Change search
ReferencesLink to record
Permanent link

Direct link
Protocol Log Analysis with Constraint Programming
RISE, Swedish ICT, SICS. Computer Systems Laboratory.
SICStus Prolog.
SICStus Prolog.
Number of Authors: 3
2014 (English)Conference paper (Refereed)
Abstract [en]

Testing a telecommunication protocol often requires protocol log analysis. A protocol log is a sequence of messages with timestamps. Protocol log analysis involves checking that the content of messages and timestamps are correct with respect to the protocol specification. We model the protocol specification using constraint programming (MiniZinc), and we present an approach where a constraint solver is used to perform protocol log analysis. Our case study is the Public Warning System service, which is a part of the Long Term Evolution (LTE) 4G standard.

Place, publisher, year, edition, pages
2014, 7. 17-26 p.
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:ri:diva-24334OAI: oai:DiVA.org:ri-24334DiVA: diva2:1043414
Conference
SMT 2014, 12th International Workshop on Satisfiability Modulo Theories
Projects
SICStus Prolog
Available from: 2016-10-31 Created: 2016-10-31

Open Access in DiVA

fulltext(409 kB)3 downloads
File information
File name FULLTEXT01.pdfFile size 409 kBChecksum SHA-512
ba20e6a58a7fafb919af3dc70c960855c0cfec43778e59c859a6cc9ffda9fbf1e1ee7a0d1ba839216c63dc337eac7357967c409ddd08d643f03c881d9c2cb549
Type fulltextMimetype application/pdf

Other links

http
By organisation
SICS
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 3 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 5 hits
ReferencesLink to record
Permanent link

Direct link