| [1] |
MING Zhiyong1, 2, 3, WANG Yisong2, 3, FENG Renyan4.
Bounded model checking of HyperCTL* based on QBF
[J]. Computer Engineering & Science, 2025, 47(6): 1062-1070.
|
| [2] |
XIE Yang, LI Chen, CHEN Xiaowen.
A near-data processing architecture for data-intensive applications
[J]. Computer Engineering & Science, 2025, 47(5): 797-810.
|
| [3] |
LIU Zi-yuan, MA Zhan-you, LI Xia, GAO Ying-nan, HE Na-na, HUANG Rui-qi.
Fuzzy computation tree logic* model checking based on fuzzy measures
[J]. Computer Engineering & Science, 2024, 46(4): 676-683.
|
| [4] |
LI Zhao-kai, MA Zhan-you, LI Jian-xiang, GUO Hao.
Model checking of fuzzy computation tree logic based on fuzzy decision process
[J]. Computer Engineering & Science, 2022, 44(2): 266-275.
|
| [5] |
LUO Li, ZHOU Hong-wei, ZHOU Li, PAN Guo-teng, ZHOU Hai-liang, LIU Bin.
QoS design and verification of direct connection interface for multi-core processors
[J]. Computer Engineering & Science, 2021, 43(4): 620-627.
|
| [6] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(7): 1197-1207.
|
| [7] |
YUAN Shen,WEI Jielin,LI Yongming.
Model checking of generalized possibilistic
computation tree logic with multi-valued decision process
[J]. Computer Engineering & Science, 2019, 41(1): 88-97.
|
| [8] |
ZHONG Xiaomei,XIAO Meihua,LI Wei,CHEN Jia,LI Yanan.
Formal analysis and improvement of RCIA:
An ultra-lightweight RFID- mutual authentication protocol
[J]. Computer Engineering & Science, 2018, 40(12): 2183-2192.
|
| [9] |
WANG Yapeng,LEI Lihui.
Formal verification of gastric adenocarcinoma
core pathway based on CTL model checking
[J]. Computer Engineering & Science, 2018, 40(12): 2280-2286.
|
| [10] |
LEI Lihui,GUO Yue,ZHANG Yanbo.
Symbolic CTL model checking based on possibility measure
[J]. Computer Engineering & Science, 2018, 40(11): 2008-2014.
|
| [11] |
CHEN Qian,LIU Yun,GAO Yuying.
A parallel dynamic bit vector based frequent
closed sequence pattern mining algorithm
[J]. Computer Engineering & Science, 2018, 40(10): 1717-1725.
|
| [12] |
YANG Sheng-zhe,YU Jun-qing,TANG Jiu-fei.
Dynamic task scheduling and optimization of data flow program
[J]. Computer Engineering & Science, 2017, 39(7): 1201-1210.
|
| [13] |
LIN Zhe-chao,DONG Wei.
Implementation and optimization of
LTL probabilistic model checker
[J]. Computer Engineering & Science, 2017, 39(5): 892-896.
|
| [14] |
DU Qi,JIANG Hao,LI Kuan,PENG Lin,YANG Can-qun.
QTRSM on ARMv8 64-bit multi-core processor
[J]. Computer Engineering & Science, 2017, 39(3): 451-457.
|
| [15] |
XIAO Mei-hua1,MEI Ying-tian1,2,LI Wei1,LI Ya-nan1,ZHONG Xiao-mei1,SONG Zi-fan1.
Security analysis of Nayak-T protocol
based on time stamp and private key signature
[J]. Computer Engineering & Science, 2017, 39(12): 2252-2259.
|