| 2008 |
| 37 | EE | Rena Bakhshi,
Wan Fokkink,
Jun Pang,
Jaco van de Pol:
Leader Election in Anonymous Rings: Franklin Goes Probabilistic.
IFIP TCS 2008: 57-72 |
| 36 | EE | Jun Pang,
Zhengqin Luo,
Yuxin Deng:
On Automatic Verification of Self-Stabilizing Population Protocols.
TASE 2008: 185-192 |
| 35 | EE | Jun Pang,
Zhengqin Luo,
Yuxin Deng:
On automatic verification of self-stabilizing population protocols.
Frontiers of Computer Science in China 2(4): 357-367 (2008) |
| 34 | EE | Wan Fokkink,
Jun Pang,
Anton Wijs:
Is Timed Branching Bisimilarity a Congruence Indeed?
Fundam. Inform. 87(3-4): 287-311 (2008) |
| 2007 |
| 33 | EE | Zhengqin Luo,
Xiaojuan Cai,
Jun Pang,
Yuxin Deng:
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.
ACNS 2007: 87-103 |
| 32 | EE | Werner Damm,
Stefan Disch,
Hardi Hungar,
Swen Jacobs,
Jun Pang,
Florian Pigorsch,
Christoph Scholl,
Uwe Waldmann,
Boris Wirtz:
Exact State Set Representations in the Verification of Linear Hybrid Systems with Large Discrete State Space.
ATVA 2007: 425-440 |
| 31 | EE | Wan Fokkink,
Allard Kakebeen,
Jun Pang:
Adapting the UPPAAL Model of a Distributed Lift System.
FSEN 2007: 81-97 |
| 30 | EE | Werner Damm,
Alfred Mikschl,
Jens Oehlerking,
Ernst-Rüdiger Olderog,
Jun Pang,
André Platzer,
Marc Segelken,
Boris Wirtz:
Automating Verification of Cooperation, Control, and Design in Traffic Applications.
Formal Methods and Hybrid Real-Time Systems 2007: 115-169 |
| 29 | EE | Yongjian Li,
Jun Pang:
Extending the Strand Space Method to Verify Kerberos V.
PDCAT 2007: 437-444 |
| 28 | EE | Stefan Blom,
Jens R. Calame,
Bert Lisser,
Simona Orzan,
Jun Pang,
Jaco van de Pol,
Muhammad Torabi Dashti,
Anton Wijs:
Distributed Analysis with mu CRL: A Compendium of Case Studies.
TACAS 2007: 683-689 |
| 27 | EE | Yuxin Deng,
Catuscia Palamidessi,
Jun Pang:
Weak Probabilistic Anonymity.
Electr. Notes Theor. Comput. Sci. 180(1): 55-76 (2007) |
| 26 | EE | Tom Chothia,
Jun Pang,
Muhammad Torabi Dashti:
Keeping Secrets in Resource Aware Components.
Electr. Notes Theor. Comput. Sci. 190(3): 79-94 (2007) |
| 25 | EE | Jun Pang,
Wan Fokkink,
Rutger F. H. Hofman,
Ronald Veldema:
Model checking a cache coherence protocol of a Java DSM implementation.
J. Log. Algebr. Program. 71(1): 1-43 (2007) |
| 2006 |
| 24 | EE | Werner Damm,
Stefan Disch,
Hardi Hungar,
Jun Pang,
Florian Pigorsch,
Christoph Scholl,
Uwe Waldmann,
Boris Wirtz:
Automatic Verification of Hybrid Systems with Large Discrete State Space.
ATVA 2006: 276-291 |
| 23 | EE | Yuxin Deng,
Jun Pang,
Peng Wu:
Measuring Anonymity with Relative Entropy.
Formal Aspects in Security and Trust 2006: 65-79 |
| 22 | EE | Yongjian Li,
Jun Pang:
Generalized Unsolicited Tests for Authentication Protocol Analysis.
PDCAT 2006: 509-514 |
| 21 | EE | Tom Chothia,
Simona Orzan,
Jun Pang,
Muhammad Torabi Dashti:
A Framework for Automatically Checking Anonymity with mu CRL.
TGC 2006: 301-318 |
| 20 | EE | Yuxin Deng,
Tom Chothia,
Catuscia Palamidessi,
Jun Pang:
Metrics for Action-labelled Quantitative Transition Systems.
