About 72 item dissertation in line with Formal method query results,the following is 1 to 50(Search took 0.069 seconds)
- Research on C/S Architectural Style Based on XYZ/SE,LiuManXia/Hunan University,0/7
- The Formal Modeling of Network Protocols and Discovery of Attacks Based on Model Checking,MengGuoZhu/Tianjin University,0/37
- Study on Theory and Applications of Security Protocols Formal Analysis,LuLaiFeng/Xi'an University of Electronic Science and Technology,0/260
- Formal Research of UML Behavior Diagram Based on Description Logic,RongXianQiu/Lanzhou University of Technology,1/39
- Formal Verification and Implementation of Shared Memory IPC Mechanism,GuFei/Lanzhou University,1/87
- Formal Modeling and Verification Research of Automatic Train Protection System,XiongXiJiao/East China Normal University,0/46
- Research on AADL model generation based on B method,WangRiLei/Northwestern University,1/40
- Formalization and Model Checking Methods of System Security Model Based on UMLsec,WeiRan/Shandong University,0/7
- The Research on Software Modeling Methods Based on B Method,YangLiLi/Northeast Normal University,0/34
- Research on Component Formal Semantic and Combination,ZhaoShuo/Zhejiang Normal University,0/29
- Research on the Design and Development Methods for Safety-Critical Software,GuanAiAi/Zhejiang University,0/32
- The Research of Formal Transformation and Verification of UML,ZhangYang/Taiyuan University of Technology,0/1
- The Research of Formal Modeling Technology of Software Requirements Based on the Event-B,ChenZhiHui/University of Electronic Science and Technology,0/9
- Study on the Application of Formal Method in Component-based Real-time System,XiLin/Zhengzhou University,1/180
- Research on Formal Verification Methods of Model of Complicated Information System,ZhangTao/Harbin Engineering University,1/284
- The Socket Communication Program Analysis System Based on SPIN,YuLiQuan/Nanchang University,1/56
- The Research of WPKI-based Authentication Protocol in LTE/SAE,XuMingSong/Hunan University,0/14
- Research on Security of Access in LTE,WangLiangChen/Xi'an University of Electronic Science and Technology,0/151
- Research and Application of Formal Method for Software Development Based on Components,YaoQuanZhu/Xi'an University of Technology,0/542
- Researching of Implementation of High Level Secure Trusted Operationg System,HuJun/Institute of Electronics,2/815
- Research on the Formalization of Semantic Features and Behavior Composition for Real-Time Service Component,JinXianLi/Beijing University of Posts and Telecommunications,1/320
- The Research on Service Composition in Service-Oriented Computing,LiaoJun/University of Electronic Science and Technology,5/1342
- Research on Formal Methods in Arithmetic Circuit Verification,WangHaiXia/Institute of Computing Technology,1/218
- Proving and Testing the Functional Correctness of Distributed Systems,LvYi/Institute of Computing Technology,0/305
- The Study on Formal Modeling and Verification of High-speed Railway Train Control System,CaoYuan/Beijing Jiaotong University,0/286
- A Research on Design and Formal Construction of Trusted Routing Protocols in Mobile Ad-hoc Networks,HuangWenChao/University of Science and Technology of China,0/254
- Research into Information Streamline and Z Specification for Virtual Manufacturing Environments,ZhaoXiaoFeng/Shandong University,0/129
- Research on Building and Evaluating Method of Conceptual Model of Complex Simulation System,WangYong/Harbin Institute of Technology,1/278
- Research on Transforming Requirements Specification to Software Architecture Models of Embedded Software,ZhuYi/Nanjing University of Aeronautics and Astronautics,1/264
- Formal Description and Verification of 2PCP Based on Asynchronous π-calculus,ZhangFan/National University of Defense Science and Technology,0/88
- Research on Model Checking of Concurrent System Based on Partial-order Reduction,WangZuo/Northwestern University,2/155
- Analyzing and Modeling of IPSec for Electric System Communications,DuanWeiWei/Jiangsu University,0/48
- The Automatic Analysis System for Network Authentication Protocols,LiJing/Nanchang University,1/147
- The Implement of Protocol Test Executing System and the Conformance Test of IPv6 Neighbor Discovery Protocol,SunMeiFei/Inner Mongolia University,5/147
- The Research and Application of Some Key Technologies of Information Security,WangChangJing/Jiangxi Normal University,1/354
- Researching of the Formal Method Based Fuzzy Math,WangXiaoFan/Xi'an University of Technology,0/139
- Security Protocol Formal Verification Method,DongJun/Guizhou University,2/178
- Research and Application of Two Kinds of Interface Design Pattern Orientied Code Automatic Generation,WuHaiGang/Shandong University,3/190
- Application Research on B Method and Component Technology in Formal Development of Information System,ZhangZhiFeng/Xi'an University of Technology,0/216
- The Research and Application of Software Architecture Based on UML and Formal Method,ZhangWenJing/North China Electric Power University (Hebei),4/317
- Information Fusion Model and Form Research,GuanChunHua/Jiangxi University of Finance,4/422
- Research on Application of Formal Method to Reverse Engineering,MaZhuGen/Changsha University of Science and Technology,1/198
- The Applied Research of Formal Method and Model Checking in Early Requirement Engineering,WangTianZhou/Zhejiang University of Technology,1/133
- The SET Protocol Payment Process Analysis and Model Checking,HuangZuo/Guizhou University,2/210
- String space analysis of security protocols,ZuoLingYing/University of Electronic Science and Technology,2/97
- Research on Applications of Formal Method in Component-Based Software Reuse,ZhuJianLin/Hebei University,4/218
- Study on Algebraic Model of Cryptographic Protocols and Algorithm of Security Analysis,WangYongBao/Beijing University of Posts and Telecommunications,1/75
- CLUSTER multi-level management of complex business applications key technology research,LiuDanJun/Institute of Computing Technology,0/21
- The Study of Hardware Verification in Theorem Prover HOL,ChenBo/Lanzhou University,2/76
- Security Protocol Analysis and Verification Based on Model Checker SPIN,SunShouQing/Lanzhou University,3/331
Total 2 Pages First Previous 1 2 Next Last
© 2012 www.DissertationTopic.Net Mobile
|