K. R. Apt and D. Kozen, Limits for automatic verification of finite-state concurrent systems, Information Processing Letters, vol.22, issue.6, pp.307-309, 1986.
DOI : 10.1016/0020-0190(86)90071-2

M. Barnett, B. Y. Chang, R. Deline, B. Jacobs, and K. R. Leino, Boogie: A Modular Reusable Verifier for Object-Oriented Programs, LNCS, vol.4111, pp.364-387, 2005.
DOI : 10.1007/11804192_17

O. Brown and P. Eremenko, The Value Proposition for Fractionated Space Architectures, Space 2006, p.AIAA, 2006.
DOI : 10.2514/6.2006-7506

E. M. Clarke, O. Grumberg, and S. Jha, Verifying parameterized networks, ACM Transactions on Programming Languages and Systems, vol.19, issue.5, pp.726-750, 1997.
DOI : 10.1145/265943.265960

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.8852

G. Delzanno, A. Sangnier, and G. Zavattaro, Verification of Ad Hoc Networks with Node and Communication Failures, LNCS, vol.7273, pp.235-250, 2012.
DOI : 10.1007/978-3-642-30793-5_15

URL : https://hal.archives-ouvertes.fr/hal-00909367

E. A. Emerson and K. S. Namjoshi, On Reasoning About Rings, International Journal of Foundations of Computer Science, vol.20, issue.04, pp.527-550, 2003.
DOI : 10.1145/4904.4999

J. Feng, D. L. Eager, and D. J. Makaroff, Aggregation Protocols for High Rate, Low Delay Data Collection in Sensor Networks, LNCS, vol.1, issue.1, pp.26-39, 2009.
DOI : 10.1016/S1570-8705(03)00015-5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.7146

S. Feo-arenis and B. Westphal, Formal Verification of a Parameterized Data Aggregation Protocol, NASA Formal Methods, pp.428-434, 2013.
DOI : 10.1007/978-3-642-38088-4_29

S. Gobriel, S. Khattab, D. Mossé, J. Brustoloni, and R. Melhem, RideSharing: Fault Tolerant Aggregation in Sensor Networks Using Corrective Actions, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, pp.595-604, 2006.
DOI : 10.1109/SAHCN.2006.288516

M. K. Iskander and A. J. Lee, Privacy and robustness for data aggregation in wireless sensor networks, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.699-701, 2010.
DOI : 10.1145/1866307.1866402

Y. Kesten, A. Pnueli, E. Shahar, and L. D. Zuck, Network Invariants in Action*, LNCS, vol.2421, pp.101-115, 2002.
DOI : 10.1007/3-540-45694-5_8

M. Liu, H. G. Gong, Y. C. Mao, L. J. Chen, and L. Xie, A Distributed Energy-Efficient Data Gathering and Aggregation Protocol for Wireless Sensor Networks, Journal of Software, vol.16, issue.12, pp.2106-2116, 2005.
DOI : 10.1360/jos162106

A. Montresor, M. Jelasity, and O. Babaoglu, Robust aggregation protocols for largescale overlay networks, Dependable Systems and Networks, 2004 International Conference on, pp.19-28, 2004.
DOI : 10.1109/dsn.2004.1311873

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.7854

K. S. Namjoshi and R. J. Trefler, Uncovering Symmetries in Irregular Process Networks, ) VMCAI. LNCS, pp.496-514, 2013.
DOI : 10.1007/978-3-642-35873-9_29

A. Pnueli, S. Ruah, and L. D. Zuck, Automatic Deductive Verification with Invisible Invariants, LNCS, vol.2031, pp.82-97, 2001.
DOI : 10.1007/3-540-45319-9_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.524