Electr. Notes Theor. Comput. Sci. 153(2): 79-96 (2006) |
| 19 | EE | Wan Fokkink,
Jun Pang,
Jaco van de Pol:
Cones and foci: A mechanical framework for protocol verification.
Formal Methods in System Design 29(1): 1-31 (2006) |
| 18 | EE | Wan Fokkink,
Jun Pang:
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM.
J. UCS 12(8): 981-1006 (2006) |
| 2005 |
| 17 | EE | Wan Fokkink,
Jun Pang,
Anton Wijs:
Is Timed Branching Bisimilarity an Equivalence Indeed?.
FORMATS 2005: 258-272 |
| 16 | EE | Yuxin Deng,
Catuscia Palamidessi,
Jun Pang:
Compositional Reasoning for Probabilistic Finite-State Behaviors.
Processes, Terms and Cycles 2005: 309-337 |
| 15 | EE | Wan Fokkink,
Jun Pang:
Simplifying Itai-Rodeh Leader Election for Anonymous Rings.
Electr. Notes Theor. Comput. Sci. 128(6): 53-68 (2005) |
| 14 | EE | Wan Fokkink,
Jun Pang:
Formal Verification of Timed Systems Using Cones and Foci.
Electr. Notes Theor. Comput. Sci. 139(1): 105-122 (2005) |
| 13 | EE | Bahareh Badban,
Wan Fokkink,
Jan Friso Groote,
Jun Pang,
Jaco van de Pol:
Verification of a sliding window protocol in µCRL and PVS.
Formal Asp. Comput. 17(3): 342-388 (2005) |
| 12 | | Wan Fokkink,
Jaap-Henk Hoepman,
Jun Pang:
A Note on K-State Self-stabilization in a Ring with K=N.
Nord. J. Comput. 12(1): 18-26 (2005) |
| 2004 |
| 11 | EE | Wan Fokkink,
Jan Friso Groote,
Jun Pang,
Bahareh Badban,
Jaco van de Pol:
Verifying a Sliding Window Protocol in µCRL.
AMAST 2004: 148-163 |
| 10 | EE | Lu Yan,
Kaisa Sere,
Xinrong Zhou,
Jun Pang:
Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications.
FTDCS 2004: 312-318 |
| 9 | EE | Jun Pang,
Jaco van de Pol,
Miguel Valero Espada:
Abstraction of Parallel Uniform Processes with Data.
SEFM 2004: 14-23 |
| 8 | EE | Bixin Li,
Xiaocong Fan,
Jun Pang,
Jianjun Zhao:
Model for Slicing JAVA Programs Hierarchically.
J. Comput. Sci. Technol. 19(6): 848-858 (2004) |
| 2003 |
| 7 | EE | Wan Fokkink,
Jun Pang:
Cones and Foci for Protocol Verification Revisited.
FoSSaCS 2003: 267-281 |
| 6 | EE | Jun Pang,
Bart Karstens,
Wan Fokkink:
Analyzing the Redesign of a Distributed Lift System in UPPAAL.
ICFEM 2003: 504-522 |
| 5 | EE | Jun Pang,
Wan Fokkink,
Rutger F. H. Hofman,
Ronald Veldema:
Model Checking a Cache Coherence Protocol for a Java DSM Implementation.
IPDPS 2003: 238 |
| 4 | EE | Jan Friso Groote,
Jun Pang,
Arno G. Wouters:
Analysis of a distributed system for lifting trucks.
J. Log. Algebr. Program. 55(1-2): 21-56 (2003) |
| 2002 |
| 3 | EE | Jun Pang:
Analysis of a Security Protocol in µCRL.
ICFEM 2002: 396-400 |
| 2001 |
| 2 | EE | Yunfeng Wang,
Jun Pang,
Ming Zha,
Zhaohui Yang,
Guoliang Zheng:
A Formal Software Development Approach Using Refinement Calculus.
J. Comput. Sci. Technol. 16(3): 251-262 (2001) |
| 1999 |
| 1 | EE | Yunfeng Wang,
Bixin Li,
Jun Pang,
Ming Zha,
Guoliang Zheng:
A Formal Software Development Approach Based on COOZ and Refinement Calculus.
TOOLS (31) 1999: 261-266 |