[1] |
XIE Na, TAN Wenan, CAO Yan, ZHAO Lu.
Modeling and Analysis of Security Information Flow in Mobile Edge Computing
[J]. Computer Engineering, 2022, 48(5): 35-42,52.
|
[2] |
LIU Yang, GAO Shiguo.
Research on Privacy Protection in Social Network Based on Stochastic Model Checking
[J]. Computer Engineering, 2021, 47(5): 144-153.
|
[3] |
LIN Rongfeng, SHI Jian, ZHU Yanqing, SHEN Yiwei, ZHOU Yu.
Formal Verification Framework of SCADE Model Based on STP Method
[J]. Computer Engineering, 2019, 45(10): 70-77.
|
[4] |
REN Shengbing,ZHANG Jianwei,WU Bin,WANG Zhijian.
SMT-based Distributed Bounded Model Checking in Spark
[J]. Computer Engineering, 2017, 43(6): 19-23,29.
|
[5] |
TANG Zhengyi,WANG Jinshui,HE Dongwei,XUE Xingsi,HU Wenyu.
Formal Modeling and Verification of Feeder Automation Algorithm
[J]. Computer Engineering, 2016, 42(3): 89-93.
|
[6] |
ZHAO Lu,ZHANG Jianpei,YANG Jing.
Stateful Dynamic Partial-order Reduction Method of Shrinking Candidate Backtrack Set
[J]. Computer Engineering, 2015, 41(5): 70-76.
|
[7] |
XU Xingwang,LUO Xiangyu.
Verification of Web Services Based on MAS Model Checking and Abstraction
[J]. Computer Engineering, 2015, 41(3): 26-31,36.
|
[8] |
LAO Jiaqi,WEN Zhonghua,WU Xiaohui,TANG Jie.
A Fast Algorithm for Solving Strong Planning Solution
[J]. Computer Engineering, 2015, 41(3): 162-166.
|
[9] |
WU Xiaohui,WEN Zhonghua,LI Yang,LAO Jiaqi.
Multi-Agent Strong Planning Algorithmwith Weight in Nondeterministic Planning
[J]. Computer Engineering, 2015, 41(1): 190-195.
|
[10] |
LONG Feng,WEN Zhonghua,TANG Jie,WANG Jinzong.
Fast Solving Algorithm of Reachability Relation in Uncertain Planning
[J]. Computer Engineering, 2015, 41(1): 196-199.
|
[11] |
TIAN Zhi-hui, JIN Zhi-gang, WANG Ying.
Safety Analysis and Improvement of EAP-MD5 Protocol
[J]. Computer Engineering, 2014, 40(6): 95-98,103.
|
[12] |
KOU Gong-Shao, ZHANG Zi-Nan, MA Jun.
RFID Mutual Authentication Based on Physical Unclonable Function
[J]. Computer Engineering, 2013, 39(6): 142-145.
|
[13] |
TU Ying.
Research Review on Interaction Test of Composite Service
[J]. Computer Engineering, 2013, 39(5): 78-83.
|
[14] |
DONG Yu, SHUI Jing, LI Lei.
Formal Modeling and Verification of CTCS-2 Train Control System
[J]. Computer Engineering, 2013, 39(3): 12-15.
|
[15] |
JI Ming-yu, WANG Hai-tao, CHEN Zhi-yuan.
Verification Method of Probabilistic Computation Tree Logic Based on Automaton
[J]. Computer Engineering, 2013, 39(12): 285-289.
|