Mohamed G. Gouda

According to our database1, Mohamed G. Gouda
  • authored at least 226 papers between 1976 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Hardness of Firewall Analysis.
IEEE Trans. Dependable Sec. Comput., 2017

Policy Expressions and the Bottom-Up Design of Computing Policies.
Proceedings of the Networked Systems - 5th International Conference, 2017

2016
Analysis of Computing Policies Using SAT Solvers (Short Paper).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2016

Securing NFC Credit Card Payments Against Malicious Retailers.
Proceedings of the Networked Systems - 4th International Conference, 2016

Nonrepudiation Protocols Without a Trusted Party.
Proceedings of the Networked Systems - 4th International Conference, 2016

A secure credit card protocol over NFC.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Two-phase Nonrepudiation Protocols.
Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, 2016

Nonrepudiation Protocols in Cloud Systems.
Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, 2016

2015
The Implication Problem of Computing Policies.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015

2014
Incremental Verification of Computing Policies.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

Keynote Talk: Communication Without Repudiation: The Unanswered Question.
Proceedings of the Networked Systems - Second International Conference, 2014

Hardness of Firewall Analysis.
Proceedings of the Networked Systems - Second International Conference, 2014

2013
The best keying protocol for sensor networks.
Pervasive and Mobile Computing, 2013

2012
A state-based model of sensor protocols.
Theor. Comput. Sci., 2012

A secure cookie scheme.
Computer Networks, 2012

2011
Nash equilibria in stabilizing systems.
Theor. Comput. Sci., 2011

Stabilization of max-min fair networks without per-flow state.
Theor. Comput. Sci., 2011

Is that you? Authentication in a network without identities.
IJSN, 2011

The best keying protocol for sensor networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

The K-Observer Problem in Computer Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Brief announcement: RedRem: a parallel redundancy remover.
Proceedings of the SPAA 2011: Proceedings of the 23rd Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2011

NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Firewall verification and redundancy checking are equivalent.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

On the Hardness of Topology Inference.
Proceedings of the Distributed Computing and Networking - 12th International Conference, 2011

HTTPI: An HTTP with Integrity.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

TPP: The Two-Way Password Protocol.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Is That You? Authentication in a Network without Identities.
Proceedings of the Global Communications Conference, 2011

2010
Complete Redundancy Removal for Packet Classifiers in TCAMs.
IEEE Trans. Parallel Distrib. Syst., 2010

Stabilization of Flood Sequencing Protocols in Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Mission critical networking [Guest editorial].
IEEE Journal on Selected Areas in Communications, 2010

On the Power of Non-spoofing Adversaries.
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Brief Announcement: On the Hardness of Topology Inference.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010

IP Fast Reroute in Networks with Shared Risk Links.
Proceedings of the NETWORKING 2010, 2010

Firewall modules and modular firewalls.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Projection and Division: Linear-Space Verification of Firewalls.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

The Weak Network Tracing Problem.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

2009
Firewall Policy Queries.
IEEE Trans. Parallel Distrib. Syst., 2009

Hop chains: Secure routing and the establishment of distinct identities.
Theor. Comput. Sci., 2009

Nash Equilibria in Stabilizing Systems.
Proceedings of the Stabilization, 2009

A Theory of Network Tracing.
Proceedings of the Stabilization, 2009

Brief Announcement: Consistent Fixed Points and Negative Gain.
Proceedings of the Stabilization, 2009

The Blocking Option in Routing Protocols.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Brief announcement: the theory of network tracing.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Consistent Fixed Points and Negative Gain.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Linear-Time Verification of Firewalls.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

Balanced Peer Lists: Towards a Collusion-Resistant BGP.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
Diverse Firewall Design.
IEEE Trans. Parallel Distrib. Syst., 2008

Logarithmic keying.
TAAS, 2008

Formal Specification and Verification of a Secure Micropayment Protocol.
I. J. Network Security, 2008

Stabilization of Max-Min Fair Networks without Per-flow State.
Proceedings of the Stabilization, 2008

Pharewell to Phishing.
Proceedings of the Stabilization, 2008

Sources and Monitors: A Trust Model for Peer-to-Peer Networks.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Verification of Distributed Firewalls.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Optimal Dispersal of Certificate Chains.
IEEE Trans. Parallel Distrib. Syst., 2007

A Stabilizing Deactivation/Reactivation Protocol.
IEEE Trans. Computers, 2007

A state-based language for sensor-actuator networks.
SIGBED Review, 2007

The alternator.
Distributed Computing, 2007

Reliable bursty convergecast in wireless sensor networks.
Computer Communications, 2007

SPP: An anti-phishing single password protocol.
Computer Networks, 2007

Structured firewall design.
Computer Networks, 2007

The Truth System: Can a System of Lying Processes Stabilize?
Proceedings of the Stabilization, 2007

