[1] |
SUN Jing, LI Shuo, ZHAO Huiqun.
Research on automatic generation of basic path test cases
[J]. Computer Engineering and Applications, 2018, 54(20): 48-53.
|
[2] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[3] |
YAN Yawei, ZHOU Yanzhou, HUI Wentao.
Research on application of model checking in integrity formal verification
[J]. Computer Engineering and Applications, 2017, 53(4): 59-63.
|
[4] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|
[5] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[6] |
XIA Chunrui1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Probabilistic model checking for path planning in dynamic environment
[J]. Computer Engineering and Applications, 2016, 52(12): 5-11.
|
[7] |
HUANG Yankai, ZHOU Yu, WEI Ou.
Novel approach for attributed graph grammar response specification verification
[J]. Computer Engineering and Applications, 2016, 52(12): 15-18.
|
[8] |
WANG Ming1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Verification of mobile robot obstacle avoidance strategies in uncertain environment based on formal modeling and probabilistic analysis
[J]. Computer Engineering and Applications, 2016, 52(10): 31-38.
|
[9] |
PAN Wenlin.
Research on local semantic conflicts instantly check methods for ORM model
[J]. Computer Engineering and Applications, 2015, 51(18): 144-150.
|
[10] |
ZHANG Shuqing, XU Zhongwei, CHEN Zuxi.
Research on modeling and verification methods of interlocking system based on term rewriting system
[J]. Computer Engineering and Applications, 2014, 50(3): 49-54.
|
[11] |
CAO Zhen, CAO Min.
Test-oriented component model and test case generation method
[J]. Computer Engineering and Applications, 2014, 50(22): 59-64.
|
[12] |
WANG Changda1,2, DONG Xuegang1, ZHOU Conghua1,2.
Security analysis of E-bank online-payment based on UCON
[J]. Computer Engineering and Applications, 2014, 50(16): 90-94.
|
[13] |
TONG Chao, WANG Jianxin, QI Jiandong.
Approach of constructing defect rule base and detecting source code based on formal specification
[J]. Computer Engineering and Applications, 2014, 50(13): 66-72.
|
[14] |
YOU Qifang, YANG Jinji.
Model checking of SIP protocol via SPIN
[J]. Computer Engineering and Applications, 2014, 50(13): 87-89.
|
[15] |
LV Wei, HUANG Zhiqiu, CHEN Zhe, KAN Shuanglong, WEI Ou.
ESpin:SPIN-based Eclipse model checking environment
[J]. Computer Engineering and Applications, 2013, 49(7): 45-51.
|