Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

面向对象的可信构件网的组装研究 (Study of Component Assembling Technologies under Object-oriented Trusted Component Model)., , , , , and . 计算机科学, 44 (11): 104-108 (2017)基于关联矩阵的软件演化过程结构验证 (Structure Verification Method for Software Evolution Process Based on Incidence Matrix)., , , , , , and . 计算机科学, 42 (Z6): 519-524 (2015)A Petri Net Based Model for Trustworthy Software Process Composition., , , , and . COMPSAC Workshops, page 108-114. IEEE Computer Society, (2013)一种面向SaaS多租户的多层模型 (Multi-layer Model for SaaS Multi-tenancy)., , , , , and . 计算机科学, 44 (11): 56-63 (2017)Evolution of cooperation on independent networks: The influence of asymmetric information sharing updating mechanism., , , , and . Appl. Math. Comput., (2019)Operation Refinement in Trusted Component Based on OR-Transition Colored Petri Net., , , , , and . Int. J. Inf. Syst. Supply Chain Manag., 11 (1): 31-38 (2018)Enforcing Correctness of Collaborative Business Processes Using Plans., , , , and . IEEE Trans. Software Eng., 50 (9): 2313-2336 (September 2024)Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net., , , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 433-442. Springer, (2019)Development of Private Processes: A Refinement Approach., , , , , and . IEEE Access, (2019)Enforcing Data-Aware Business Processes Using Execution Path-Oriented Strategies., , , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 54 (11): 6708-6722 (November 2024)