Stabilization of Flood Sequencing Protocols in Sensor Networks.
Proceedings of the Stabilization, 2007

Truth in advertising: lightweight verification of route integrity.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

2006
Convergence of IPsec in presence of resets.
J. High Speed Networks, 2006

Stabilizing Certificate Dispersal.
JACIC, 2006

Stabilization of Grid Routing in Sensor Networks.
JACIC, 2006

Vulnerability analysis of certificate graphs.
IJSN, 2006

Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215].
Computer Communications, 2006

Secret instantiation in ad-hoc networks.
Computer Communications, 2006

Key bundles and parcels: Secure communication in many groups.
Computer Networks, 2006

Logarithmic Keying of Communication Networks.
Proceedings of the Stabilization, 2006

Fault Masking in Tri-redundant Systems.
Proceedings of the Stabilization, 2006

Hop Chains: Secure Routing and the Establishment of Distinct Identities.
Proceedings of the Principles of Distributed Systems, 10th International Conference, 2006

Key Grids: A Protocol Family for Assigning Symmetric Keys.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Rating Certificates.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

How to Assign Symmetric Keys in a Network of Small Computers.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

Hop Integrity in the Internet
Advances in Information Security 21, Springer, ISBN: 978-0-387-24426-6, 2006

2005
Self-Stabilizing Systems, Part 2.
J. High Speed Networks, 2005

Self-Stabilizing Systems, Part 1.
J. High Speed Networks, 2005

Hello again: Stabilization of the Hello protocol in OSPF.
J. High Speed Networks, 2005

Stabilizing Certificate Dispersal.
Proceedings of the Self-Stabilizing Systems, 2005


A General Alternator.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

A State-Based Model of Sensor Protocols.
Proceedings of the Principles of Distributed Systems, 9th International Conference, 2005

Reliable bursty convergecast in wireless sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Zmail: Zero-Sum Free Market Control of Spam.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

State Checksum and Its Role in System Stabilization.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A secure cookie protocol.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

A Model of Stateful Firewalls and Its Properties.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005


Complete Redundancy Detection in Firewalls.
Proceedings of the Data and Applications Security XIX, 2005

The Austin Protocol Compiler
Advances in Information Security 13, Springer, ISBN: 978-0-387-23227-0, 2005

2004
A line in the sand: a wireless sensor network for target detection, classification, and tracking.
Computer Networks, 2004

Optimal Dispersal of Certificate Chains.
Proceedings of the Distributed Computing, 18th International Conference, 2004

Firewall Queries.
Proceedings of the Principles of Distributed Systems, 8th International Conference, 2004

Sentries and Sleepers in Sensor Networks.
Proceedings of the Principles of Distributed Systems, 8th International Conference, 2004

Firewall Design: Consistency, Completeness, and Compactness.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Certificate Dispersal in Ad-Hoc Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Formal Specification and Verification of a Micropayment Protocol.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Optimal dispersal of special certificate graphs.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Diverse Firewall Design.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Maximizable routing metrics.
IEEE/ACM Trans. Netw., 2003

Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks.
IEEE Distributed Systems Online, 2003

A secure address resolution protocol.
Computer Networks, 2003

A Pursuer-Evader Game for Sensor Networks.
Proceedings of the Self-Stabilizing Systems, 6th International Symposium, SSS 2003, 2003

A Stabilizing Solution to the Stable Path Problem.
Proceedings of the Self-Stabilizing Systems, 6th International Symposium, SSS 2003, 2003

Key Bundels and Parcels: Secure Communication in Many Groups.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

Convergence of IPsec in Presence of Resets.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

The mote connectivity protocol.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

2002
Multiphase Stabilization.
IEEE Trans. Software Eng., 2002

Hop integrity in computer networks.
IEEE/ACM Trans. Netw., 2002

Stabilization of General Loop-Free Routing.
J. Parallel Distrib. Comput., 2002

Key Trees and the Security of Interval Multicast.
ICDCS, 2002

2001
Elements of security: Closure, convergence, and protection.
Inf. Process. Lett., 2001

Batch rekeying for secure group communications.
Proceedings of the Tenth International World Wide Web Conference, 2001

On the Security and Vulnerability of PING.
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001

The Theory of Weak Stabilization.
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001

Stabilization of Routing in Directed Networks.
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001

An anti-replay window protocol with controlled shift.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
Secure group communications using key graphs.
IEEE/ACM Trans. Netw., 2000

Alert communication primitives above TCP.
J. High Speed Networks, 2000

Hop Integrity in Computer Networks.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000

Anti-replay window protocols for secure IP.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
Memory Requirements for Silent Stabilization.
Acta Inf., 1999

