Results 141-148 of 148.
Bookmark and Share    
Full Text
Peer Reviewed
See detailImproving automatic verification of security protocols with XOR
Chen, Xihui UL; van Deursen, Ton UL; Pang, Jun UL

in Proc. 11th International Conference on Formal Engineering Methods (2009)

Detailed reference viewed: 113 (2 UL)
Full Text
Peer Reviewed
See detailHow to work with honest but curious judges? (preliminary report)
Pang, Jun UL; Zhang, C.

in Proc. 7th International Workshop on Security Issues in Concurrency (2009)

Detailed reference viewed: 119 (1 UL)
Full Text
Peer Reviewed
See detailVerification of population ring protocols in PAT
Liu, Y.; Pang, Jun UL; Sun, J. et al

in Proc. 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009)

Detailed reference viewed: 107 (1 UL)
Full Text
Peer Reviewed
See detailPAT: Towards flexible verification under fairness
Sun, J.; Liu, Y.; Dong, J.-S. et al

in Proc. 21th International Conference on Computer Aided Verification (2009)

Detailed reference viewed: 192 (1 UL)
Full Text
Peer Reviewed
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun UL; Luo, Zhengqin; Deng, Yuxin

in Proceedings of 2nd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'08) (2008)

Detailed reference viewed: 88 (5 UL)
Full Text
Peer Reviewed
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun UL; Luo, Z.; Deng, Y.

in Frontiers of Computer Science in China (2008), 2(4), 357367

Detailed reference viewed: 112 (1 UL)
Full Text
Peer Reviewed
See detailIs timed branching bisimilarity a congruence indeed?
Fokkink, W. J.; Pang, Jun UL; Wijs, A. J.

in Fundamenta Informaticae (2008), 87(3-4), 287311

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailLeader election in anonymous rings: Franklin goes probabilistic
Bakhshi, R.; Fokkink, W. J.; Pang, Jun UL et al

in Proc. 5th IFIP Conference on Theoretical Computer Science (2008)

Detailed reference viewed: 92 (2 UL)