中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 15)

Filters    
Items/Page:    Sort:
An integrated framework of formal methods for interaction behaviors among industrial equipments [期刊论文]
MICROPROCESSORS AND MICROSYSTEMS, 2015-01-01, 卷号: 39, 期号: 8, 页码: 1296-1304
Deng, P; Ren, G; Yuan, W; Chen, F; Hua, QS
  |  
 
A vertex centric parallel algorithm for linear temporal logic model checking in Pregel [期刊论文]
Journal of Parallel and Distributed Computing, 2014-01-01, 卷号: 74, 期号: 11, 页码: 3161-3174
Xie, Miao (1); Yang, Qiusong (1); Zhai, Jian (1); Wang, Qing (1)

 
some improvements to the cost-based framework for analyzing denial of service attacks [会议论文]
Trusted Systems Third International Conference, INTRUST 2011, Beijing China, 2011
Yue Qinggang; Liu Feng; Xue Rui

 
a petri net-based model for verification of obligations and accountability in cooperative systems [期刊论文]
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2009-01-01, 卷号: 39, 期号: 2, 页码: 299-308
Du YuYue; Jiang ChangJun; Zhou MengChu

 
distinguishing between automatic and manual aspects of model driven development [会议论文]
13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems, Potsdam, GERMANY, MAR 27-30,
Duan Yucong; Gu Yuqing; Cheung S. C.; Fu Xiaolan; Wang Jing; Hu Qingwu
  |  
 
distinguishing between automatic and manual aspects of model driven development [会议论文]
13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems, Potsdam, GERMANY, MAR 27-30,
Duan Yucong; Gu Yuqing; Cheung S. C.; Fu Xiaolan; Wang Jing; Hu Qingwu
  |  
 
enforcing the principle of least privilege with a state-based privilege control model [会议论文]
1st Information Security Practice and Experience Conference, Singapore, SINGAPORE, APR 11-14,
Liang B; Liu H; Shi WC; Wu YJ
  |  
 
a xml-based composition event approach as an integration and cooperation middleware [会议论文]
International Symposium on Trustworthy Global Computing, Edinburgh, SCOTLAND, APR 07-09,
Xu G; Ma JG; Huang T

 
a formal description of secimos operating system [期刊论文]
COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005-01-01, 卷号: 3685, 页码: 286-297
Zhou ZY; Liang B; Jiang L; Shi WC; He YP
  |  
 
a new formal model for privilege control with supporting posix capability mechanism [期刊论文]
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005-01-01, 卷号: 48, 期号: 1, 页码: 46-66
Ji QG; Qing SH; He YP
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace