|
Papers |
|
Papers (co-)authored by Peng Wu
[1]
|
Gethin Norman, Catuscia Palamidessi, David Parker, and Peng Wu.
Model checking probabilistic and stochastic extensions of the
π-calculus.
IEEE Transactions of Software Engineering, 35(2):209-223,
2009.
[ bib |
http ]
|
[2]
|
Gethin Norman, Catuscia Palamidessi, David Parker, and Peng Wu.
Model checking the probabilistic pi-calculus.
In 4th International Conference on the Quantitative Evaluation
of SysTems (QEST), pages 169-178. IEEE Computer Society, 2007.
http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest1.pdf.
Full version in
http://www.lix.polytechnique.fr/~catuscia/papers/2009/TSE.pdf.
[ bib ]
|
[3]
|
Peng Wu, Catuscia Palamidessi, and Huimin Lin.
Symbolic bisimulation for probabilistic systems.
In Proceedings of 4th International Conference on the
Quantitative Evaluation of SysTems (QEST), pages 179-188. IEEE Computer
Society, 2007.
http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest2.pdf.
[ bib ]
|
[4]
|
Yuxin Deng, Jun Pang, and Peng Wu, 2006.
Personal Communication.
[ bib ]
|
[5]
|
Yuxin Deng, Jun Pang, and Peng Wu.
Measuring anonymity with relative entropy.
In T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider,
editors, Proc. of the of the 4th Int. Worshop on Formal Aspects in
Security and Trust, volume 4691 of LNCS, pages 65-79. Springer, 2006.
[ bib ]
|
[6]
|
Peng WU and Huimin LIN.
Model-based testing of concurrent programs with predicate sequencing
constraints.
International Journal of Software Engineering and Knowledge
Engineering, 16(5):727-746, 2006.
http://www.worldscinet.com/ijseke/16/1605/S0218194006002999.html.
[ bib ]
|
This file has been generated by
bibtex2html 1.74
Back
Page maintainer:
Catuscia Palamidessi
|