About 72 item dissertation in line with Formal method query results,the following is 1 to 50(Search took 0.069 seconds)

  1. Research on C/S Architectural Style Based on XYZ/SE,LiuManXia/Hunan University,0/7
  2. The Formal Modeling of Network Protocols and Discovery of Attacks Based on Model Checking,MengGuoZhu/Tianjin University,0/37
  3. Study on Theory and Applications of Security Protocols Formal Analysis,LuLaiFeng/Xi'an University of Electronic Science and Technology,0/260
  4. Formal Research of UML Behavior Diagram Based on Description Logic,RongXianQiu/Lanzhou University of Technology,1/39
  5. Formal Verification and Implementation of Shared Memory IPC Mechanism,GuFei/Lanzhou University,1/87
  6. Formal Modeling and Verification Research of Automatic Train Protection System,XiongXiJiao/East China Normal University,0/46
  7. Research on AADL model generation based on B method,WangRiLei/Northwestern University,1/40
  8. Formalization and Model Checking Methods of System Security Model Based on UMLsec,WeiRan/Shandong University,0/7
  9. The Research on Software Modeling Methods Based on B Method,YangLiLi/Northeast Normal University,0/34
  10. Research on Component Formal Semantic and Combination,ZhaoShuo/Zhejiang Normal University,0/29
  11. Research on the Design and Development Methods for Safety-Critical Software,GuanAiAi/Zhejiang University,0/32
  12. The Research of Formal Transformation and Verification of UML,ZhangYang/Taiyuan University of Technology,0/1
  13. The Research of Formal Modeling Technology of Software Requirements Based on the Event-B,ChenZhiHui/University of Electronic Science and Technology,0/9
  14. Study on the Application of Formal Method in Component-based Real-time System,XiLin/Zhengzhou University,1/180
  15. Research on Formal Verification Methods of Model of Complicated Information System,ZhangTao/Harbin Engineering University,1/284
  16. The Socket Communication Program Analysis System Based on SPIN,YuLiQuan/Nanchang University,1/56
  17. The Research of WPKI-based Authentication Protocol in LTE/SAE,XuMingSong/Hunan University,0/14
  18. Research on Security of Access in LTE,WangLiangChen/Xi'an University of Electronic Science and Technology,0/151
  19. Research and Application of Formal Method for Software Development Based on Components,YaoQuanZhu/Xi'an University of Technology,0/542
  20. Researching of Implementation of High Level Secure Trusted Operationg System,HuJun/Institute of Electronics,2/815
  21. Research on the Formalization of Semantic Features and Behavior Composition for Real-Time Service Component,JinXianLi/Beijing University of Posts and Telecommunications,1/320
  22. The Research on Service Composition in Service-Oriented Computing,LiaoJun/University of Electronic Science and Technology,5/1342
  23. Research on Formal Methods in Arithmetic Circuit Verification,WangHaiXia/Institute of Computing Technology,1/218
  24. Proving and Testing the Functional Correctness of Distributed Systems,LvYi/Institute of Computing Technology,0/305
  25. The Study on Formal Modeling and Verification of High-speed Railway Train Control System,CaoYuan/Beijing Jiaotong University,0/286
  26. A Research on Design and Formal Construction of Trusted Routing Protocols in Mobile Ad-hoc Networks,HuangWenChao/University of Science and Technology of China,0/254
  27. Research into Information Streamline and Z Specification for Virtual Manufacturing Environments,ZhaoXiaoFeng/Shandong University,0/129
  28. Research on Building and Evaluating Method of Conceptual Model of Complex Simulation System,WangYong/Harbin Institute of Technology,1/278
  29. Research on Transforming Requirements Specification to Software Architecture Models of Embedded Software,ZhuYi/Nanjing University of Aeronautics and Astronautics,1/264
  30. Formal Description and Verification of 2PCP Based on Asynchronous π-calculus,ZhangFan/National University of Defense Science and Technology,0/88
  31. Research on Model Checking of Concurrent System Based on Partial-order Reduction,WangZuo/Northwestern University,2/155
  32. Analyzing and Modeling of IPSec for Electric System Communications,DuanWeiWei/Jiangsu University,0/48
  33. The Automatic Analysis System for Network Authentication Protocols,LiJing/Nanchang University,1/147
  34. The Implement of Protocol Test Executing System and the Conformance Test of IPv6 Neighbor Discovery Protocol,SunMeiFei/Inner Mongolia University,5/147
  35. The Research and Application of Some Key Technologies of Information Security,WangChangJing/Jiangxi Normal University,1/354
  36. Researching of the Formal Method Based Fuzzy Math,WangXiaoFan/Xi'an University of Technology,0/139
  37. Security Protocol Formal Verification Method,DongJun/Guizhou University,2/178
  38. Research and Application of Two Kinds of Interface Design Pattern Orientied Code Automatic Generation,WuHaiGang/Shandong University,3/190
  39. Application Research on B Method and Component Technology in Formal Development of Information System,ZhangZhiFeng/Xi'an University of Technology,0/216
  40. The Research and Application of Software Architecture Based on UML and Formal Method,ZhangWenJing/North China Electric Power University (Hebei),4/317
  41. Information Fusion Model and Form Research,GuanChunHua/Jiangxi University of Finance,4/422
  42. Research on Application of Formal Method to Reverse Engineering,MaZhuGen/Changsha University of Science and Technology,1/198
  43. The Applied Research of Formal Method and Model Checking in Early Requirement Engineering,WangTianZhou/Zhejiang University of Technology,1/133
  44. The SET Protocol Payment Process Analysis and Model Checking,HuangZuo/Guizhou University,2/210
  45. String space analysis of security protocols,ZuoLingYing/University of Electronic Science and Technology,2/97
  46. Research on Applications of Formal Method in Component-Based Software Reuse,ZhuJianLin/Hebei University,4/218
  47. Study on Algebraic Model of Cryptographic Protocols and Algorithm of Security Analysis,WangYongBao/Beijing University of Posts and Telecommunications,1/75
  48. CLUSTER multi-level management of complex business applications key technology research,LiuDanJun/Institute of Computing Technology,0/21
  49. The Study of Hardware Verification in Theorem Prover HOL,ChenBo/Lanzhou University,2/76
  50. Security Protocol Analysis and Verification Based on Model Checker SPIN,SunShouQing/Lanzhou University,3/331

Total 2 Pages First Previous 1 2 Next Last

© 2012 www.DissertationTopic.Net  Mobile