Change search
ReferencesLink to record
Permanent link

Direct link
Protocol Log Analysis with Constraint Programming
RISE, Swedish ICT, SICS. Computer Systems Laboratory.
SICStus Prolog.
SICStus Prolog.
Number of Authors: 3
2014 (English)Conference paper (Refereed)
Abstract [en]

Testing a telecommunication protocol often requires protocol log analysis. A protocol log is a sequence of messages with timestamps. Protocol log analysis involves checking that the content of messages and timestamps are correct with respect to the protocol specification. We model the protocol specification using constraint programming (MiniZinc), and we present an approach where a constraint solver is used to perform protocol log analysis. Our case study is the Public Warning System service, which is a part of the Long Term Evolution (LTE) 4G standard.

Place, publisher, year, edition, pages
2014, 7. 17-26 p.
National Category
Computer and Information Science
URN: urn:nbn:se:ri:diva-24334OAI: diva2:1043414
SMT 2014, 12th International Workshop on Satisfiability Modulo Theories
SICStus Prolog
Available from: 2016-10-31 Created: 2016-10-31

Open Access in DiVA

fulltext(409 kB)11 downloads
File information
File name FULLTEXT01.pdfFile size 409 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Other links

By organisation
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 11 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 8 hits
ReferencesLink to record
Permanent link

Direct link