Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, WCen_US
dc.contributor.authorChung, CGen_US
dc.date.accessioned2014-12-08T15:45:35Z-
dc.date.available2014-12-08T15:45:35Z-
dc.date.issued2000-03-01en_US
dc.identifier.issn0950-5849en_US
dc.identifier.urihttp://dx.doi.org/10.1016/S0950-5849(99)00061-0en_US
dc.identifier.urihttp://hdl.handle.net/11536/30669-
dc.description.abstractProtocol verification is one of the most challenging tasks in the design of protocols. Among the various proposed approaches, the one based on reachability analysis (or known as state enumeration approach) is of the most: simple, automatic and effective. However, the state explosion problem is a principle obstacle toward successful and complete verifications of complex protocols. To overcome this problem, we proposed a new approach, the "path-based approach." The idea is to divide a protocol into a collection of individual execution record, denoted as: concurrent paths, a partial order representation recording the execution paths of individual entities. Then, the verification of the protocol is, thus, replaced by that of individual concurrent paths. Since concurrent paths can be automatically generated through Cartesian product:of the execution paths of all modules, and verified independently, the memory requirement is limited to the complexity of individual concurrent path rather than the whole protocol. Thus, the state explosion problem is alleviated from such "divide and conquer" approach. Furthermore, we propose an algorithm, making the trade-off on memory requirement to generate the concurrent paths more efficiently; and utilize the technique of symmetric verification, parallel computing to improve the efficiency of verification. Eventually, our experience of verifying real protocols shows that our approach uses much less memory:and time than reachability analysis. (C) 2000 Elsevier Science B.V. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectprotocol verificationen_US
dc.subjectconcurrent pathen_US
dc.subjectpath-based verificationen_US
dc.titlePath-based protocol verification approachen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/S0950-5849(99)00061-0en_US
dc.identifier.journalINFORMATION AND SOFTWARE TECHNOLOGYen_US
dc.citation.volume42en_US
dc.citation.issue4en_US
dc.citation.spage229en_US
dc.citation.epage244en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000085869800001-
dc.citation.woscount1-
Appears in Collections:Articles


Files in This Item:

  1. 000085869800001.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.