With the rapid development of the Internet and distributed systems, communication protocols play a more and more important role. The correctness of the design of these communication protocols becomes crucial especially when critical applications are concerned. Common logical design errors in communication protocols include deadlock states, unspecified receptions, channel overflow, non-executable transitions, etc. Such design errors can be removed via protocol synthesis, or be detected through reachability analysis. The former may introduce more states and transitions than needed and the latter suffers from state space explosion problem. Here we present an improvement on existing technique to transform a protocol design into a deadlock-free ...
Abstract: The need of communication protocols in today’s envi-ronment increases as much as the netwo...
Deadlock freedom is a key challenge in the design of communication networks. Wormhole switching is a...
This study is concerned with the derivation of a deadlock detection algorithm for distributed system...
Communication protocol design consists essentially of the construction of interacting protocol entit...
Distributed protocols, typically expressed as stateful agents communicating asynchronously over buff...
The role of automatic formal protocol verifica- tion in hardware design is considered. Principles ar...
Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is de...
It is shown that the applicability of global state analysis as a tool for proving correctness of co...
This research is part of the NWO project "Improving the Quality of Protocol Standards". In this proj...
This dissertation presents new methods for handshaking expansion of asynchronous circuits. Handshaki...
A reliable and effective computer network can only be achieved by adopting efficient and error-free ...
During the fourth international conference on computer communications and networks (ICCCN), which wa...
The most common use of formal verification methods so far has been in identifying whether livelock a...
Accepted papers list: https://2020.splashcon.org/track/splash-2020-oopsla#event-overviewWith distrib...
International audienceReverse engineering of communication protocols is aimed at providing methods a...
Abstract: The need of communication protocols in today’s envi-ronment increases as much as the netwo...
Deadlock freedom is a key challenge in the design of communication networks. Wormhole switching is a...
This study is concerned with the derivation of a deadlock detection algorithm for distributed system...
Communication protocol design consists essentially of the construction of interacting protocol entit...
Distributed protocols, typically expressed as stateful agents communicating asynchronously over buff...
The role of automatic formal protocol verifica- tion in hardware design is considered. Principles ar...
Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is de...
It is shown that the applicability of global state analysis as a tool for proving correctness of co...
This research is part of the NWO project "Improving the Quality of Protocol Standards". In this proj...
This dissertation presents new methods for handshaking expansion of asynchronous circuits. Handshaki...
A reliable and effective computer network can only be achieved by adopting efficient and error-free ...
During the fourth international conference on computer communications and networks (ICCCN), which wa...
The most common use of formal verification methods so far has been in identifying whether livelock a...
Accepted papers list: https://2020.splashcon.org/track/splash-2020-oopsla#event-overviewWith distrib...
International audienceReverse engineering of communication protocols is aimed at providing methods a...
Abstract: The need of communication protocols in today’s envi-ronment increases as much as the netwo...
Deadlock freedom is a key challenge in the design of communication networks. Wormhole switching is a...
This study is concerned with the derivation of a deadlock detection algorithm for distributed system...