Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001. ,
DOI : 10.1145/964723.383071
Analysis of the evolution of peer-to-peer systems, Proceedings of the twenty-first annual symposium on Principles of distributed computing , PODC '02, pp.233-242, 2002. ,
DOI : 10.1145/571825.571863
Chord: a scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.17-32, 2003. ,
DOI : 10.1109/TNET.2002.808407
Reasoning About Identifier Spaces: How to Make Chord Correct, IEEE Transactions on Software Engineering, vol.43, issue.12, pp.1144-1156, 2017. ,
DOI : 10.1109/TSE.2017.2655056
, A practical comparison of Alloy and SPIN, Formal Aspects of Computing, vol.27, issue.2, p.239, 2015.
, Using lightweight modeling to understand Chord, ACM SIG- COMM Computer Communication Review, vol.42, issue.2, pp.49-57, 2012.
, Why the Chord ring-maintenance protocol is not correct, AT&T Research Tech. Rep, Tech. Rep, 2011.
, Lightweight Modeling of Network Protocols in Alloy, 2009.
Lightweight specification and analysis of dynamic systems with rich configurations, Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2016, 2016. ,
DOI : 10.1145/2185376.2185383
URL : https://hal.archives-ouvertes.fr/hal-01355062
Software Abstractions: logic, language, and analysis, 2012. ,
Logic in Computer Science: Modelling and reasoning about systems, 2004. ,
DOI : 10.1017/CBO9780511810275
Symbolic model checking without BDDs, " in Tools and Algorithms for the Construction and Analysis of Systems, pp.193-207, 1999. ,
Bounded Model Checking of Temporal Formulas with Alloy, International Conference on Abstract State Machines, Alloy, pp.303-308, 2014. ,
DOI : 10.1007/978-3-662-43652-3_29
NuSMV: A New Symbolic Model Verifier, Computer Aided Verification, 11th International Conference, CAV '99, pp.495-499, 1999. ,
DOI : 10.1007/3-540-48683-6_44
The nuXmv Symbolic Model Checker, Computer Aided Verification -26th International Conference , CAV 2014, Held as Part of the Vienna Summer of Logic, pp.334-342, 2014. ,
DOI : 10.1007/978-3-319-08867-9_22
Proposition of an Action Layer for Electrum, Abstract State Machines, pp.397-402, 2018. ,
DOI : 10.1007/978-3-642-30885-7_11
URL : https://hal.archives-ouvertes.fr/hal-01774920
Verdi: a framework for implementing and formally verifying distributed systems, Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.357-368, 2015. ,
DOI : 10.1145/2737924.2737958
URL : http://dl.acm.org/ft_gateway.cfm?id=2737958&type=pdf
Ivy: safety verification by interactive generalization, Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2016, pp.614-630, 2016. ,
DOI : 10.1145/2980983.2908118
Reducing liveness to safety in first-order logic, Proceedings of the ACM on Programming Languages, vol.2, issue.POPL, pp.1-2633, 2018. ,
DOI : 10.1145/2737924.2737958
URL : http://dl.acm.org/ft_gateway.cfm?id=3158114&type=pdf
Verification of Peer-to-peer Algorithms: A Case Study, Electronic Notes in Theoretical Computer Science, vol.181, pp.35-47, 2007. ,
DOI : 10.1016/j.entcs.2007.01.052
URL : https://doi.org/10.1016/j.entcs.2007.01.052
Towards Verification of the Pastry Protocol using, 31st IFIP International Conference on Formal Techniques for Networked and Distributed Systems, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00593523
Fault Tolerant Active Rings for Structured Peer-to-Peer Overlays, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, pp.18-25, 2005. ,
DOI : 10.1109/LCN.2005.69
URL : http://www.ee.unsw.edu.au/~timm/pubs/05lcn_p2p/final.pdf