What are the limits of model checking methods for the verification of real life protocols?
- 1 January 1990
- book chapter
- Published by Springer Nature
- p. 275-285
- https://doi.org/10.1007/3-540-52148-8_23
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Dynamic hashing schemesACM Computing Surveys, 1988
- The Delta-4 approach to dependability in open distributed computing systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- The temporal logic of branching timeActa Informatica, 1983
- Fairness and related properties in transition systems ? a temporal logic to deal with fairnessActa Informatica, 1983
- Automatic verification of finite state concurrent system using temporal logic specificationsPublished by Association for Computing Machinery (ACM) ,1983
- Specification and verification of concurrent systems in CESARPublished by Springer Nature ,1982
- Impartiality, justice and fairness: The ethics of concurrent terminationPublished by Springer Nature ,1981
- A Calculus of Communicating SystemsLecture Notes in Computer Science, 1980
- "Sometime" is sometimes "not never"Published by Association for Computing Machinery (ACM) ,1980
- An axiomatic proof technique for parallel programs IActa Informatica, 1976