Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, WC | en_US |
dc.contributor.author | Chung, CG | en_US |
dc.date.accessioned | 2014-12-08T15:45:35Z | - |
dc.date.available | 2014-12-08T15:45:35Z | - |
dc.date.issued | 2000-03-01 | en_US |
dc.identifier.issn | 0950-5849 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/S0950-5849(99)00061-0 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/30669 | - |
dc.description.abstract | Protocol verification is one of the most challenging tasks in the design of protocols. Among the various proposed approaches, the one based on reachability analysis (or known as state enumeration approach) is of the most: simple, automatic and effective. However, the state explosion problem is a principle obstacle toward successful and complete verifications of complex protocols. To overcome this problem, we proposed a new approach, the "path-based approach." The idea is to divide a protocol into a collection of individual execution record, denoted as: concurrent paths, a partial order representation recording the execution paths of individual entities. Then, the verification of the protocol is, thus, replaced by that of individual concurrent paths. Since concurrent paths can be automatically generated through Cartesian product:of the execution paths of all modules, and verified independently, the memory requirement is limited to the complexity of individual concurrent path rather than the whole protocol. Thus, the state explosion problem is alleviated from such "divide and conquer" approach. Furthermore, we propose an algorithm, making the trade-off on memory requirement to generate the concurrent paths more efficiently; and utilize the technique of symmetric verification, parallel computing to improve the efficiency of verification. Eventually, our experience of verifying real protocols shows that our approach uses much less memory:and time than reachability analysis. (C) 2000 Elsevier Science B.V. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | protocol verification | en_US |
dc.subject | concurrent path | en_US |
dc.subject | path-based verification | en_US |
dc.title | Path-based protocol verification approach | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/S0950-5849(99)00061-0 | en_US |
dc.identifier.journal | INFORMATION AND SOFTWARE TECHNOLOGY | en_US |
dc.citation.volume | 42 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 229 | en_US |
dc.citation.epage | 244 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000085869800001 | - |
dc.citation.woscount | 1 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.