default search action
Wei Dong 0006
Person information
- affiliation: National University of Defense Technology, School of Computer, Changsha, China
Other persons with the same name
- Wei Dong — disambiguation page
- Wei Dong 0001 — Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China (and 1 more)
- Wei Dong 0002 — Texas Instruments Inc., Dallas, TX, USA (and 1 more)
- Wei Dong 0003 — Ann Arbor, MI, USA (and 1 more)
- Wei Dong 0004 — Harbin Institute of Technology, State Key laboratory of Robotics and System, China
- Wei Dong 0005 — Chinese PLA General Hospital, Beijing, China
- Wei Dong 0007 — Hong Kong University of Science and Technology, Hong Kong, SAR, China
- Wei Dong 0008 — Shanghai Jiao Tong University, State Key Laboratory of Mechanical System and Vibration, School of Mechanical Engineering, China
- Wei Dong 0009 — Beijing Institute of Technology, Key Laboratory of Dynamics and Control of Flight Vehicle within Ministry of Education, School of Aerospace Engineering, China
- Wei Dong 0010 — University of Alberta, Canada (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c74]Dong Yang, Hao Shi, Wei Dong, Yanqi Dong, Yong Zhang:
Synthesizing Controller for Unsynthesizable Specification Based on Criticality Levels. Internetware 2024 - 2023
- [j29]Chen Zeng, Yue Yu, Shanshan Li, Xin Xia, Zhiming Wang, Mingyang Geng, Linxiao Bai, Wei Dong, Xiangke Liao:
deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search. ACM Trans. Softw. Eng. Methodol. 32(2): 34:1-34:27 (2023) - [j28]Zhaoqiang Guo, Tingting Tan, Shiran Liu, Xutong Liu, Wei Lai, Yibiao Yang, Yanhui Li, Lin Chen, Wei Dong, Yuming Zhou:
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities. IEEE Trans. Software Eng. 49(12): 5154-5188 (2023) - [c73]Deze Wang, Boxing Chen, Shanshan Li, Wei Luo, Shaoliang Peng, Wei Dong, Xiangke Liao:
One Adapter for All Programming Languages? Adapter Tuning for Code Search and Summarization. ICSE 2023: 5-16 - [c72]Peng Xu, Liangze Yin, Jiantong Ma, Dong Yang, Wei Dong:
FAEG: Feature-Driven Automatic Exploit Generation. Internetware 2023: 165-173 - [c71]Yingwei Ma, Yue Yu, Shanshan Li, Zhouyang Jia, Jun Ma, Rulin Xu, Wei Dong, Xiangke Liao:
MulCS: Towards a Unified Deep Representation for Multilingual Code Search. SANER 2023: 120-131 - [i8]Deze Wang, Boxing Chen, Shanshan Li, Wei Luo, Shaoliang Peng, Wei Dong, Xiangke Liao:
One Adapter for All Programming Languages? Adapter Tuning for Code Search and Summarization. CoRR abs/2303.15822 (2023) - 2022
- [j27]Wei Zhao, Rui Li, Wanwei Liu, Wei Dong, Zhiming Liu:
Probabilistic synthesis against GR(1) winning condition. Frontiers Comput. Sci. 16(3): 162203 (2022) - [c70]Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong:
Extension-Compression Learning: A deep learning code search method that simulates reading habits. ICECCS 2022: 195-200 - [c69]Deze Wang, Zhouyang Jia, Shanshan Li, Yue Yu, Yun Xiong, Wei Dong, Xiangke Liao:
Bridging Pre-trained Models and Downstream Tasks for Source Code Understanding. ICSE 2022: 287-298 - [e1]Wei Dong, Jean-Pierre Talpin:
Dependable Software Engineering. Theories, Tools, and Applications - 8th International Symposium, SETTA 2022, Beijing, China, October 27-29, 2022, Proceedings. Lecture Notes in Computer Science 13649, Springer 2022, ISBN 978-3-031-21212-3 [contents] - 2021
- [j26]Yongjun Li, Wenli Ji, Xing Gao, Yao Deng, Wei Dong, Dongxu Li:
