{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:49:52Z","timestamp":1732034992420},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319061993"},{"type":"electronic","value":"9783319062006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06200-6_5","type":"book-chapter","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T01:53:48Z","timestamp":1398218028000},"page":"62-76","source":"Crossref","is-referenced-by-count":13,"title":["Distinguishing Sequences for Partially Specified FSMs"],"prefix":"10.1007","author":[{"given":"Robert M.","family":"Hierons","sequence":"first","affiliation":[]},{"given":"Uraz Cengiz","family":"T\u00fcrker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Friedman, A.D., Menon, P.R.: Fault detection in digital circuits. Computer Applications in Electrical Engineering Series (1971)"},{"key":"5_CR2","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers, principles, techniques, and tools. Addison-Wesley series in computer science"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"4","author":"T.S. Chow","year":"1978","unstructured":"Chow, T.S.: Testing software design modelled by finite state machines. IEEE Transactions on Software Engineering\u00a04, 178\u2013187 (1978)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5_CR4","unstructured":"Holzmann, G.J.: Design and validation of computer protocols. Prentice-Hall software series"},{"key":"5_CR5","first-page":"63","volume-title":"Proceedings of Protocol Specification, Testing, and Verification VIII","author":"E. Brinksma","year":"1988","unstructured":"Brinksma, E.: A theory for the derivation of tests. In: Proceedings of Protocol Specification, Testing, and Verification VIII, pp. 63\u201374. North-Holland, Atlantic City (1988)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Dahbura, A.T., Sabnani, K.K., Uyar, M.U.: Formal methods for generating protocol conformance test sequences. Proceedings of the IEEE\u00a078(8), 1317\u20131326 (August)","DOI":"10.1109\/5.58319"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Lee, D., Sabnani, K.K., Kristol, D.M., Paul, S.: Conformance testing of protocols specified as communicating finite state machines-a guided random walk based approach. IEEE Transactions on Communications\u00a044(5), 631\u2013640 (May)","DOI":"10.1109\/26.494307"},{"issue":"8","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/5.533956","volume":"84","author":"D. Lee","year":"1996","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite-state machines - a survey. Proceedings of the IEEE\u00a084(8), 1089\u20131123 (1996)","journal-title":"Proceedings of the IEEE"},{"key":"5_CR9","unstructured":"Low, S.H.: Probabilistic conformance testing of protocols with unobservable transitions. In: Proceedings of the 1993 International Conference on Network Protocols, pp. 368\u2013375 (October 1993)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/3-540-58179-0_49","volume-title":"Computer Aided Verification","author":"M. Mihail","year":"1994","unstructured":"Mihail, M., Papadimitriou, C.H.: On the random walk method for protocol testing. In: Dill, D.L. (ed.) CAV 1994. LNCS, vol.\u00a0818, pp. 132\u2013141. Springer, Heidelberg (1994)"},{"issue":"4","key":"5_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0169-7552(88)90064-5","volume":"15","author":"K. Sabnani","year":"1988","unstructured":"Sabnani, K., Dahbura, A.: A protocol test generation procedure. Computer Networks\u00a015(4), 285\u2013297 (1988)","journal-title":"Computer Networks"},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1109\/32.16602","volume":"15","author":"D.P. Sidhu","year":"1989","unstructured":"Sidhu, D.P., Leung, T.-K.: Formal methods for protocol testing: A detailed study. IEEE Transactions on Software Engineering\u00a015(4), 413\u2013426 (1989)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5_CR13","unstructured":"Binder, R.V.: Testing Object-Oriented Systems: Models, Patterns, and Tools. Addison-Wesley (1999)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-30232-2_8","volume-title":"Formal Techniques for Networked and Distributed Systems \u2013 FORTE 2004","author":"M. Haydar","year":"2004","unstructured":"Haydar, M., Petrenko, A., Sahraoui, H.A.: Formal verification of web applications modeled by communicating automata. In: de Frutos-Escrig, D., N\u00fa\u00f1ez, M. (eds.) FORTE 2004. LNCS, vol.\u00a03235, pp. 115\u2013132. Springer, Heidelberg (2004)"},{"key":"5_CR15","unstructured":"Betin-Can, A., Bultan, T.: Verifiable concurrent programming using concurrency controllers. In: Proceedings of the 19th IEEE International Conference on Automated Software Engineering, pp. 248\u2013257. IEEE Computer Society (2004)"},{"issue":"7","key":"5_CR16","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/12.599899","volume":"46","author":"I. Pomeranz","year":"1997","unstructured":"Pomeranz, I., Reddy, S.M.: Test generation for multiple state-table faults in finite-state machines. IEEE Transactions on Computers\u00a046(7), 783\u2013794 (1997)","journal-title":"IEEE Transactions on Computers"},{"issue":"5","key":"5_CR17","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M. Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Software Testing, Verification and Reliability\u00a022(5), 297\u2013312 (2012)","journal-title":"Software Testing, Verification and Reliability"},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1002\/stvr.427","volume":"21","author":"W. Grieskamp","year":"2011","unstructured":"Grieskamp, W., Kicillof, N., Stobie, K., Braberman, V.A.: Model-based quality assurance of protocol documentation: Tools and methodology. Software Testing, Verification and Reliability\u00a021(1), 55\u201371 (2011)","journal-title":"Software Testing, Verification and Reliability"},{"key":"5_CR19","unstructured":"Aho, A.V., Dahbura, A.T., Lee, D., Uyar, M.U.: An optimization technique for protocol conformance test generation based on UIO sequences and rural chinese postman tours. In: Protocol Specification, Testing, and Verification VIII, Atlantic City, pp. 75\u201386. Elsevier, North-Holland (1988)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Hennie, F.C.: Fault-detecting experiments for sequential circuits. In: Proceedings of Fifth Annual Symposium on Switching Circuit Theory and Logical Design, pp. 95\u2013110. Princeton, New Jersey (November 1964)","DOI":"10.1109\/SWCT.1964.8"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/T-C.1970.222975","volume":"19","author":"G. Gonenc","year":"1970","unstructured":"Gonenc, G.: A method for the design of fault detection experiments. IEEE Transactions on Computers\u00a019, 551\u2013558 (1970)","journal-title":"IEEE Transactions on Computers"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Vasilevskii, M.P.: Failure diagnosis of automata. Cybernetics and Systems Analysis\u00a09, 653\u2013665","DOI":"10.1007\/BF01068590"},{"key":"5_CR23","unstructured":"Vuong, S.T., Chan, W.W.L., Ito, M.R.: The UIOv-method for protocol test sequence generation. In: The 2nd International Workshop on Protocol Test Systems, Berlin (1989)"},{"issue":"6","key":"5_CR24","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/32.87284","volume":"17","author":"S. Fujiwara","year":"1991","unstructured":"Fujiwara, S., von Bochmann, G., Khendek, F., Amalou, M., Ghedamsi, A.: Test selection based on finite state models. IEEE Transactions on Software Engineering\u00a017(6), 591\u2013603 (1991)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"5_CR25","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/90.234857","volume":"1","author":"H. Ural","year":"1993","unstructured":"Ural, H., Zhu, K.: Optimal length test sequence generation using distinguishing sequences. IEEE\/ACM Transactions on Networking\u00a01(3), 358\u2013371 (1993)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"9","key":"5_CR26","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1109\/TC.2005.152","volume":"54","author":"A. Petrenko","year":"2005","unstructured":"Petrenko, A., Yevtushenko, N.: Testing from partial deterministic FSM specifications. IEEE Transactions on Computers\u00a054(9), 1154\u20131165 (2005)","journal-title":"IEEE Transactions on Computers"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"von Bochmann, G., Petrenko, A.: Protocol testing: Review of methods and relevance for software testing. In: ACM International Symposium on Software Testing and Analysis, Seattle USA, pp. 109\u2013123 (1994)","DOI":"10.1145\/186258.187153"},{"issue":"1","key":"5_CR28","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S0164-1212(01)00132-7","volume":"62","author":"R. Lai","year":"2002","unstructured":"Lai, R.: A survey of communication protocol testing. Journal of Systems and Software\u00a062(1), 21\u201346 (2002)","journal-title":"Journal of Systems and Software"},{"key":"5_CR29","unstructured":"Kohavi, Z.: Switching and Finite State Automata Theory. McGraw-Hill, New York (1978)"},{"key":"5_CR30","unstructured":"Moore, E.P.: Gedanken-experiments. In: Shannon, C., McCarthy, J. (eds.) Automata Studies. Princeton University Press (1956)"},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/T-C.1974.224043","volume":"23","author":"R.T. Boute","year":"1974","unstructured":"Boute, R.T.: Distinguishing sets for optimal state identification in checking experiments. IEEE Trans. Comput.\u00a023, 874\u2013877 (1974)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/TC.2006.80","volume":"55","author":"R.M. Hierons","year":"2006","unstructured":"Hierons, R.M., Ural, H.: Optimizing the length of checking sequences. IEEE Trans. Comput.\u00a055, 618\u2013629 (2006)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"5_CR33","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s00165-009-0135-6","volume":"22","author":"G.-V. Jourdan","year":"2010","unstructured":"Jourdan, G.-V., Ural, H., Yenigun, H., Zhang, J.: Lower bounds on lengths of checking sequences. Formal Aspects of Computing\u00a022(6), 667\u2013679 (2010)","journal-title":"Formal Aspects of Computing"},{"issue":"3","key":"5_CR34","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1109\/12.272431","volume":"43","author":"D. Lee","year":"1994","unstructured":"Lee, D., Yannakakis, M.: Testing finite-state machines: State identification and verification. IEEE Trans. on Computers\u00a043(3), 306\u2013320 (1994)","journal-title":"IEEE Trans. on Computers"},{"issue":"8","key":"5_CR35","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/TC.2010.17","volume":"59","author":"A. Silva Sim\u00e3o da","year":"2010","unstructured":"da Silva Sim\u00e3o, A., Petrenko, A.: Checking completeness of tests for finite state machines. IEEE Transactions on Computers\u00a059(8), 1023\u20131032 (2010)","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"5_CR36","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1002\/stvr.452","volume":"22","author":"A. Silva Sim\u00e3o da","year":"2012","unstructured":"da Silva Sim\u00e3o, A., Petrenko, A., Yevtushenko, N.: On reducing test length for FSMs with extra states. Software Testing, Verification and Reliability\u00a022(6), 435\u2013454 (2012)","journal-title":"Software Testing, Verification and Reliability"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Hierons, R.M., Jourdan, G.