Author:
Damiani Sarah,Griffin Christopher,Phoha Shashi,Racunas Stephan,Rogan Christopher
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture
Reference17 articles.
1. C. -M. Huang, J. -M. Hsu, H. -Y. Lai, J. -C. Pong and D. -T. Huang, An estelle interpreter for incremental protocol verification, in Proceedings of the International Conference on Network Protocols, IEEE, San Francisco, CA, USA, pp. 326–333, October 19–22 1993
2. C. A. Brooks, R. Cieslak and P. Varaiya, A method for specifying, implementing, and verifying media access control protocols. IEEE Control Systems Magazine, Vol. 10, No. 4, pp. 87–94, 1990
3. T. Song, J. Alves-Foss, C. Ko, C. Zhang and K. Levitt, Using acl2 to verify security properties of specification-based intrusion detection systems, in Proc. ACL 2-2003, 2003
4. P. J. Ramadge and W. M. Wonham, Supervisory control of a class of discrete event processes. SIAM Journal on Control and Optimization, Vol. 25, No. 1, pp. 206–230, 1987
5. P. J. Ramadge and W. M. Wonham, The control of discrete event systems, Proc. IEEE, Vol. 77, No. 1, pp. 81–98, 1989