Matching user accounts with spatio-temporal awareness across social networks. Inf. Sci. 570: 1-15 (2021) - [c68]Xiang Du, Liangze Yin, Haining Feng, Wei Dong:
Program Verification Enhanced Precise Analysis of Interrupt-Driven Program Vulnerabilities. APSEC 2021: 253-263 - [c67]Yuanliang Zhang, Haochen He, Owolabi Legunsen, Shanshan Li, Wei Dong, Tianyin Xu:
An Evolutionary Study of Configuration Design and Implementation in Cloud Systems. ICSE (Companion Volume) 2021: 175-176 - [c66]Yuanliang Zhang, Haochen He, Owolabi Legunsen, Shanshan Li, Wei Dong, Tianyin Xu:
An Evolutionary Study of Configuration Design and Implementation in Cloud Systems. ICSE 2021: 188-200 - [c65]Xiang Du, Liangze Yin, Wei Dong:
Simplify Array Processing Loops for Efficient Program Verification. ISSRE 2021: 401-411 - [c64]Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong:
MACA: A Residual Network with Multi-Attention and Core Attributes for Code Search (S). SEKE 2021: 528-531 - [c63]Deze Wang, Yue Yu, Shanshan Li, Wei Dong, Ji Wang, Qing Liao:
MulCode: A Multi-task Learning Approach for Source Code Understanding. SANER 2021: 48-59 - [i7]Yuanliang Zhang, Haochen He, Owolabi Legunsen, Shanshan Li, Wei Dong, Tianyin Xu:
An Evolutionary Study of Configuration Design and Implementation in Cloud Systems. CoRR abs/2102.07052 (2021) - [i6]Chen Zeng, Yue Yu, Shanshan Li, Xin Xia, Zhiming Wang, Mingyang Geng, Bailin Xiao, Wei Dong, Xiangke Liao:
deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search. CoRR abs/2103.13020 (2021) - [i5]Deze Wang, Zhouyang Jia, Shanshan Li, Yue Yu, Yun Xiong, Wei Dong, Xiangke Liao:
Bridging Pre-trained Models and Downstream Tasks for Source Code Understanding. CoRR abs/2112.02268 (2021) - 2020
- [j25]Hao Shi, Wei Dong, Rui Li, Wanwei Liu:
Controller Resynthesis for Multirobot System When Changes Happen. Computer 53(12): 69-79 (2020) - [j24]Jiaqi Yang, Yongjun Li, Congjie Gao, Wei Dong:
Entity disambiguation with context awareness in user-generated short texts. Expert Syst. Appl. 160: 113652 (2020) - [j23]Weijiang Hong, Yijun Liu, Zhenbang Chen, Wei Dong, Ji Wang:
Modified condition/decision coverage (MC/DC) oriented compiler optimization for symbolic execution. Frontiers Inf. Technol. Electron. Eng. 21(9): 1267-1284 (2020) - [j22]Chi Hu, Wei Dong, Yonghui Yang, Hao Shi, Fei Deng:
Decentralized runtime enforcement for robotic swarms. Frontiers Inf. Technol. Electron. Eng. 21(11): 1591-1606 (2020) - [j21]Cyrille Artho, Quoc-Sang Phan, Peter Aldous, Alyas Almaawi, Lucas Bang, Lasse Berglund, Tevfik Bultan, Zhenbang Chen, Hayes Converse, Wei Dong, William Eiers, Milos Gligoric, Simon Goldsmith, Lars Grunske, Joshua Hooker, Ismet Burak Kadron, Timo Kehrer, Sarfraz Khurshid, Xuan-Bach Dinh Le, David Lo, Eric Mercer, Sasa Misailovic, Egor Namakonov, Hoang Lam Nguyen, Yannic Noller, Benjamin Ogles, Rohan Padhye, Pavel Parízek, Corina S. Pasareanu, Sheridan Jacob Powell, Seemanta Saha, Koushik Sen, Elena Sherman, Kyle Storey, Minxing Tang, Willem Visser, Ji Wang, Hengbiao Yu:
The Java Pathfinder Workshop 2019. ACM SIGSOFT Softw. Eng. Notes 45(2): 20-22 (2020) - [j20]Chi Hu, Wei Dong, Yonghui Yang, Hao Shi, Ge Zhou:
Runtime Verification on Hierarchical Properties of ROS-Based Robot Swarms. IEEE Trans. Reliab. 69(2): 674-689 (2020) - [j19]Hao Shi, Rui Li, Wanwei Liu, Wei Dong, Ge Zhou:
