H. Attiya and J. Welch, Distributed Computing, 2004.
DOI : 10.1002/0471478210

T. Benzel, Design, Deployment, and Use of the Deter Testbed, Proc. DETER Community Workshop on Cyber Security Experimentation and Test, 2007.

P. Bokor, M. Serafini, N. Suri, and H. Veith, Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support, Proc. ICFEM, pp.147-166, 2009.
DOI : 10.1007/978-3-642-10373-5_8

T. D. Chandra, Paxos made live, Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, PODC '07, pp.398-407, 2007.
DOI : 10.1145/1281100.1281103

M. Chaouch-saad, V. Charron-bost, and S. Merz, A Reduction Theorem for the Verification of Round-Based Distributed Algorithms, Proc. Reachability Problems, pp.93-106, 2009.
DOI : 10.1007/3-540-48153-2_6

URL : https://hal.archives-ouvertes.fr/inria-00408908

B. Charron-bost and A. , Schiper The Heard-Of Model: Computing in Distributed Systems with Benign Failures, Distr. Comp., To Appear, 2009.

E. Clarke, O. Grumberg, and D. Peled, Model Checking, 2000.

D. L. Dill, Protocol Verif. as a Hardware Design Aid, Proc. ICCD, pp.522-525, 1992.

L. Lamport, The part-time parliament, ACM Transactions on Computer Systems, vol.16, issue.2, pp.133-169, 1998.
DOI : 10.1145/279227.279229

L. Lamport, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982.
DOI : 10.1145/357172.357176

A. Miller, Symmetry in temporal logic model checking, ACM Computing Surveys, vol.38, issue.3, p.8, 2006.
DOI : 10.1145/1132960.1132962