| [1] |
XU Xuezheng, FANG Jian, LIANG Shaojie, WANG Lu, HUANG Anwen, SUI Jinggao, LI Qiong.
Rubyphi:Automated model checking for Cache coherence protocols in gem5
[J]. Computer Engineering & Science, 2025, 47(7): 1141-1151.
|
| [2] |
MING Zhiyong1, 2, 3, WANG Yisong2, 3, FENG Renyan4.
Bounded model checking of HyperCTL* based on QBF
[J]. Computer Engineering & Science, 2025, 47(6): 1062-1070.
|
| [3] |
LIU Zi-yuan, MA Zhan-you, LI Xia, GAO Ying-nan, HE Na-na, HUANG Rui-qi.
Fuzzy computation tree logic* model checking based on fuzzy measures
[J]. Computer Engineering & Science, 2024, 46(4): 676-683.
|
| [4] |
BAI Xian-ping, YAO Xi-xin, CHEN Xiang-lan, LIU Chong, LI Xi.
An AADL end-to-end flow specification verification method based on timed automata
[J]. Computer Engineering & Science, 2023, 45(5): 810-819.
|
| [5] |
LI Zhao-kai, MA Zhan-you, LI Jian-xiang, GUO Hao.
Model checking of fuzzy computation tree logic based on fuzzy decision process
[J]. Computer Engineering & Science, 2022, 44(2): 266-275.
|
| [6] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(7): 1197-1207.
|
| [7] |
YUAN Shen,WEI Jielin,LI Yongming.
Model checking of generalized possibilistic
computation tree logic with multi-valued decision process
[J]. Computer Engineering & Science, 2019, 41(1): 88-97.
|
| [8] |
ZHONG Xiaomei,XIAO Meihua,LI Wei,CHEN Jia,LI Yanan.
Formal analysis and improvement of RCIA:
An ultra-lightweight RFID- mutual authentication protocol
[J]. Computer Engineering & Science, 2018, 40(12): 2183-2192.
|
| [9] |
WANG Yapeng,LEI Lihui.
Formal verification of gastric adenocarcinoma
core pathway based on CTL model checking
[J]. Computer Engineering & Science, 2018, 40(12): 2280-2286.
|
| [10] |
LEI Lihui,GUO Yue,ZHANG Yanbo.
Symbolic CTL model checking based on possibility measure
[J]. Computer Engineering & Science, 2018, 40(11): 2008-2014.
|
| [11] |
LIN Zhe-chao,DONG Wei.
Implementation and optimization of
LTL probabilistic model checker
[J]. Computer Engineering & Science, 2017, 39(5): 892-896.
|
| [12] |
XIAO Mei-hua1,MEI Ying-tian1,2,LI Wei1,LI Ya-nan1,ZHONG Xiao-mei1,SONG Zi-fan1.
Security analysis of Nayak-T protocol
based on time stamp and private key signature
[J]. Computer Engineering & Science, 2017, 39(12): 2252-2259.
|
| [13] |
YUAN Hong-juan1,2,MA Yan-fang3,PAN Hai-yu1,2.
Model checking for fuzzy alternating-time temporal logic
[J]. Computer Engineering & Science, 2017, 39(12): 2290-2296.
|
| [14] |
CHENG Daolei,XIAO Meihua,LIU Xinqian,MEI Yingtian,LI Wei.
Analyzing and verifying an open authorization
protocol OAuth 2.0 with SPIN
[J]. J4, 2015, 37(11): 2121-2127.
|
| [15] |
MA Zhanyou1,2,LI Yongming1.
Computation tree logic model checking for
generalized possibilistic decision processes
[J]. J4, 2015, 37(11): 2162-2168.
|