Iterative Controller Synthesis for Multirobot System. IEEE Trans. Reliab. 69(3): 851-862 (2020) - [j18]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
On Scheduling Constraint Abstraction for Multi-Threaded Program Verification. IEEE Trans. Software Eng. 46(5): 549-565 (2020) - [c62]Rui Li, Hao Shi, Wanwei Liu, Wei Dong:
Synthesizing Cooperative Controllers from Global Tasks of Multi-robot Systems. APSEC 2020: 109-118 - [c61]Jiaxin Liu, Binbin Liu, Wei Dong, Yating Zhang, Daiyan Wang:
How Much Support Can API Recommendation Methods Provide for Component-Based Synthesis? COMPSAC 2020: 872-881 - [c60]Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, Wei Dong:
Symbolic verification of message passing interface programs. ICSE 2020: 1248-1260 - [c59]Jiaxin Liu, Wei Dong, Binbin Liu:
Boosting component-based synthesis with API usage knowledge. ASE Workshops 2020: 91-97 - [c58]Daiyan Wang, Wei Dong, Yating Zhang:
Collective intelligence for smarter neural program synthesis. ASE Workshops 2020: 98-104 - [c57]Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong:
Graph-based Vulnerability Detection via Extracting Features from Sliced Code. QRS Companion 2020: 38-45 - [c56]Xiang Du, Liangze Yin, Peng Wu, Liyuan Jia, Wei Dong:
Vulnerability Analysis through Interface-based Checker Design. QRS Companion 2020: 46-52 - [c55]Yating Zhang, Wei Dong, Daiyan Wang, Jiaxin Liu, Binbin Liu:
Probabilistic Synthesis for Program with Non-API Operations. QRS Companion 2020: 451-457 - [c54]Haining Feng, Liangze Yin, Wenfeng Lin, Xudong Zhao, Wei Dong:
Rchecker: A CBMC-based Data Race Detector for Interrupt-driven Programs. QRS Companion 2020: 465-471 - [c53]Xudong Zhao, Shaoxian Shu, Yutian Lan, Haining Feng, Wei Dong:
Security Controller Synthesis for ROS-based Robot. QRS Companion 2020: 472-477 - [c52]Jiaxin Liu, Wei Dong, Binbin Liu, Yating Zhang, Daiyan Wang:
Effective Iterative Program Synthesis with Knowledge Searched from Internet. QRS Companion 2020: 678-679 - [c51]Xudong Zhao, Rui Li, Wanwei Liu, Hao Shi, Shaoxian Shu, Wei Dong:
Controller Synthesis for ROS-based Multi-Robot Collaboration. SEKE 2020: 37-42
2010 – 2019
- 2019
- [j17]Congjie Gao, Yongjun Li, Jiaqi Yang, Wei Dong:
Fine-Grained Geolocalization of User-Generated Short Text Based on a Weight Probability Model. IEEE Access 7: 153579-153591 (2019) - [j16]Binbin Liu, Wei Dong, Yinzhu Zhang:
Accelerating API-Based Program Synthesis via API Usage Pattern Mining. IEEE Access 7: 159162-159176 (2019) - [j15]Deze Wang, Yong Guo, Wei Dong, Zhiming Wang, Haoran Liu, Shanshan Li:
Deep Code-Comment Understanding and Assessment. IEEE Access 7: 174200-174209 (2019) - [j14]Zhenbang Chen, Hengbiao Yu, Ji Wang, Wei Dong:
Symbolic Verification of Regular Properties for Java Programs. ACM SIGSOFT Softw. Eng. Notes 44(4): 17 (2019) - [c50]Wei Lu, Shaoxian Shu, Rao Shi, Rui Li, Wei Dong:
Synthesizing Secure Reactive Controller for Unmanned Aerial System. DSA 2019: 419-424 - [c49]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Parallel refinement for multi-threaded program verification. ICSE 2019: 643-653 - 2018
- [j13]Liangze Yin, Wei Dong, Fei He, Ji Wang:
A True-Concurrency Encoding for BMC of Compositional Systems. Comput. J. 61(5): 658-671 (2018) - [j12]Luhang Xu, Liangze Yin, Wei Dong, Weixi Jia, Yongjun Li:
