The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jun Pang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wan Fokkink, Jan Friso Groote, Jun Pang, Bahareh Badban, Jaco van de Pol
    Verifying a Sliding Window Protocol in µCRL. [Citation Graph (0, 0)][DBLP]
    AMAST, 2004, pp:148-163 [Conf]
  2. Werner Damm, Stefan Disch, Hardi Hungar, Jun Pang, Florian Pigorsch, Christoph Scholl, Uwe Waldmann, Boris Wirtz
    Automatic Verification of Hybrid Systems with Large Discrete State Space. [Citation Graph (0, 0)][DBLP]
    ATVA, 2006, pp:276-291 [Conf]
  3. Yuxin Deng, Catuscia Palamidessi, Jun Pang
    Compositional Reasoning for Probabilistic Finite-State Behaviors. [Citation Graph (0, 0)][DBLP]
    Processes, Terms and Cycles, 2005, pp:309-337 [Conf]
  4. Wan Fokkink, Jun Pang, Anton Wijs
    Is Timed Branching Bisimilarity an Equivalence Indeed?. [Citation Graph (0, 0)][DBLP]
    FORMATS, 2005, pp:258-272 [Conf]
  5. Wan Fokkink, Jun Pang
    Cones and Foci for Protocol Verification Revisited. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2003, pp:267-281 [Conf]
  6. Lu Yan, Kaisa Sere, Xinrong Zhou, Jun Pang
    Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:312-318 [Conf]
  7. Jun Pang
    Analysis of a Security Protocol in µCRL. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2002, pp:396-400 [Conf]
  8. Jun Pang, Bart Karstens, Wan Fokkink
    Analyzing the Redesign of a Distributed Lift System in UPPAAL. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2003, pp:504-522 [Conf]
  9. Jun Pang, Wan Fokkink, Rutger F. H. Hofman, Ronald Veldema
    Model Checking a Cache Coherence Protocol for a Java DSM Implementation. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:238- [Conf]
  10. Yongjian Li, Jun Pang
    Generalized Unsolicited Tests for Authentication Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:509-514 [Conf]
  11. Jun Pang, Jaco van de Pol, Miguel Valero Espada
    Abstraction of Parallel Uniform Processes with Data. [Citation Graph (0, 0)][DBLP]
    SEFM, 2004, pp:14-23 [Conf]
  12. Yunfeng Wang, Bixin Li, Jun Pang, Ming Zha, Guoliang Zheng
    A Formal Software Development Approach Based on COOZ and Refinement Calculus. [Citation Graph (0, 0)][DBLP]
    TOOLS (31), 1999, pp:261-266 [Conf]
  13. Yuxin Deng, Tom Chothia, Catuscia Palamidessi, Jun Pang
    Metrics for Action-labelled Quantitative Transition Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:153, n:2, pp:79-96 [Journal]
  14. Wan Fokkink, Jun Pang
    Simplifying Itai-Rodeh Leader Election for Anonymous Rings. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:128, n:6, pp:53-68 [Journal]
  15. Wan Fokkink, Jun Pang
    Formal Verification of Timed Systems Using Cones and Foci. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:139, n:1, pp:105-122 [Journal]
  16. Bahareh Badban, Wan Fokkink, Jan Friso Groote, Jun Pang, Jaco van de Pol
    Verification of a sliding window protocol in µCRL and PVS. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2005, v:17, n:3, pp:342-388 [Journal]
  17. Wan Fokkink, Jun Pang, Jaco van de Pol
    Cones and foci: A mechanical framework for protocol verification. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 2006, v:29, n:1, pp:1-31 [Journal]
  18. Bixin Li, Xiaocong Fan, Jun Pang, Jianjun Zhao
    Model for Slicing JAVA Programs Hierarchically. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:6, pp:848-858 [Journal]
  19. Yunfeng Wang, Jun Pang, Ming Zha, Zhaohui Yang, Guoliang Zheng
    A Formal Software Development Approach Using Refinement Calculus. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2001, v:16, n:3, pp:251-262 [Journal]
  20. Jan Friso Groote, Jun Pang, Arno G. Wouters
    Analysis of a distributed system for lifting trucks. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2003, v:55, n:1-2, pp:21-56 [Journal]
  21. Wan Fokkink, Jun Pang
    Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2006, v:12, n:8, pp:981-1006 [Journal]
  22. Wan Fokkink, Jaap-Henk Hoepman, Jun Pang
    A Note on K-State Self-stabilization in a Ring with K=N. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 2005, v:12, n:1, pp:18-26 [Journal]
  23. Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
    Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:87-103 [Conf]
  24. Werner Damm, Stefan Disch, Hardi Hungar, Swen Jacobs, Jun Pang, Florian Pigorsch, Christoph Scholl, Uwe Waldmann, Boris Wirtz
    Exact State Set Representations in the Verification of Linear Hybrid Systems with Large Discrete State Space. [Citation Graph (0, 0)][DBLP]
    ATVA, 2007, pp:425-440 [Conf]
  25. Werner Damm, Alfred Mikschl, Jens Oehlerking, Ernst-Rüdiger Olderog, Jun Pang, André Platzer, Marc Segelken, Boris Wirtz
    Automating Verification of Cooperation, Control, and Design in Traffic Applications. [Citation Graph (0, 0)][DBLP]
    Formal Methods and Hybrid Real-Time Systems, 2007, pp:115-169 [Conf]
  26. Yuxin Deng, Jun Pang, Peng Wu
    Measuring Anonymity with Relative Entropy. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:65-79 [Conf]
  27. Stefan Blom, Jens R. Calame, Bert Lisser, Simona Orzan, Jun Pang, Jaco van de Pol, Muhammad Torabi Dashti, Anton Wijs
    Distributed Analysis with mu CRL: A Compendium of Case Studies. [Citation Graph (0, 0)][DBLP]
    TACAS, 2007, pp:683-689 [Conf]
  28. Wan Fokkink, Allard Kakebeen, Jun Pang
    Adapting the UPPAAL Model of a Distributed Lift System. [Citation Graph (0, 0)][DBLP]
    FSEN, 2007, pp:81-97 [Conf]
  29. Yuxin Deng, Catuscia Palamidessi, Jun Pang
    Weak Probabilistic Anonymity. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:180, n:1, pp:55-76 [Journal]
  30. Tom Chothia, Jun Pang, Muhammad Torabi Dashti
    Keeping Secrets in Resource Aware Components. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:190, n:3, pp:79-94 [Journal]
  31. Jun Pang, Wan Fokkink, Rutger F. H. Hofman, Ronald Veldema
    Model checking a cache coherence protocol of a Java DSM implementation. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2007, v:71, n:1, pp:1-43 [Journal]

  32. Measuring Voter-Controlled Privacy. [Citation Graph (, )][DBLP]


  33. Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition. [Citation Graph (, )][DBLP]


  34. PAT: Towards Flexible Verification under Fairness. [Citation Graph (, )][DBLP]


  35. A novel approach for clustering Chinese blogs by embedded sentiment based on graph similarity. [Citation Graph (, )][DBLP]


  36. Improving Automatic Verification of Security Protocols with XOR. [Citation Graph (, )][DBLP]


  37. Game-Based Verification of Multi-Party Contract Signing Protocols. [Citation Graph (, )][DBLP]


  38. Leader Election in Anonymous Rings: Franklin Goes Probabilistic. [Citation Graph (, )][DBLP]


  39. Extending the Strand Space Method to Verify Kerberos V. [Citation Graph (, )][DBLP]


  40. Brief announcement: asynchronous bounded expected delay networks. [Citation Graph (, )][DBLP]


  41. A priority-expression-based burst scheduling of memory reordering access. [Citation Graph (, )][DBLP]


  42. A Framework for Automatically Checking Anonymity with mu CRL. [Citation Graph (, )][DBLP]


  43. Verification of Population Ring Protocols in PAT. [Citation Graph (, )][DBLP]


  44. On Automatic Verification of Self-Stabilizing Population Protocols. [Citation Graph (, )][DBLP]


  45. Fair-Priority-Expression-Based burst scheduling to enhance performance and fairness of shared dram systems. [Citation Graph (, )][DBLP]


  46. Message from T4CIA Workshop Co-chairs. [Citation Graph (, )][DBLP]


  47. How to Work with Honest but Curious Judges? (Preliminary Report) [Citation Graph (, )][DBLP]


  48. On Probabilistic Alternating Simulations [Citation Graph (, )][DBLP]


  49. Asynchronous Bounded Expected Delay Networks [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002