@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "wu"' papers.bib}}

@ARTICLE{Norman:08:TSE,
  AUTHOR = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  JOURNAL = {IEEE Transactions of Software Engineering},
  NUMBER = {2},
  PAGES = {209--223},
  RATING = {1},
  TITLE = {Model checking probabilistic and stochastic extensions of the $\pi$-calculus},
  URL = {http://hal.archives-ouvertes.fr/inria-00424856/en/},
  VOLUME = {35},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00424856/en/}
}

@INPROCEEDINGS{Norman:07:QEST,
  AUTHOR = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu},
  BOOKTITLE = {4th International Conference on the Quantitative Evaluation of SysTems (QEST)},
  DATE-MODIFIED = {2009-01-02 03:27:24 +0100},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest1.pdf}. Full version in \url{http://www.lix.polytechnique.fr/~catuscia/papers/2009/TSE.pdf}},
  PAGES = {169-178},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Model checking the probabilistic pi-calculus},
  YEAR = 2007
}

@INPROCEEDINGS{Wu:07:QEST,
  AUTHOR = {Peng Wu and Catuscia Palamidessi and Huimin Lin},
  BOOKTITLE = {Proceedings of 4th International Conference on the Quantitative Evaluation of SysTems (QEST)},
  DATE-MODIFIED = {2007-12-23 00:54:37 +0100},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest2.pdf}},
  PAGES = {179-188},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Symbolic Bisimulation for Probabilistic Systems},
  YEAR = 2007
}

@MISC{Deng:06:PerComm,
  AUTHOR = {Yuxin Deng and Jun Pang and Peng Wu},
  NOTE = {Personal Communication},
  YEAR = 2006
}

@INPROCEEDINGS{Deng:06:FAST,
  AUTHOR = {Yuxin Deng and Jun Pang and Peng Wu},
  BOOKTITLE = {Proc. of the of the 4th Int. Worshop on Formal Aspects in Security and Trust},
  DATE-MODIFIED = {2010-01-04 10:47:03 +0100},
  EDITOR = {T. Dimitrakos and F. Martinelli and P. Y. A. Ryan and S. A. Schneider},
  PAGES = {65--79},
  PUBLISHER = {Springer},
  SERIES = {LNCS},
  TITLE = {Measuring Anonymity with Relative Entropy},
  VOLUME = {4691},
  YEAR = {2006}
}

@ARTICLE{Wu:06:IJSEKE,
  AUTHOR = {Peng WU and Huimin LIN},
  JOURNAL = {International Journal of Software Engineering and Knowledge Engineering},
  NOTE = {\url{http://www.worldscinet.com/ijseke/16/1605/S0218194006002999.html}},
  NUMBER = {5},
  PAGES = {727-746},
  TITLE = {Model-based Testing of Concurrent Programs with Predicate Sequencing Constraints},
  VOLUME = {16},
  YEAR = {2006}
}


This file has been generated by bibtex2html 1.74