Expediting Binary Fuzzing with Symbolic Analysis. Int. J. Softw. Eng. Knowl. Eng. 28(11-12): 1701-1718 (2018) - [c48]Shuqi Chi, Shanshan Li, Yong Guo, Wei Dong, Zhouyang Jia, Haochen He, Qing Liao:
NotOnlyLog: Mining Patch-Log Associations from Software Evolution History to Enhance Failure Diagnosis Capability. APSEC 2018: 189-198 - [c47]Xing Gao, Wenli Ji, Yongjun Li, Yao Deng, Wei Dong:
User Identification with Spatio-Temporal Awareness across Social Networks. CIKM 2018: 1831-1834 - [c46]Yijun Liu, Zhenbang Chen, Wei Dong, Chendong Feng:
MC/DC coverage-oriented compiler optimization for symbolic execution. ICSE (Companion Volume) 2018: 214-215 - [c45]Hengbiao Yu, Zhenbang Chen, Ji Wang, Zhendong Su, Wei Dong:
Symbolic verification of regular properties. ICSE 2018: 871-881 - [c44]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Scheduling constraint based abstraction refinement for weak memory models. ASE 2018: 645-655 - [c43]Luhang Xu, Weixi Jia, Wei Dong, Yongjun Li:
Automatic Exploit Generation for Buffer Overflow Vulnerabilities. QRS Companion 2018: 463-468 - [c42]Luhang Xu, Wei Dong, Liangze Yin, Qiuxi Zhong:
Guide Fuzzing with Multi-Factor Potential Analysis. QRS Companion 2018: 477-482 - [c41]Bailin Lu, Wei Dong, Liangze Yin, Li Zhang:
Evaluating and Integrating Diverse Bug Finders for Effective Program Analysis. SATE 2018: 51-67 - [c40]Luhang Xu, Wei Dong, Liangze Yin, Weixi Jia, Shenzhi Li:
Expediting Binary Fuzzing with Symbolic Analysis. SEKE 2018: 604-603 - [c39]Liangze Yin, Wei Dong, Wanwei Liu, Yunchou Li, Ji Wang:
YOGAR-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement - (Competition Contribution). TACAS (2) 2018: 422-426 - [i4]Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Wei Dong, Chun Huang:
Combining Symbolic Execution and Model Checking to Verify MPI Programs. CoRR abs/1803.06300 (2018) - [i3]Chengdong Feng, Zhenbang Chen, Weijiang Hong, Hengbiao Yu, Wei Dong, Ji Wang:
Boosting the Robustness Verification of DNN by Identifying the Achilles's Heel. CoRR abs/1811.07108 (2018) - 2017
- [j11]Binbin Liu, Wanwei Liu, Xiaoguang Mao, Wei Dong:
无人驾驶汽车决策系统的规则正确性验证 (Correctness Verification of Rules for Unmanned Vehicles' Decision System). 计算机科学 44(4): 72-74 (2017) - [j10]Qilin Liu, Wei Dong, Liangze Yin, Xuan Qi, Shazhou Yang:
混源软件质量模型与度量方法研究 (Research on Mixed Source Software Quality Model and Measurement Method). 计算机科学 44(4): 82-84 (2017) - [j9]Lihua Zhu, Yanjun Wen, Wei Dong:
基于语义补丁的Linux驱动程序后向移植技术 (Backporting of Linux Device Drivers Using Semantic Patch). 计算机科学 44(11): 64-68 (2017) - [c38]Ge Zhou, Wei Dong, Wanwei Liu, Hao Shi, Chi Hu, Liangze Yin:
Optimizing Monitor Code Based on Patterns in Runtime Verification. QRS Companion 2017: 348-354 - [c37]Hao Shi, Wei Dong, Ge Zhou, Liangze Yin:
Monitor Synthesis for Parametric MTL Properties in Discrete Control Software. QRS Companion 2017: 355-362 - [c36]Xiangyang Xu, Shanshan Li, Yong Guo, Wei Dong, Wang Li, Xiangke Liao:
Automatic Type Inference for Proactive Misconfiguration Prevention. SEKE 2017: 295-300 - [c35]Hengbiao Yu, Zhenbang Chen, Yufeng Zhang, Ji Wang, Wei Dong:
RGSE: a regular property guided symbolic executor for Java. ESEC/SIGSOFT FSE 2017: 954-958 - [i2]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Scheduling Constraint Based Abstraction Refinement for Multi-Threaded Program Verification. CoRR abs/1708.08323 (2017) - 2016
