| [1] |
XU Xuezheng, FANG Jian, LIANG Shaojie, WANG Lu, HUANG Anwen, SUI Jinggao, LI Qiong.
Rubyphi:Automated model checking for Cache coherence protocols in gem5
[J]. Computer Engineering & Science, 2025, 47(7): 1141-1151.
|
| [2] |
LIU Yongmei1, 2, WANG Guohui1, GUAN Yong2, ZHANG Jingzhi2, SHI Zhiping1, 2, DONG Lu1.
Formal verification of Stokes’ theorem and its applications
[J]. Computer Engineering & Science, 2025, 47(6): 1050-1061.
|
| [3] |
JIA Haozhou, XU Peng , WANG Danchen, XU Yang, .
A RFID mutual authentication protocol based on a novel confusion operation
[J]. Computer Engineering & Science, 2025, 47(2): 247-255.
|
| [4] |
LIU Yong-mei, WANG Guo-hui, GUAN Yong, ZHANG Jing-zhi, SHI Zhi-ping, DONG Lu .
Formal verification of Greens theorem and its applications
[J]. Computer Engineering & Science, 2023, 45(7): 1178-1187.
|
| [5] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(7): 1197-1207.
|
| [6] |
ZHANG Jian-min,LI Tie-jun,MA Ke-fan,XIAO Li-quan.
Research advances in the solving methods of
satisfiability modulo theories based on first-order logic
[J]. Computer Engineering & Science, 2019, 41(12): 2119-2126.
|
| [7] |
WANG Yapeng,LEI Lihui.
Formal verification of gastric adenocarcinoma
core pathway based on CTL model checking
[J]. Computer Engineering & Science, 2018, 40(12): 2280-2286.
|
| [8] |
REN Hongmin,LIU Jin.
Component Substitutability Analysis Based on Behavior Protocols
[J]. J4, 2012, 34(12): 74-80.
|
| [9] |
YE Jun,TAN Qingping,LI Tun.
A Survey on the Formal Verification of FeatureOriented Programming
[J]. J4, 2010, 32(9): 89-94.
|
| [10] |
.
[J]. J4, 2008, 30(10): 67-68.
|
| [11] |
.
[J]. J4, 2007, 29(10): 7-10.
|
| [12] |
.
[J]. J4, 2006, 28(1): 22-24.
|