About 311 item dissertation in line with model checking query results,the following is 1 to 50(Search took 0.095 seconds)

  1. Research on Trustworthiness of Resource Adaptability for Internetware,XiaZuo/Anhui University of Engineering,0/7
  2. Clocks Manipulation Applying to the Formal Verificationof Timed System,GuiYaYun/Shanghai University,0/1
  3. The Formal Analysis of Security Protocol,GaoGaiQin/Zhejiang Normal University,0/36
  4. Model Checking of FlexRay Communication Protocol,GuoXiaoZuo/Tianjin University,0/0
  5. Modeling and Analysis on the Wayside-to-Train Communication Subsystem of CTCS Level-3,QuanHongYu/Beijing Jiaotong University,0/9
  6. Research of Analysis Method in RBC Based on Model Checking,SongHaiFeng/Beijing Jiaotong University,0/12
  7. Research for Aircraft System Deductive Safety Analysis Method Based on Formal Model Checking,MaJingLiang/Nanjing University of Aeronautics and Astronautics,0/4
  8. An Empirical Test of Rational Bubbles in Chinese Stock Market,FanShengChao/Shandong University,0/133
  9. The Search of Parallel and Complete Model Checking Technology,WuXiaoJuan/University of Electronic Science and Technology,0/3
  10. Bread First Search Based Model Checking,XueLei/University of Electronic Science and Technology,0/12
  11. Research and Application on Key Technologies of Model Checking,LiuZhiFeng/Nanjing University,0/229
  12. Survivability Analysis and Verification Method Based on Probability Model Checking,ZhangBing/Zhengzhou University,0/121
  13. Research on Safety Verification Techniques for Logic Control,TianFengQi/Northeastern University,0/9
  14. The Research for State Reachability Relation of Uncertain Planning via Model Checking,HuYuLong/Xiangtan University,0/3
  15. The Research of Effective Model Checking for Network Authentication Protocol,TanZhiHua/Hunan University,0/7
  16. The Formal Modeling of Network Protocols and Discovery of Attacks Based on Model Checking,MengGuoZhu/Tianjin University,0/37
  17. Research on Network Security Evalutation Technology Based on Attack Graph Model,ChengYeXia/Shanghai Jiaotong University,0/72
  18. Formal model checking based authentication protocol,GuoZhaoYi/University of Electronic Science and Technology,0/125
  19. The Improvement and Application of the PPTL Model Checker,ZhangXiaoXing/Xi'an University of Electronic Science and Technology,1/17
  20. The Research on the Security of the RFID Mutal Authentication Protocol Base on EPC C1G2,RongJiFang/Hunan University,0/19
  21. Toward Generating Optimization Actions of Twig Pattern,LiuKe/Beijing University of Technology,0/2
  22. Process Calculus with Data Structure and Its Model Checking Algorithm,ZhengQing/Nanjing University of Aeronautics and Astronautics,0/17
  23. Formal Modeling and Verification Research of Automatic Train Protection System,XiongXiJiao/East China Normal University,0/46
  24. The Extension and Application of the Modeling,Simulation and Verification Tool,GuoXia/Xi'an University of Electronic Science and Technology,1/6
  25. Research on the Model Checking Algorithm Using Hadoop,WeiGuang/North China University of,0/76
  26. Research of Ada Program Model Checking Based on Program Slicing,HuangChao/Nanjing University of Aeronautics and Astronautics,0/20
  27. A Research and Implementation Based on Enterprise Service Bus with Rule Engine,ZuoDaQiang/Hangzhou University of Electronic Science and Technology,0/33
  28. Aircraft System Safety Analysis Method Research Based on Model Checking,LiuChao/Nanjing University of Aeronautics and Astronautics,0/69
  29. UML Consistency Checking and Test Case Generation Based on Model Checking,DuJie/Nanjing University of Aeronautics and Astronautics,0/93
  30. Software Trustworthiness Mesurement Based on Model Checking,HanZuo/Beijing University of Technology,0/89
  31. Software Evolution Process Models Verification Based on Symbolic Model Checking,LiuJinZhuo/Yunnan University,0/63
  32. Research on Lazy Slicing-based Model Checking,HuangHongTao/Harbin Engineering University,0/101
  33. Testing and Verification Methods Based on UML2.0Models,ZhangZuo/Xi'an University of Electronic Science and Technology,1/158
  34. Research on Model Driven Development of Business Process Software,DengJian/University of Electronic Science and Technology,1/173
  35. Research on Formal Verification Methods of Model of Complicated Information System,ZhangTao/Harbin Engineering University,1/284
  36. The Socket Communication Program Analysis System Based on SPIN,YuLiQuan/Nanchang University,1/56
  37. Research on Identification of Steganography Software Based on Model Checking,ZhaoZheng/PLA Information Engineering University,0/5
  38. Research on Detection Techniques of Instruction-triggered Hardware Trojan Horse,GaoHongBo/PLA Information Engineering University,0/10
  39. Application of model checking to the formal verification of security protocols,ChenYaJun/University of Electronic Science and Technology,0/119
  40. Research on Temporal Logic to Assertion Graphs,LinLiXiu/University of Electronic Science and Technology,0/7
  41. Lattice-valued Quantitative Verification of State Transition Systems,PanHaiYu/East China Normal University,0/52
  42. LTL Model Checking Based on Possibility Measure,LiLiJun/Shaanxi Normal University,0/83
  43. Formal Verification and Analysis of SIP Protocol Using Timed Coloured Petri Net,MaYuanFei/Inner Mongolia University,1/59
  44. WCET Analysis of Multicore Real-Time Systems with Shared Buses,GuoYing/Northeastern University,0/20
  45. Research on Verification of The Multi-core Processor Memory Systems,LvZheng/Northwestern University,0/40
  46. Model checking method based on memory and state management,WangYongHu/University of Electronic Science and Technology,0/21
  47. Modeling and Analyzing Wireless Sensor Network Protocols with Stochastic Timed Automata and Statistical Model Checking,ZhangFengLing/Nanjing University,0/37
  48. Verification and Analysis of Self-organization Protocols of Sensor Networks Based on Model Checking,PengZuo/Nanjing University of Posts and Telecommunications,0/33
  49. Toward the Routing Protocol of Automatic Meter Reading System Based on WSN,HeKang/Beijing University of Technology,0/30
  50. Research on Public Key Cryptographic Algorithm Recognition Technology,ZhangJingWei/PLA Information Engineering University,0/33

Total 7 Pages First Previous 1 2 3 4 5 6 7 Next Last

© 2012 www.DissertationTopic.Net  Mobile