[1] |
LIU Zi-yuan, MA Zhan-you, LI Xia, GAO Ying-nan, HE Na-na, HUANG Rui-qi.
Fuzzy computation tree logic* model checking based on fuzzy measures
[J]. Computer Engineering & Science, 2024, 46(04): 676-683.
|
[2] |
LI Zhao-kai, MA Zhan-you, LI Jian-xiang, GUO Hao.
Model checking of fuzzy computation tree logic based on fuzzy decision process
[J]. Computer Engineering & Science, 2022, 44(02): 266-275.
|
[3] |
CHEN Yang, WANG Tao.
Study on the relationship between discrete and continuous enhanced Karnik-Mendel algorithms in type-reduction of higher-order fuzzy system
[J]. Computer Engineering & Science, 2021, 43(11): 2027-2034.
|
[4] |
CHEN Yang, WANG Tao.
Type-reduction of general type-2 fuzzy logic systems and sampling-based discrete Nie-Tan algorithms
[J]. Computer Engineering & Science, 2021, 43(05): 936-943.
|
[5] |
LI Yi-hui, LIU Zuo-jun, LI Jie.
A multi-objective optimization algorithm of switched reluctance generator based on fuzzy logic NSGA-Ⅲ
[J]. Computer Engineering & Science, 2021, 43(03): 542-550.
|
[6] |
CHEN Yang, WANG Tao.
A binary-search enhanced Karnik-Mendel algorithm for type-reduction of general type-2 fuzzy logic system
[J]. Computer Engineering & Science, 2020, 42(08): 1448-1453.
|
[7] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(07): 1197-1207.
|
[8] |
CHEN Yang, WANG Tao.
Centroid type-reduction of interval type-2 fuzzy
logic systems and three weighted Nie-Tan algorithms
[J]. Computer Engineering & Science, 2020, 42(04): 733-740.
|
[9] |
YUAN Shen,WEI Jielin,LI Yongming.
Model checking of generalized possibilistic
computation tree logic with multi-valued decision process
[J]. Computer Engineering & Science, 2019, 41(01): 88-97.
|
[10] |
ZHONG Xiaomei,XIAO Meihua,LI Wei,CHEN Jia,LI Yanan.
Formal analysis and improvement of RCIA:
An ultra-lightweight RFID- mutual authentication protocol
[J]. Computer Engineering & Science, 2018, 40(12): 2183-2192.
|
[11] |
WANG Yapeng,LEI Lihui.
Formal verification of gastric adenocarcinoma
core pathway based on CTL model checking
[J]. Computer Engineering & Science, 2018, 40(12): 2280-2286.
|
[12] |
LEI Lihui,GUO Yue,ZHANG Yanbo.
Symbolic CTL model checking based on possibility measure
[J]. Computer Engineering & Science, 2018, 40(11): 2008-2014.
|
[13] |
XIAO Mei-hua1,MEI Ying-tian1,2,LI Wei1,LI Ya-nan1,ZHONG Xiao-mei1,SONG Zi-fan1.
Security analysis of Nayak-T protocol
based on time stamp and private key signature
[J]. Computer Engineering & Science, 2017, 39(12): 2252-2259.
|
[14] |
ZHANG Qiang-yu,QI Jian-dong,HE Yi.
A topology control algorithm in wireless
sensor networks based on fuzzy control
[J]. Computer Engineering & Science, 2017, 39(08): 1444-1449.
|
[15] |
LIN Zhe-chao,DONG Wei.
Implementation and optimization of
LTL probabilistic model checker
[J]. Computer Engineering & Science, 2017, 39(05): 892-896.
|