[1] |
LIU Zi-yuan, MA Zhan-you, LI Xia, GAO Ying-nan, HE Na-na, HUANG Rui-qi.
Fuzzy computation tree logic* model checking based on fuzzy measures
[J]. Computer Engineering & Science, 2024, 46(04): 676-683.
|
[2] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
[3] |
NIU Kun, GAO Zhong-he, ZHANG Fan.
An improved VIRE location algorithm for the whole region
[J]. Computer Engineering & Science, 2022, 44(09): 1602-1609.
|
[4] |
LI Zhao-kai, MA Zhan-you, LI Jian-xiang, GUO Hao.
Model checking of fuzzy computation tree logic based on fuzzy decision process
[J]. Computer Engineering & Science, 2022, 44(02): 266-275.
|
[5] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(07): 1197-1207.
|
[6] |
YANG Fan1,2,REN Shou-gang3,XU Huan-liang3,SUN Yuan-hao2,YANG Xing2.
A RFID tag number estimation algorithm
based on bit estimation
[J]. Computer Engineering & Science, 2020, 42(03): 449-455.
|
[7] |
LI Feng-ying,YANG En-yi,DONG Rong-sheng.
Summary of graph data compression technologies
[J]. Computer Engineering & Science, 2020, 42(01): 89-97.
|
[8] |
HUANG Yihao,FENG Jincao,ZHENG Hanyue,MIAO Weikai,PU Geguang.
A formal engineering method for requirement
modeling of airborne embedded control software
[J]. Computer Engineering & Science, 2019, 41(06): 1016-1025.
|
[9] |
JIN Peng1,XI Tao1,WANG Lijing2.
An improved positioning algorithm for scenic areas
based on two times weighted LANDMARC
[J]. Computer Engineering & Science, 2019, 41(03): 485-489.
|
[10] |
YUAN Shen,WEI Jielin,LI Yongming.
Model checking of generalized possibilistic
computation tree logic with multi-valued decision process
[J]. Computer Engineering & Science, 2019, 41(01): 88-97.
|
[11] |
WANG Yapeng,LEI Lihui.
Formal verification of gastric adenocarcinoma
core pathway based on CTL model checking
[J]. Computer Engineering & Science, 2018, 40(12): 2280-2286.
|
[12] |
LEI Lihui,GUO Yue,ZHANG Yanbo.
Symbolic CTL model checking based on possibility measure
[J]. Computer Engineering & Science, 2018, 40(11): 2008-2014.
|
[13] |
LI Song1,SUN Ziwen1,2.
PUF based authentication protocol in
mobile and largescale RFID systems
[J]. Computer Engineering & Science, 2018, 40(06): 1046-1053.
|
[14] |
CHEN Ying1,LIU Dongmei1,ZHU Hong2,LAN Bin1,HE Juanjuan1.
Algebraic specifications of service composition
[J]. Computer Engineering & Science, 2018, 40(06): 1075-1083.
|
[15] |
LI Ya-nan,XIAO Mei-hua,LI Wei,MEI Ying-tian,ZHONG Xiao-mei.
Security proof of wireless mesh network
authentication protocol based on logic of events
[J]. Computer Engineering & Science, 2017, 39(12): 2236-2244.
|