Journal: Frontiers of Computer Science in China

Volume 2, Issue 4

331 -- 343Lan Lin, Jesse H. Poore. Pushing requirements changes through to changes in specifications
344 -- 356Chenguang Luo, Shengchao Qin, Zongyan Qiu. Verifying BPEL-like programs with Hoare logic
357 -- 367Jun Pang, Zhengqin Luo, Yuxin Deng. On automatic verification of self-stabilizing population protocols
368 -- 379Jun Sun 0001, Yang Liu, Jin Song Dong, Jing Sun. Compositional encoding for bounded model checking
380 -- 397Zhifang Wang, Yiyun Chen, Zhenming Wang, Baojian Hua. Automated verification of pointer programs in pointer logic
398 -- 412Antonio Brogi, Razvan Popescu. Workflow-based semantics for peer-to-peer specifications
413 -- 423Lianwei Guan, Xingyu Li, Hao Hu, Jian Lu. A Petri net-based approach for supporting aspect-oriented modeling
424 -- 430Yue Hu, Xiaoyu Gao, Li Li, Qingshi Gao. Style transformation in natural languages
431 -- 437Yunping Zheng, Chuanbo Chen, Mudar Sarem. An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectangles
438 -- 450Xin Li, Bei Hua, Yi Shang, Yan Xiong. A robust localization algorithm in wireless sensor networks
451 -- 459Xiaoru Zhang, Zaiyue Zhang, Yuefei Sui. Types, structures and theories in NKI