware ha...
As new and complex multi-party edge services are deployed on the Internet, application-layer protoco...
Using software components is a modern approach for building extensible and reliable applications. To...
As a result of using Information Technology (IT) in different technological processes it is necessar...
Software model checkers work directly on single-process programs, but not on multiple processes. Con...
AbstractNext generation mobile protocols have become very complex and it is becoming increasingly di...
AbstractMany of the communication protocols developed for the resource constrained devices are rarel...
As a result of using Information Technology (IT) in different technological processes it is necessar...
Historically, the consequences of implementing faulty designs of concurrent/ distributed systems hav...