-V., Ural, H., Yenigun, H.: Checking sequence construction using adaptive and preset distinguishing sequences. In: SEFM, pp. 157\u2013166 (2009)","DOI":"10.1109\/SEFM.2009.12"},{"issue":"5","key":"5_CR38","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/0140-3664(92)90092-S","volume":"15","author":"H. Ural","year":"1992","unstructured":"Ural, H.: Formal methods for test sequence generation. Computer Communications\u00a015(5), 311\u2013325 (1992)","journal-title":"Computer Communications"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"da Silva Sim\u00e3o, A., Petrenko, A.: Generating checking sequences for partial reduced finite state machines. Testing of Software and Communicating Systems, 153\u2013168 (2008)","DOI":"10.1007\/978-3-540-68524-1_12"},{"key":"5_CR40","unstructured":"Tsai, P.-C., Wang, S.-J., Chang, F.-M.: FSM-based programmable memory bist with macro command. In: 2005 IEEE International Workshop on Memory Technology, Design, and Testing, MTDT 2005, pp. 72\u201377 (August 2005)"},{"key":"5_CR41","unstructured":"Zarrineh, K., Upadhyaya, S.J.: Programmable memory bist and a new synthesis framework. In: Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing. Digest of Papers, pp. 352\u2013355 (June 1999)"},{"key":"5_CR42","unstructured":"Xie, L., Wei, J., Zhu, G.: An improved FSM-based method for BGP protocol conformance testing. In: International Conference on Communications, Circuits and Systems, pp. 557\u2013561 (2008)"},{"key":"5_CR43","unstructured":"Drumea, A., Popescu, C.: Finite state machines and their applications in software for industrial control. In: 27th Int. Spring Seminar on Electronics Technology: Meeting the Challenges of Electronics Technology Progress, vol.\u00a01, pp. 25\u201329 (2004)"},{"issue":"9","key":"5_CR44","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1109\/TC.2005.152","volume":"54","author":"A. Petrenko","year":"2005","unstructured":"Petrenko, A., Yevtushenko, N.: Testing from partial deterministic FSM specifications. IEEE Transactions on Computers\u00a054(9), 1154\u20131165 (2005)","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"5_CR45","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1006\/jcss.1995.1019","volume":"50","author":"M. Yannakakis","year":"1995","unstructured":"Yannakakis, M., Lee, D.: Testing finite state machines: Fault detection. Journal of Computer and System Sciences\u00a050(2), 209\u2013227 (1995)","journal-title":"Journal of Computer and System Sciences"},{"key":"5_CR46","unstructured":"Yevtushenko, N., Petrenko, A.: Synthesis of test experiments in some classes of automata. Automatic Control and Computer Sciences\u00a04 (1990)"},{"key":"5_CR47","volume-title":"Introduction to The Theory of Finite State Machines","author":"A. Gill","year":"1962","unstructured":"Gill, A.: Introduction to The Theory of Finite State Machines. McGraw-Hill, New York (1962)"},{"key":"5_CR48","unstructured":"Rho, J.-K., Hachtel, G., Somenzi, F.: Don\u2019t care sequences and the optimization of interacting finite state machines. In: IEEE International Conference on Computer-Aided Design, ICCAD 1991. Digest of Technical Papers, pp. 418\u2013421 (November 1991)"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Sokolovskii, M.N.: Diagnostic experiments with automata. Kibernetica\u00a0(6), 44\u201349 (1971)","DOI":"10.1007\/BF01068822"},{"issue":"2","key":"5_CR50","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0022-0000(70)80006-X","volume":"4","author":"W.J. Savitch","year":"1970","unstructured":"Savitch, W.J.: Relationships between nondeterministic and deterministic tape complexities. Journal of Computer and System Sciences\u00a04(2), 177\u2013192 (1970)","journal-title":"Journal of Computer and System Sciences"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"G\u00fcni\u00e7en, C., T\u00fcrker, U.C., Ural, H., Yenig\u00fcn, H.: Generating preset distinguishing sequences using sat. In: Computer and Information Sciences II, pp. 487\u2013493. Springer (2012)","DOI":"10.1007\/978-1-4471-2155-8_62"},{"key":"5_CR52","unstructured":"Brglez, F.: ACM\/SIGMOD benchmark dataset, http:\/\/cbl.ncsu.edu:16080\/benchmarks\/Benchmarks-upto-1996.html"}],"container-title":["Lecture Notes in Computer Science","NASA Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06200-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:04:52Z","timestamp":1648857892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06200-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319061993","9783319062006"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06200-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}