Some twentyfive years ago, the field of computer-communication system performance evaluation and the field of formal specification and verification were regarded as completely disjunct. The former field focussed on the quantitative aspects of system behaviour, expressed in measures such as delays, throughputs and loss probabilities, whereas the latter field focussed on the qualitative aspects of system behaviour, expressed in measures (or, properties) such as system liveness, deadlock freeness and safety. Over the years, however, this distinction has shown to be not always useful. In fact, we see a large variety of systems for which the qualitative behaviour cannot be decoupled from the quantitative aspect. Think for instance of communicati...
The formal verification of concurrent systems is usually seen as an example par excellence of the ap...
the formal verification of concurrent systems is usually seen as an example par excellence of the ap...
Abstract — In distributed applications, software components embedded in the communication protocols ...
The most common use of formal verification methods so far has been in identifying whether livelock a...
The most common use of formal verification methods and tools so far has been in identifying whether ...
In the past 15 years the alternating-bit protocol has been perhaps the most widely verified protocol...
As computing and communication systems become physically and logically more complex, their evaluatio...
A call for the perfect marriage between classical performance evaluation and state-of-the-art verifi...
International audienceQEST is a leading forum on evaluation and verification of computer systems and...
Safe and live protocols have been shown to exhibit timing errors. To avoid such errors, timing requi...
While today’s communications are essential and a huge set of services is available online, computer ...
Performance analysis and formal correctness verification of computer communication protocols and dis...
Soon after the birth of model checking, the first theoretical achievements have been reported on the...
For software development projects with very high correctness requirements (including safety requirem...
Meyer, J.F,, Performability: a retrospective and some pointers to the future, Performance Evaluation...
The formal verification of concurrent systems is usually seen as an example par excellence of the ap...
the formal verification of concurrent systems is usually seen as an example par excellence of the ap...
Abstract — In distributed applications, software components embedded in the communication protocols ...
The most common use of formal verification methods so far has been in identifying whether livelock a...
The most common use of formal verification methods and tools so far has been in identifying whether ...
In the past 15 years the alternating-bit protocol has been perhaps the most widely verified protocol...
As computing and communication systems become physically and logically more complex, their evaluatio...
A call for the perfect marriage between classical performance evaluation and state-of-the-art verifi...
International audienceQEST is a leading forum on evaluation and verification of computer systems and...
Safe and live protocols have been shown to exhibit timing errors. To avoid such errors, timing requi...
While today’s communications are essential and a huge set of services is available online, computer ...
Performance analysis and formal correctness verification of computer communication protocols and dis...
Soon after the birth of model checking, the first theoretical achievements have been reported on the...
For software development projects with very high correctness requirements (including safety requirem...
Meyer, J.F,, Performability: a retrospective and some pointers to the future, Performance Evaluation...
The formal verification of concurrent systems is usually seen as an example par excellence of the ap...
the formal verification of concurrent systems is usually seen as an example par excellence of the ap...
Abstract — In distributed applications, software components embedded in the communication protocols ...