Stabilization of maximal metric trees.
Proceedings of the 1999 ICDCS Workshop on Self-stabilizing Systems, 1999

The alternator.
Proceedings of the 1999 ICDCS Workshop on Self-stabilizing Systems, 1999

General and Scalable State Feedback for Multimedia Systems.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

1998
Time-shift scheduling - fair scheduling of flows in high-speed networks.
IEEE/ACM Trans. Netw., 1998

Secure Group Communications Using Key Graphs.
SIGCOMM, 1998

Maximizable Routing Metrics.
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998

Accelerated Heartbeat Protocols.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

1997
Flow theory.
IEEE/ACM Trans. Netw., 1997

The Request Reply Family of Group Routing Protocols.
IEEE Trans. Computers, 1997

Properties of secure transaction protocols.
Computer Networks and ISBN Systems, 1997

Self-Stabilization by Tree Correction.
Chicago J. Theor. Comput. Sci., 1997

The linear alternator.
Proceedings of the 3rd Workshop on Self-stabilizing Systems, 1997

Delay-insensitive stabilization.
Proceedings of the 3rd Workshop on Self-stabilizing Systems, 1997

Inter-stream adaptation for collaborative multimedia applications.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Flow scheduling protocols without real-time clocks.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Balanced Routing.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
The Stabilizing Token Ring in Three Bits.
J. Parallel Distrib. Comput., 1996

Constraint satisfaction as a basis for designing nonmasking fault-tolerance.
J. High Speed Networks, 1996

Systems of Recall Broadcast.
Inf. Sci., 1996

Network Protocols Between Exact Specifications and Pragmatic Implementations.
ACM Comput. Surv., 1996

Group routing without group routing tables: an exercise in protocol design.
Computer Communications, 1996

Memory Requirements for Silent Stabilization (Extended Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Time-Shift Scheduling: Fair Scheduling of Flows in High Speed Networks.
Proceedings of the 1996 International Conference on Network Protocols, 1996

Group Routing without Group Routing Tables.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

Sentries for the Execution of Concurrent Programs.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
A periodic state exchange protocol and its verification.
IEEE Trans. Communications, 1995

Implementation of the Sentry System.
Softw., Pract. Exper., 1995

Modularity and Rule-Based Programming.
International Journal on Artificial Intelligence Tools, 1995

The Triumph and Tribulation of System Stabilization.
Proceedings of the Distributed Algorithms, 9th International Workshop, 1995

Load Balancing: An Exercise in Constrainted Convergence.
Proceedings of the Distributed Algorithms, 9th International Workshop, 1995

A wireless link protocol: design by refinement.
Proceedings of the 1995 International Conference on Network Protocols, 1995

Stabilizing Client/Server Protocols without the Tears.
Proceedings of the Formal Description Techniques VIII, 1995

1994
Distributed Reset.
IEEE Trans. Computers, 1994

The Elusive Atomic Register.
J. ACM, 1994

Stabilizing Observers.
Inf. Process. Lett., 1994

Universal Mobile Addressing in the Internet.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

Protocol synchronization with sparse timestraps.
Proceedings of the Protocol Specification, 1994

A New Approach to Modularity in Rule-Based Programming.
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994

Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance.
Proceedings of the 14th International Conference on Distributed Computing Systems, 1994

Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance.
Proceedings of the Specification of Parallel Algorithms, 1994

1993
Closure and Convergence: A Foundation of Fault-Tolerant Computing.
IEEE Trans. Software Eng., 1993

Rankers: A Classification of Synchronization Problems.
Sci. Comput. Program., 1993

Stabilization and Pseudo-Stabilization.
Distributed Computing, 1993

Convergence of Iteration Systems.
Distributed Computing, 1993

Protocol Verification Made Simple: A Tutorial.
Computer Networks and ISDN Systems, 1993

Flow theory: Verification of rate-reservation protocols.
Proceedings of the 1993 International Conference on Network Protocols, 1993

1992
A Criterion for Atomicity.
Formal Asp. Comput., 1992

The Granularity of Waiting (Extended Abstract).
Proceedings of the Distributed Algorithms, 6th International Workshop, 1992

The Sentry System.
Proceedings of the 11th Symposium on Reliable Distributed Systems, 1992

The Two-Dimensional Window Protocol.
Proceedings of the Protocol Specification, 1992

Asynchronous Unison (Extended Abstract).
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

Closure and Convergence: A Formulation of Fault-Tolerant Computing.
Proceedings of the Digest of Papers: FTCS-22, 1992

1991
Adaptive Programming.
IEEE Trans. Software Eng., 1991

Block acknowledgment: redesigning the window protocol.
IEEE Trans. Communications, 1991

