{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:22:08Z","timestamp":1725567728441},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232520"},{"type":"electronic","value":"9783540302322"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30232-2_22","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T15:56:19Z","timestamp":1287935779000},"page":"343-358","source":"Crossref","is-referenced-by-count":28,"title":["Automatized Verification of Ad Hoc Routing Protocols"],"prefix":"10.1007","author":[{"given":"Oskar","family":"Wibling","sequence":"first","affiliation":[]},{"given":"Joachim","family":"Parrow","sequence":"additional","affiliation":[]},{"given":"Arnold","family":"Pears","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Barnat, J., Brim, L., Stribrna, J.: Distributed LTL model-checking in SPIN. Technical report, Masaryk University (December 2000)","DOI":"10.1007\/3-540-45139-0_13"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10722167_19","volume-title":"Computer Aided Verification","author":"G. Behrmann","year":"2000","unstructured":"Behrmann, G., Hune, T., Vaandrager, F.: Distributed timed model checking - how the search order matters. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, Springer, Heidelberg (2000)"},{"key":"22_CR3","unstructured":"Chiyangwa, S., Kwiatkowska, M.: Analysing timed properties of AODV with UPPAAL. Technical report, University of Birmingham, Technical Report CSR-04-4 (March 2004)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: Request for Comments: Optimized link state routing protocol (OLSR) (October 2003), http:\/\/www.ietf.org\/rfc\/rfc3626.txt","DOI":"10.17487\/rfc3626"},{"key":"22_CR5","volume-title":"Formal Methods in Computer-Aided Design","author":"S. Das","year":"2002","unstructured":"Das, S., Dill, D.L.: Counter-example based predicate discovery in predicate abstraction. In: Formal Methods in Computer-Aided Design, November 2002, Springer, Heidelberg (2002)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-24622-0_17","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"D. Engler","year":"2004","unstructured":"Engler, D., Musuvathi, M.: Static analysis versus software model checking for bug finding. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol.\u00a02937, pp. 191\u2013210. Springer, Heidelberg (2004)"},{"key":"22_CR7","volume-title":"The Spin Model Checker, Primer and Reference Manual","author":"G.J. Holzmann","year":"2003","unstructured":"Holzmann, G.J.: The Spin Model Checker, Primer and Reference Manual. Addison-Wesley, Reading (2003)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Holzmann, G.J., Peled, D.: An improvement in formal verification. In: Proc. FORTE Conference (1994)","DOI":"10.1007\/978-0-387-34878-0_13"},{"key":"22_CR9","unstructured":"IETF MANET Working Group. MANET charter (2004), http:\/\/www.ietf.org\/html.charters\/manet-charter.html"},{"key":"22_CR10","unstructured":"Information Sciences Institute. The network simulator \u2013 ns-2 home page (2004), http:\/\/www.isi.edu\/nsnam\/ns"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Johnson, D.B.: Routing in ad hoc networks of mobile hosts. In: Proc. IEEE Workshop on Mobile Computing Systems and Applications, December 1994, pp. 158\u2013163 (1994)","DOI":"10.1109\/WMCSA.1994.33"},{"key":"22_CR12","unstructured":"Johnson, D.B., Maltz, D.A., Hu, Y.-C.: Internet draft: The dynamic source routing protocol for mobile ad hoc networks (DSR) (April 2003), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-manet-dsr-09.txt"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Kwiatkowska, M., Norman, G., Sproston, J.: Probabilistic model checking of the IEEE 802.11 wireless local area network protocol. In: Proc. Second Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification, July 2002, pp. 169\u2013187 (2002)","DOI":"10.1007\/3-540-45605-8_11"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Larsen, K.G., Larsson, F., Pettersson, P., Yi, W.: Efficient verification of real-time systems: Compact data structures and state-space reduction. In: Proc. 18th IEEE Real-Time Systems Symposium (RTSS), December 1997, pp. 14\u201324 (1997)","DOI":"10.1109\/REAL.1997.641265"},{"issue":"1\u20132","key":"22_CR15","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s100090050010","volume":"1","author":"K.G. Larsen","year":"1997","unstructured":"Larsen, K.G., Pettersson, P., Yi, W.: Uppaal in a Nutshell. Int. Journal on Software Tools for Technology Transfer\u00a01(1\u20132), 134\u2013152 (1997)","journal-title":"Int. Journal on Software Tools for Technology Transfer"},{"key":"22_CR16","unstructured":"Lundgren, H.: Implementation and Real-world Evaluation of Routing Protocols for Wireless Ad hoc Networks. Licentiate thesis, Uppsala University (2002)"},{"key":"22_CR17","first-page":"412","volume-title":"Proc. 3rd annual IEEE Wireless Communications and Networking Conference (WCNC)","author":"H. Lundgren","year":"2002","unstructured":"Lundgren, H., Lundberg, D., Nielsen, J., Nordstr\u00f6m, E., Tschudin, C.: A large-scale testbed for reproducible ad hoc protocol evaluations. In: Proc. 3rd annual IEEE Wireless Communications and Networking Conference (WCNC), March 2002, pp. 412\u2013418. IEEE, Los Alamitos (2002)"},{"key":"22_CR18","unstructured":"Obradovic, D.: Formal Analysis of Routing Protocols. Phd thesis, University of Pennsylvania (2002)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Ogier, R., Templin, F., Lewis, M.: Internet draft: Topology dissemination based on reverse-path forwarding (TBRPF) (October 2003), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-manet-tbrpf-11.txt","DOI":"10.17487\/rfc3684"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Request for Comments: Ad hoc ondemand distance vector (AODV) routing (July 2003), http:\/\/www.ietf.org\/rfc\/rfc3561.txt","DOI":"10.17487\/rfc3561"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90\u2013100 (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"22_CR22","unstructured":"Ruys, T.C.: Towards Effective Model Checking. Phd thesis, University of Twente (March 2001)"},{"key":"22_CR23","unstructured":"Tschudin, C., Gold, R., Rensfelt, O., Wibling, O.: LUNAR: a lightweight underlay network ad-hoc routing protocol and implementation. In: Proc. Next Generation Teletraffic and Wired\/Wireless Advanced Networking, NEW2AN (2004)"},{"key":"22_CR24","unstructured":"University of Cambridge Computer Laboratory. Automated reasoning group HOL page (2004), http:\/\/www.cl.cam.ac.uk\/Research\/HVG\/HOL\/"},{"key":"22_CR25","unstructured":"Uppsala University and Aalborg University. UPPAAL home page (2004), http:\/\/www.uppaal.com"},{"key":"22_CR26","unstructured":"Verinet group. Verinet home page (2004), http:\/\/www.cis.upenn.edu\/verinet"},{"key":"22_CR27","unstructured":"Oskar Wibling. LUNAR pseudo code description (2004), http:\/\/user.it.uu.se\/oskarw\/lunar_pseudo_code\/"},{"key":"22_CR28","unstructured":"Wikipedia. Ad hoc protocol list (2004), http:\/\/en.wikipedia.org\/wiki\/Ad_hoc_protocol_list"},{"key":"22_CR29","unstructured":"Xiong, C., Murata, T., Tsai, J.: Modelling and simulation of routing protocol for mobile ad hoc networks using coloured Petri nets. In: Proc. Workshop on Formal Methods Applied to Defence Systems in Formal Methods in Software Engineering and Defence Systems (2002)"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Networked and Distributed Systems \u2013 FORTE 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30232-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:00:46Z","timestamp":1559768446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30232-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232520","9783540302322"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30232-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}