[1] |
Haoyu ZHANG, Lili WANG.
Model repair method based on behavioral profile and logical Petri nets
[J]. Journal of Computer Applications, 2023, 43(8): 2527-2536.
|
[2] |
Erjing BAI, Xiaoyan LI, Yuyue DU.
Repair method for process models with concurrent structures based on token replay
[J]. Journal of Computer Applications, 2023, 43(2): 499-506.
|
[3] |
Yinhong XIANG, Kaiqing ZHOU, Senyu YANG, Xuanyu ZHANG, Diwen KANG.
Hierarchical algorithm of fuzzy Petri net by reverse search
[J]. Journal of Computer Applications, 2023, 43(12): 3676-3682.
|
[4] |
Liangliang DENG, Lichen ZHANG, Wenchao JIANG.
Modeling and simulation of CPS based on object spatiotemporal Petri net
[J]. Journal of Computer Applications, 2023, 43(11): 3334-3339.
|
[5] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[6] |
LIU Weirong, ZHEN Hong.
Modeling and simulation of container transportation process in blockchain based container sharing mode
[J]. Journal of Computer Applications, 2019, 39(7): 2141-2147.
|
[7] |
SUN Huiming, DU Yuyue.
Process model mining method for multi-concurrent 2-loops of triangles
[J]. Journal of Computer Applications, 2019, 39(3): 851-857.
|
[8] |
XIA Haonan, DAI Shenghua.
Security encryption of radio block center based on colored Petri net
[J]. Journal of Computer Applications, 2018, 38(12): 3476-3480.
|
[9] |
ZHANG Wei, SUN Tao, WAN Xiaoyun.
Simplification method for testing behavior of parallel software
[J]. Journal of Computer Applications, 2017, 37(5): 1276-1281.
|
[10] |
MING Li, LI Tong, QIN Jianglong, ZHENG Ming, JIANG Xudong, XIE Zhongwen.
SaaS-oriented modeling and analysis of load balancing strategy
[J]. Journal of Computer Applications, 2017, 37(1): 24-30.
|
[11] |
LI Yun, CHEN Pangsen, SUN Shanlin.
Security analysis and implementation for wireless local area network access protocol via near field communication authentication
[J]. Journal of Computer Applications, 2016, 36(5): 1236-1245.
|
[12] |
HE Hua, LIN Chuang, ZHAO Zenghua, PANG Shanchen.
null
[J]. Journal of Computer Applications, 2015, 35(5): 1255-1261.
|
[13] |
WANG Lei, WANG Bidou, LUO Gangyin, NIE Lanshun, ZHAN Dechen, TIAN Haoran.
Application of time-Petri net for process modeling of point-of-care testing
[J]. Journal of Computer Applications, 2015, 35(12): 3520-3523.
|
[14] |
CHEN Ping TANG Xinmin XING Jian.
Taxiway conflict control strategy based on objective perception events driven model
[J]. Journal of Computer Applications, 2014, 34(2): 610-614.
|
[15] |
WANG Suzhen DU Zhijuan.
Construction method of mobile cloud computing system based on mobile Agent
[J]. Journal of Computer Applications, 2013, 33(05): 1276-1280.
|