[1] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[2] |
SUN Haoran1,2, SHI Zhiping1,2,3, GUAN Yong1,3, WANG Rui2,3.
Analysis and formal modeling of puncturing robot’s sports safety
[J]. Computer Engineering and Applications, 2018, 54(18): 263-270.
|
[3] |
WANG Xinyue, GUO Jianquan.
Subsidy strategy model of multi-period closed-loop hybrid system under carbon tax
[J]. Computer Engineering and Applications, 2018, 54(14): 236-240.
|
[4] |
PEI Changfu1, WANG Bin1, XUE Jie2, LIU Hui1, XIONG Xin1.
Spatio-temporal evolution modeling method of brain network based on time automata
[J]. Computer Engineering and Applications, 2018, 54(14): 45-51.
|
[5] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|
[6] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[7] |
XIA Chunrui1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Probabilistic model checking for path planning in dynamic environment
[J]. Computer Engineering and Applications, 2016, 52(12): 5-11.
|
[8] |
HUANG Yankai, ZHOU Yu, WEI Ou.
Novel approach for attributed graph grammar response specification verification
[J]. Computer Engineering and Applications, 2016, 52(12): 15-18.
|
[9] |
WANG Ming1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Verification of mobile robot obstacle avoidance strategies in uncertain environment based on formal modeling and probabilistic analysis
[J]. Computer Engineering and Applications, 2016, 52(10): 31-38.
|
[10] |
ZHANG Shuqing, XU Zhongwei, CHEN Zuxi.
Research on modeling and verification methods of interlocking system based on term rewriting system
[J]. Computer Engineering and Applications, 2014, 50(3): 49-54.
|
[11] |
WANG Changda1,2, DONG Xuegang1, ZHOU Conghua1,2.
Security analysis of E-bank online-payment based on UCON
[J]. Computer Engineering and Applications, 2014, 50(16): 90-94.
|
[12] |
TONG Chao, WANG Jianxin, QI Jiandong.
Approach of constructing defect rule base and detecting source code based on formal specification
[J]. Computer Engineering and Applications, 2014, 50(13): 66-72.
|
[13] |
YOU Qifang, YANG Jinji.
Model checking of SIP protocol via SPIN
[J]. Computer Engineering and Applications, 2014, 50(13): 87-89.
|
[14] |
LV Wei, HUANG Zhiqiu, CHEN Zhe, KAN Shuanglong, WEI Ou.
ESpin:SPIN-based Eclipse model checking environment
[J]. Computer Engineering and Applications, 2013, 49(7): 45-51.
|
[15] |
GAO Chen, BAI Xue, ZHAO Buhui.
Stability analysis of a class of stochastic hybrid systems
[J]. Computer Engineering and Applications, 2013, 49(6): 62-64.
|