- [j8]Xueguang Wu, Liqian Chen, Antoine Miné, Wei Dong, Ji Wang:
Static Analysis of Runtime Errors in Interrupt-Driven Programs via Sequentialization. ACM Trans. Embed. Comput. Syst. 15(4): 70:1-70:26 (2016) - [c34]Shulin Zhou, Xiaodong Liu, Shanshan Li, Wei Dong, Xiangke Liao, Yun Xiong:
ConfMapper: Automated Variable Finding for Configuration Items in Source Code. QRS Companion 2016: 228-235 - [c33]Jiahong Jiang, Liqian Chen, Yanjun Wen, Wei Dong, Ling Wen:
Analyzing Math Library Functions via Summarization. QRS Companion 2016: 259-264 - 2015
- [c32]Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong, Ji Wang:
MPISE: Symbolic Execution of MPI Programs. HASE 2015: 181-188 - [c31]Yufeng Zhang, Zhenbang Chen, Ji Wang, Wei Dong, Zhiming Liu:
Regular Property Guided Dynamic Symbolic Execution. ICSE (1) 2015: 643-653 - [c30]Xianjin Fu, Zhenbang Chen, Hengbiao Yu, Chun Huang, Wei Dong, Ji Wang:
Poster: Symbolic Execution of MPI Programs. ICSE (2) 2015: 809-810 - 2014
- [j7]Wanwei Liu, Rui Wang, Xianjin Fu, Ji Wang, Wei Dong, Xiaoguang Mao:
Counterexample-Preserving Reduction for Symbolic Model Checking. J. Appl. Math. 2014: 702165:1-702165:13 (2014) - [j6]Liqian Chen, Jiahong Jiang, Banghu Yin, Wei Dong, Ji Wang:
Robustness Analysis of Floating-Point Programs by Self-Composition. J. Appl. Math. 2014: 789213:1-789213:12 (2014) - [c29]Xianjin Fu, Zhenbang Chen, Chun Huang, Wei Dong, Ji Wang:
Synchronization Error Detection of MPI Programs by Symbolic Execution. APSEC (1) 2014: 127-134 - [c28]Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, Wei Dong:
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems. ISSRE Workshops 2014: 152-155 - [c27]Kang Yu, Zhenbang Chen, Wei Dong:
A Predictive Runtime Verification Framework for Cyber-Physical Systems. SERE (Companion) 2014: 223-227 - 2013
- [c26]Wanwei Liu, Rui Wang, Xianjin Fu, Ji Wang, Wei Dong, Xiaoguang Mao:
Counterexample-Preserving Reduction for Symbolic Model Checking. ICTAC 2013: 249-266 - [c25]Xueguang Wu, Yanjun Wen, Liqian Chen, Wei Dong, Ji Wang:
Data Race Detection for Interrupt-Driven Programs via Bounded Model Checking. SERE (Companion) 2013: 204-210 - [i1]Wanwei Liu, Rui Wang, Xianjin Fu, Ji Wang, Wei Dong, Xiaoguang Mao:
Counterexample-Preserving Reduction for Symbolic Model Checking. CoRR abs/1301.3299 (2013) - 2012
- [j5]Wei Dong, Changzhi Zhao, Shaoxian Shu, Martin Leucker:
Anticipatory active monitoring for safety- and security-critical software. Sci. China Inf. Sci. 55(12): 2723-2737 (2012) - [c24]Xian Zhang, Martin Leucker, Wei Dong:
Runtime Verification with Predictive Semantics. NASA Formal Methods 2012: 418-432 - [c23]Longming Dong, Wei Dong, Liqian Chen:
Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer Structures. SERE (Companion) 2012: 144-151 - 2011
- [c22]Xian Zhang, Martin Leucker, Wei Dong:
An event pattern language for runtime monitoring based on AOP. ICITST 2011: 744-751 - [c21]Changzhi Zhao, Wei Dong, Martin Leucker, Zhichang Qi:
Security Goals Assurance Based on Software Active Monitoring. SSIRI 2011: 70-79 - 2010
- [c20]Changzhi Zhao, Wei Dong, Zhichang Qi:
Active Monitoring for Control Systems under Anticipatory Semantics. QSIC 2010: 318-325
2000 – 2009
- 2009
- [j4]Ji Wang, Xiaodong Ma, Wei Dong, Hou-Feng Xu, Wanwei Liu:
Demand-Driven Memory Leak Detection Based on Flow- and Context-Sensitive Pointer Analysis. J. Comput. Sci. Technol. 24(2): 347-356 (2009) - 2008
