SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | LI Layuan, LI Chunlin. A Semantics-Based Approach for Achieving Self Fault-Tolerance of Protocols[J]. Journal of Computer Science and Technology, 2000, 15(2): 176-183. |
[1] |
Li Layuan. A formal specification technique for communication protocols. In Proc. IEEE INFOCOM,1989.
|
[2] |
Leo Caccian, Cmar Rafiq. Validation of protocols with temporal constraints. Comput. Commun., 1996, 10(14): 1188-119.
|
[3] |
Li Layuan. Theory and Technology of LAN. Beijing: Defence Industry Press, 1997, pp.271-312. ……….
|
[1] | Rui Xue, Deng-Guo Feng. New Semantic Model for Authentication Protocols in ASMs[J]. Journal of Computer Science and Technology, 2004, 19(4). |
[2] | XU Mingwei, WU Jianping. A Formal Approach to Protocol Performance Testing[J]. Journal of Computer Science and Technology, 1999, 14(1): 81-87. |
[3] | Xu Dianxiang, Zheng Guoliang. Towards a Declarative Semantics of Inheritance with Exceptions[J]. Journal of Computer Science and Technology, 1996, 11(1): 61-71. |
[4] | Xu Manwu, Lu Jianfeng, Zeng Fancong, Dai Jinwn. A Formal Semantics for DAI Language NUML[J]. Journal of Computer Science and Technology, 1995, 10(3): 227-238. |
[5] | Hock C. Chan. Translational Semantics for a Conceptual Level Query Language[J]. Journal of Computer Science and Technology, 1995, 10(2): 175-187. |
[6] | Wang Huaimin, Chen Huowang. A Constructor-Based EI-Model Semantics of EI-CTRS[J]. Journal of Computer Science and Technology, 1995, 10(1): 85-96. |
[7] | Jin Zhi. The Structure and Semantics of an Object-Oriented Logic Programming Language: SCKE[J]. Journal of Computer Science and Technology, 1995, 10(1): 74-84. |
[8] | Shao Zhiqing. A Standard Model-Theoretic Approach to Operational Semantics of Recursive Programs[J]. Journal of Computer Science and Technology, 1993, 8(2): 59-65. |
[9] | Jiang Changjun, Wu Zhehui. Net Operations[J]. Journal of Computer Science and Technology, 1992, 7(4): 333-344. |
[10] | Zhu Mingyuan. Two Congruent Semantics for Prolog with CUT[J]. Journal of Computer Science and Technology, 1990, 5(1): 82-91. |