An Energy-Efficient Routing Protocol Using Movement Trends in Vehicular Ad hoc Networks D Zhang, Z Yang, V Raychoudhury, Z Chen, J Lloret The Computer Journal 56 (8), 938-946, 2013 | 47 | 2013 |
Model checking aircraft controller software: a case study Z Chen, Y Gu, Z Huang, J Zheng, C Liu, Z Liu Software: Practice and Experience 45 (7), 989-1017, 2015 | 43 | 2015 |
A review of automated formal verification of ad hoc routing protocols for wireless sensor networks Z Chen, D Zhang, R Zhu, Y Ma, P Yin, F Xie Sensor Letters 11 (5), 752-764, 2013 | 38 | 2013 |
Detecting hot road mobility of vehicular ad hoc networks D Zhang, H Huang, J Zhou, F Xia, Z Chen Mobile Networks and Applications 18, 803-813, 2013 | 27 | 2013 |
嵌入式机载软件安全性分析标准, 方法及工具研究综述 黄志球, 徐丙凤, 阚双龙, 胡军, 陈哲 软件学报 25 (2), 200-218, 2014 | 25 | 2014 |
Parametric Runtime Verification of C Programs Z Chen, Z Wang, Y Zhu, H Xi, Z Yang TACAS 2016, International Conference on Tools and Algorithms for the …, 2016 | 22 | 2016 |
A language-theoretic view on guidelines and consistency rules of UML Z Chen, G Motet ECMDA-FA 2009, 5th European Conference on Model Driven Architecture …, 2009 | 22 | 2009 |
Detecting memory errors at runtime with source-level instrumentation Z Chen, J Yan, S Kan, J Qian, J Xue Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019 | 21 | 2019 |
System safety requirements as control structures Z Chen, G Motet COMPSAC 2009, 33rd Annual IEEE International Computer Software and …, 2009 | 19 | 2009 |
Runtime detection of memory errors with smart status Z Chen, C Wang, J Yan, Y Sui, J Xue Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021 | 15 | 2021 |
Towards better support for the evolution of safety requirements via the model monitoring approach Z Chen, G Motet ICSE 2010, ACM/IEEE 32nd International Conference on Software Engineering …, 2010 | 15 | 2010 |
Nevertrace claims for model checking Z Chen, G Motet SPIN 2010, 17th International SPIN Workshop on Model Checking Software 6349 …, 2010 | 14 | 2010 |
Modeling system safety requirements using input/output constraint meta-automata Z Chen, G Motet ICONS 2009, 4th International Conference on Systems, 228-233, 2009 | 13 | 2009 |
基于时间概率代价进程代数的 Web 服务组合建模和分析 肖芳雄, 李燕, 黄志球, 曹子宁, 陈哲, 范大娟 计算机学报 35 (5), 918-936, 2012 | 11 | 2012 |
A new Web-service-based architecture for question answering Z Chen, D Wen IEEE NLP-KE 2005, 2005 IEEE International Conference on Natural Language …, 2005 | 11 | 2005 |
Partial order reduction for checking LTL formulae with the next-time operator S Kan, Z Huang, Z Chen, W Li, Y Huang Journal of Logic and Computation 27 (4), 1095-1131, 2016 | 10 | 2016 |
On the Generative Power of ω-Grammars and ω-Automata Z Chen Fundamenta Informaticae 111 (2), 119-145, 2011 | 10 | 2011 |
Deciding weak monitorability for runtime verification Z Chen, Y Wu, O Wei, B Sheng Proceedings of the 40th International Conference on Software Engineering …, 2018 | 9 | 2018 |
Formalizing safety requirements using controlling automata Z Chen, G Motet DEPEND 2009, 2nd International Conference on Dependability, 81-86, 2009 | 9 | 2009 |
Heuristic reasoning on graph and game complexity of sudoku Z Chen arXiv preprint arXiv:0903.1659, 2009 | 8 | 2009 |