Stabilizing Communication Protocols.
IEEE Trans. Computers, 1991

Maintaining Digital Clocks in Step.
Parallel Processing Letters, 1991

On the Minimum Requirements for Independent Recovery in Distributed Systems.
Inf. Process. Lett., 1991

A New Explanation of the Glitch Phenomenon.
Acta Inf., 1991

Maintaining Digital Clocks In Step.
Proceedings of the Distributed Algorithms, 5th International Workshop, 1991

Protocol engineering (panel session).
Proceedings of the 19th annual conference on Computer Science, 1991

1990
Stabilizing Unison.
Inf. Process. Lett., 1990

The Instability of Self-Stabilization.
Acta Inf., 1990

Convergence/response tradeoffs in concurrent systems.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990

Composite Routing Protocols.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990

Distributed Reset (Extended Abstract).
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1990

Convergence of Iteration Systems (Extended Abstract).
Proceedings of the CONCUR '90, 1990

1989
Token Systems that Self-Stabilize.
IEEE Trans. Computers, 1989

Block Acknowledgement: Redesigning the Window Protocol.
Proceedings of the SIGCOMM '89, 1989

System Simulation and the Sensitivity of Self-Stabilization.
Proceedings of the Mathematical Foundations of Computer Science 1989, 1989

1988
Atomic Semantics of Nonatomic Programs.
Inf. Process. Lett., 1988

Delivery and discrimination: the Seine protocol.
Proceedings of the SIGCOMM '88, 1988

1987
Independent Recovery.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987

The Elusive Atomic Register Revisited.
Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, 1987

1986
Proving Liveness for Networks of Communicating Finite State Machines.
ACM Trans. Program. Lang. Syst., 1986

1985
Proving Liveness and Termination of Systolic Arrays Using Communication Finite State Machines.
IEEE Trans. Software Eng., 1985

A Discipline for Constructing Multiphase Communication Protocols
ACM Trans. Comput. Syst., 1985

On "A Simple Protocol Whose Proof Isńt": The State Machine Approach.
IEEE Trans. Communications, 1985

Priority Networks of Communicating Finite State Machines.
SIAM J. Comput., 1985

Protocol Validation by Fair Progress State Exploration.
Computer Networks, 1985

Modeling physical layer protocols using communicating finite state machines.
Proceedings of the SIGCOMM '85, 1985

1984
On the Progress of Communications between Two Finite State Machines
Information and Control, December, 1984

Closed Covers: To Verify Progress for Communicating Finite State Machines.
IEEE Trans. Software Eng., 1984

Synthesis of Communicating Finite-State Machines with Guaranteed Progress.
IEEE Trans. Communications, 1984

Protocol Validation by Maximal Progress State Exploration.
IEEE Trans. Communications, 1984

An exercise in constructing multi-phase communication protocols.
Computer Communication Review, 1984

On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines.
Proceedings of the Protocol Specification, 1984

On Constructing Multi-Phase Communication Protocols.
Proceedings of the Protocol Specification, 1984

Using Semiouterjoins to Process Queries in Multidatabase Systems.
Proceedings of the Third ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1984

A Technique for Proving Liveness of Communicating Finite State Machines with Examples.
Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, 1984

Communicating Finite State Machines with Priority Channnels.
Proceedings of the Automata, 1984

1983
Unboundedness Detection for a Class of Communicating Finite-State Machines.
Inf. Process. Lett., 1983

An Example for Constructing Communicating Machines by Step-Wise Refinement.
Protocol Specification, Testing, and Verification, 1983

1982
Deadlock Detection for a Class of Communicating Finite State Machine.
Proceedings of the Protocol Specification, 1982

Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies.
Proceedings of the Protocol Specification, 1982

1981
Optimal Semijoin Schedules For Query Processing in Local Distributed Database Systems.
Proceedings of the 1981 ACM SIGMOD International Conference on Management of Data, Ann Arbor, Michigan, April 29, 1981

1980
On the progress of communication between two machines.
Proceedings of the Operating Systems Engineering: Proceedings of the 14th IBM Computer SCience Symposium, 1980

1979
Global and Local Models for the Specification and Verification of Distributed Systems.
Berkeley Workshop, 1979

1978
A Hierarchial Controller for Concurrent Accessing of Distributed Databases.
Proceedings of the Papers of the Fourth Workshop on Computer Architecture for Non-Numeric Processing, 1978

1976
On the Modelling, Analysis and Design of Protocols - A Special Class of Software Structures.
Proceedings of the 2nd International Conference on Software Engineering, 1976

Protocol Machines: A Concise Formal Model and its Automatic Implementation.
Proceedings of the Third International Conference on Computer Communication, 1976


  Loading...