Search the dblp DataBase
Wuxu Peng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Wuxu Peng , S. Purushothaman Empty Stack Pushdown Omega-Tree Automata. [Citation Graph (0, 0)][DBLP ] CAAP, 1992, pp:248-264 [Conf ] Wuxu Peng , S. Purushothaman A Unified Approach to the Deadlock Detection Problem in Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] CAV, 1990, pp:243-252 [Conf ] James Holt , Wuxu Peng An Innovative Routing Protocol Evaluation Tool. [Citation Graph (0, 0)][DBLP ] ICCCN, 1997, pp:524-0 [Conf ] James F. Holt , Wuxu Peng Improving the PIM Routing Protocol with Adaptive Switching Mechanism between Its Two Sparse Sub-Modes. [Citation Graph (0, 0)][DBLP ] ICCCN, 1998, pp:768-773 [Conf ] Wuxu Peng Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis. [Citation Graph (0, 0)][DBLP ] ICCCN, 1995, pp:656- [Conf ] Wuxu Peng , Kia Makki On Reachability Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] ICCCN, 1995, pp:58- [Conf ] Wuxu Peng , Yalin Wang 0002 , Kia Makki Dynamic Key Management for Secure Routing In LCMRMG. [Citation Graph (0, 0)][DBLP ] ICCCN, 2004, pp:227-232 [Conf ] John Dell , Kia Makki , Niki Pissinou , Wuxu Peng Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. [Citation Graph (0, 0)][DBLP ] PDPTA, 1997, pp:1229-1238 [Conf ] Wuxu Peng , S. Purushothaman Towards Dataflow Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] PODC, 1989, pp:45-58 [Conf ] Wuxu Peng , S. Purushothaman Analysis of a Class of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1992, v:29, n:6/7, pp:499-522 [Journal ] Wuxu Peng , Kia Makki Reachability and reverse reachability analysis of CFSMs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:8, pp:668-674 [Journal ] Wuxu Peng , Kia Makki A modular methodology to verify communication protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:12, pp:1069-1077 [Journal ] Wuxu Peng , S. Purushothaman Iyer A New Typee of Pushdown Automata on Infinite Trees. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 1995, v:6, n:2, pp:169-186 [Journal ] Wuxu Peng , Kia Makki Petri Nets and Self-Stabilization of Communication Protocols. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 1996, v:20, n:1, pp:- [Journal ] Wuxu Peng Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis. [Citation Graph (0, 0)][DBLP ] MONET, 1997, v:2, n:3, pp:251-257 [Journal ] Wuxu Peng , Kia Makki Lossy Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2004, v:25, n:3-4, pp:433-448 [Journal ] Wuxu Peng , S. Purushothaman Data Flow Analysis of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1991, v:13, n:3, pp:399-442 [Journal ] Wuxu Peng , Shamila Makki The CSMA/DM LAN protocol. [Citation Graph (0, 0)][DBLP ] Int. J. Communication Systems, 2006, v:19, n:8, pp:897-914 [Journal ] Search in 0.023secs, Finished in 0.024secs