咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 11 篇 计算机科学与技术...
    • 5 篇 信息与通信工程
    • 4 篇 软件工程
    • 4 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
  • 6 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 24 篇 formal method
  • 4 篇 model checking
  • 2 篇 self fault-toler...
  • 2 篇 protocols
  • 1 篇 hiring problem
  • 1 篇 petri net
  • 1 篇 symmetric key cr...
  • 1 篇 mutual authentic...
  • 1 篇 theorem proving
  • 1 篇 loet
  • 1 篇 fresh ciphertext
  • 1 篇 security commerc...
  • 1 篇 modeling
  • 1 篇 security protoco...
  • 1 篇 privilege separa...
  • 1 篇 software product...
  • 1 篇 higher-order log...
  • 1 篇 payment protocol
  • 1 篇 strand space mod...
  • 1 篇 authentication t...

机构

  • 1 篇 college of softw...
  • 1 篇 state key labora...
  • 1 篇 guangxi universi...
  • 1 篇 东南大学
  • 1 篇 西安交通大学
  • 1 篇 state key labora...
  • 1 篇 institute of sci...
  • 1 篇 computer science...
  • 1 篇 department of co...
  • 1 篇 automation depar...
  • 1 篇 department of el...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 school of softwa...
  • 1 篇 university of ni...
  • 1 篇 college of compu...
  • 1 篇 college of compu...
  • 1 篇 dept. of compute...
  • 1 篇 school of inform...

作者

  • 1 篇 makoto sakai
  • 1 篇 ryo yanase
  • 1 篇 yanwen chen
  • 1 篇 eric madelaine
  • 1 篇 guangxuan chen
  • 1 篇 wang changjing
  • 1 篇 zhang tong
  • 1 篇 li layuan
  • 1 篇 ding jie
  • 1 篇 zhong xiaomei
  • 1 篇 satoshi yamane
  • 1 篇 蒋睿
  • 1 篇 qiuchen yang
  • 1 篇 xiao deqin
  • 1 篇 张冠华
  • 1 篇 jianpeng zhao
  • 1 篇 feng jianzhao
  • 1 篇 hu jun
  • 1 篇 胡爱群
  • 1 篇 somboun tern

语言

  • 21 篇 英文
  • 3 篇 中文
检索条件"主题词=formal method"
24 条 记 录,以下是1-10 订阅
排序:
A formal method for Developing Algebraic and Numerical Algorithms
收藏 引用
Wuhan University Journal of Natural Sciences 2021年 第2期26卷 191-199页
作者: ZUO Zhengkang SU Wei LIANG Zanyang HUANG Qing WANG Yuan WANG Changjing College of Computer Information Engineering Jiangxi Normal UniversityNanchang 330022JiangxiChina College of Software Jiangxi Normal UniversityNanchang 330022JiangxiChina
The development of algebraic and numerical algorithms is a kind of complicated creative work and it is difficult to guarantee the correctness of the algorithms. This paper introduces a systematic and unified formal de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Timed-pNets: a communication behavioural semantic model for distributed systems
收藏 引用
Frontiers of Computer Science 2015年 第1期9卷 87-110页
作者: Yanwen CHEN Yixiang CHEN Eric MADELAINE MoE Engineering Research Center for Software/Hardware Co-design Technology and Application Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai 200062 China INRIA Sophia Antipolis Mediterannee Sophia Antipolis 06902 France University of Nice Sophia Antipolis CNRS Sophia Antipolis 06900 France
This paper presents an approach to build a communication behavioural semantic model for heterogeneous distributed systems that include synchronous and asynchronous communications. Since each node of such system has it... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Remove Irrelevant Atomic Formulas for Timed Automaton Model Checking
收藏 引用
Journal of Computer Science & Technology 2006年 第1期21卷 41-51页
作者: 赵建华 李宣东 郑滔 郑国梁 State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 P.R. China Department of Computer Science and Technology Nanjing University Nanjing 210093 P.R. China
Most of the timed automata reachability analysis algorithms in the literature explore the state spaces by enumeration of symbolic states, which use time constraints to represent a set of concrete states. A time constr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
LTL Formulae to Bchi Automata Translation Using on-the-Fly De-generalization
收藏 引用
Chinese Journal of Electronics 2015年 第4期24卷 674-678页
作者: SHAN Laixiang QIN Zheng Department of Computer Science and Technology Tsinghua University School of Software Tsinghua University
In this paper, we present a conversion algorithm to translate a Linear temporal logic(LTL) formula to a Bu¨chi automaton(BA) directly. Acceptance degree(AD) is presented to record acceptance conditions satisfied in e... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Net-structure-based conditions to decide compatibility and weak compatibility for a class of inter-organizational workflow nets
收藏 引用
Science China(Information Sciences) 2015年 第7期58卷 128-143页
作者: LIU GuanJun JIANG ChangJun Department of Computer Science Tongji University Key Laboratory of the Ministry of Education for Embedded System and Service Computing Tongji University
Inter-organizational workflow nets(IWF-nets) can well model the interactions among multiple processes by sending/receiving messages. Compatibility and weak compatibility are crucial properties for *** latter guarantee... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Semantics-Based Approachfor Achieving Self Fault-Tolerance of Protocols
收藏 引用
Journal of Computer Science & Technology 2000年 第2期15卷 176-183页
作者: 李腊元 李春林 Department of Computer Science & Technology Wuhan Transportation University Wuhan P.R. China
The cooperation of different processes may be lost by mistake when a protocol is executed. The protocol cannot be normally operated under this condition. In this paper,the self fault-tolerance of protocols is discuss... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
formally Analyzing Expected Time Complexity of Algorithms Using Theorem Proving
收藏 引用
Journal of Computer Science & Technology 2010年 第6期25卷 1305-1320页
作者: Osman Hasan Sofiène Tahar Department of Electrical and Computer Engineering Concordia University
Probabilistic techniques are widely used in the analysis of algorithms to estimate the computational complexity of algorithms or a computational ***,such analyses are performed using paper-and-pencil proofs and the re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events
收藏 引用
Chinese Journal of Electronics 2022年 第1期31卷 79-88页
作者: ZHONG Xiaomei XIAO Meihua ZHANG Tong YANG Ke LUO Yunxian School of Software East China Jiaotong University
The increasing commercialization and massive deployment of radio frequency identification(RFID) systems has raised many security related issues which in return evokes the need of security protocols. Logic of events th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic Scheduling Policy for Patient Flow in a Smart Environment
收藏 引用
Chinese Journal of Electronics 2017年 第3期26卷 530-536页
作者: CHEN Xiao DING Jie Nigel Thomas School of Computer Science and Communication Engineering Jiangsu University State Key Laboratory of Software Development Environment Beihang University School of Information Engineering Yangzhou University School of Computing Science Newcastle University
Given the popularity of smart environment in a hospital involving the participation of a large group of patients,scheduling of patients towards their desired destination is still being a challenging *** the developmen... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Privilege Separation method for Security Commercial Transactions
收藏 引用
China Communications 2010年 第6期7卷 94-99页
作者: Chen Yasha Hu Jun Sun Yu Gai Xinmao Department of Electrical and Information Engineering Naval University of Engineering Wuhan 430033 P. R China School of Computer Beijing University of Technology Beijing 100124 P. R. China School of Computer National University of Defense Technology Changsha 410073 P. R. China
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论