- [c19]Wei Dong, Martin Leucker, Christian Schallhart:
Impartial Anticipation in Runtime-Verification. ATVA 2008: 386-396 - [c18]Wei Dong, Ji Wang, Changzhi Zhao, Xian Zhang, Jie Tian:
Automating Software FMEA via Formal Analysis of Dependence Relations. COMPSAC 2008: 490-491 - [c17]Junmin Ye, Junjie Wang, Wei Dong, Zhichang Qi:
Implementation of String Recognition Algorithm Based on the Principle of Artificial Immunology. ICYCS 2008: 1777-1782 - [c16]Junmin Ye, Zemei Zhan, Zhenfang Zhang, Wei Dong, Zhichang Qi:
Design of Some Artificial Immune Operators in Software Test Cases Generation. ICYCS 2008: 2302-2307 - [c15]Junmin Ye, Wei Dong, Zhichang Qi:
A Method to Generate Embedded Real-Time System Test Suites Based on Software Architecture Specifications. ICYCS 2008: 2325-2329 - [c14]Xiaodong Ma, Ji Wang, Wei Dong:
Computing Must and May Alias to Detect Null Pointer Dereference. ISoLA 2008: 252-261 - 2007
- [j3]Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi:
Interface theory-based formalisation and verification of orchestration in BPEL4WS. Int. J. Bus. Process. Integr. Manag. 2(4): 262-281 (2007) - [j2]Wing Lok Yeung, Karl R. P. H. Leung, Ji Wang, Wei Dong:
Modelling and model checking suspendible business processes via statechart diagrams and CSP. Sci. Comput. Program. 65(1): 14-29 (2007) - [c13]Wei Dong, Ji Wang, Zhichang Qi, Ni Rong:
Compositional Verification of UML Dynamic Models. APSEC 2007: 286-293 - [c12]Wanwei Liu, Ji Wang, Wei Dong, Huowang Chen:
Axiomatizing Extended Temporal Logic Fragments Via Instantiation. ICTAC 2007: 322-336 - [c11]Xiaodong Ma, Ji Wang, Wei Dong:
Shape Analysis by Refining on Abstract Evaluation Path. TTSS 2007: 137-151 - 2006
- [j1]Mengluo Ji, Huaimin Wang, Mengjun Li, Wei Dong, Zhichang Qi:
An Value Range Analysis Based on Abstract Interpretation and Generalized Monotone Data Flow Framework. J. Comput. Res. Dev. 43(11): 2020-2026 (2006) - [c10]Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi, Wing Lok Yeung:
An Interface Theory Based Approach to Verification of Web Services. COMPSAC (2) 2006: 139-144 - [c9]Wing Lok Yeung, Ji Wang, Wei Dong:
Verifying Choreographic Descriptions of Web Services Based on CSP. SCW 2006: 97-104 - [c8]Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi:
Towards Formal Interfaces for Web Services with Transactions. SITIS 2006: 292-304 - [c7]Wing Lok Yeung, Karl R. P. H. Leung, Ji Wang, Wei Dong:
Model Checking Suspendible Business Processes via Statechart Diagrams and CSP. MSVVEIS 2006: 97-107 - [c6]Wei Dong, Zhenbang Chen, Ji Wang:
A Contract-based Approach to Specifying and Verifying Safety Critical Systems. FESCA@ETAPS 2006: 89-103 - 2005
- [c5]Wing Lok Yeung, Karl R. P. H. Leung, Ji Wang, Wei Dong:
Improvements Towards Formalizing UML State Diagrams in CSP. APSEC 2005: 176-184 - [c4]Wei Dong, Ji Wang:
Contract-Based Formal Specification of Safety Critical Systems. COMPSAC (2) 2005: 7-8 - 2004
- [c3]Shuhao Li, Ji Wang, Wei Dong, Zhichang Qi:
Property-Oriented Testing of Real-Time Systems. APSEC 2004: 358-365 - 2002
- [c2]Ji Wang, Wei Dong, Zhichang Qi:
Slicing Hierarchical Automata for Model Checking UML Statecharts. ICFEM 2002: 435-446 - 2001
- [c1]Wei Dong, Ji Wang, Xuan Qi, Zhichang Qi:
Model Checking UML Statecharts. APSEC 2001: 363-370
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint