The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wuxu Peng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wuxu Peng, S. Purushothaman
    Empty Stack Pushdown Omega-Tree Automata. [Citation Graph (0, 0)][DBLP]
    CAAP, 1992, pp:248-264 [Conf]
  2. Wuxu Peng, S. Purushothaman
    A Unified Approach to the Deadlock Detection Problem in Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    CAV, 1990, pp:243-252 [Conf]
  3. James Holt, Wuxu Peng
    An Innovative Routing Protocol Evaluation Tool. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1997, pp:524-0 [Conf]
  4. James F. Holt, Wuxu Peng
    Improving the PIM Routing Protocol with Adaptive Switching Mechanism between Its Two Sparse Sub-Modes. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:768-773 [Conf]
  5. Wuxu Peng
    Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1995, pp:656- [Conf]
  6. Wuxu Peng, Kia Makki
    On Reachability Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1995, pp:58- [Conf]
  7. Wuxu Peng, Yalin Wang 0002, Kia Makki
    Dynamic Key Management for Secure Routing In LCMRMG. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:227-232 [Conf]
  8. John Dell, Kia Makki, Niki Pissinou, Wuxu Peng
    Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:1229-1238 [Conf]
  9. Wuxu Peng, S. Purushothaman
    Towards Dataflow Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    PODC, 1989, pp:45-58 [Conf]
  10. Wuxu Peng, S. Purushothaman
    Analysis of a Class of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1992, v:29, n:6/7, pp:499-522 [Journal]
  11. Wuxu Peng, Kia Makki
    Reachability and reverse reachability analysis of CFSMs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:8, pp:668-674 [Journal]
  12. Wuxu Peng, Kia Makki
    A modular methodology to verify communication protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:12, pp:1069-1077 [Journal]
  13. Wuxu Peng, S. Purushothaman Iyer
    A New Typee of Pushdown Automata on Infinite Trees. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 1995, v:6, n:2, pp:169-186 [Journal]
  14. Wuxu Peng, Kia Makki
    Petri Nets and Self-Stabilization of Communication Protocols. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 1996, v:20, n:1, pp:- [Journal]
  15. Wuxu Peng
    Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis. [Citation Graph (0, 0)][DBLP]
    MONET, 1997, v:2, n:3, pp:251-257 [Journal]
  16. Wuxu Peng, Kia Makki
    Lossy Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2004, v:25, n:3-4, pp:433-448 [Journal]
  17. Wuxu Peng, S. Purushothaman
    Data Flow Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1991, v:13, n:3, pp:399-442 [Journal]
  18. Wuxu Peng, Shamila Makki
    The CSMA/DM LAN protocol. [Citation Graph (0, 0)][DBLP]
    Int. J. Communication Systems, 2006, v:19, n:8, pp:897-914 [Journal]

Search in 0.165secs, Finished in 0.166secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002