


default search action
14th VECoS 2020: Xi'an, China
- Belgacem Ben Hedia

, Yu-Fang Chen
, Gaiyun Liu, Zhenhua Yu:
Verification and Evaluation of Computer and Communication Systems - 14th International Conference, VECoS 2020, Xi'an, China, October 26-27, 2020, Proceedings. Lecture Notes in Computer Science 12519, Springer 2020, ISBN 978-3-030-65954-7
Petri-Net, Simulation, and Scheduling
- Huimin Zhang, Lei Feng, Wu Xie, Feng Yu:

An Approach for Supervisor Reduction of Discrete-Event Systems. 3-14 - Hongbin Zhang, Jiliang Luo, Jinjun Long, Yisheng Huang, Weimin Wu

:
Multi-robot Path Planning Using Petri Nets. 15-26 - ZhaoYu Xiang

:
Deadlock Avoidance of Flexible Manufacturing Systems by Colored Resource-Oriented Petri Nets with Novel Colored Capacity. 27-40 - Zihan Wei, Mi Zhao, Changxin Fu:

The Modeling and Simulation on SRM Drive System Using Variable-Proportional-Desaturation PI Regulator. 41-53 - Pei Wang:

Vehicle Scheduling Problem in Terminals: A Review. 54-67 - Faustin Ahishakiye

, José Ignacio Requeno Jarabo
, Lars Michael Kristensen
, Volker Stolz
:
Coverage Analysis of Net Inscriptions in Coloured Petri Net Models. 68-83 - Ruotian Liu, Rabah Ammour

, Leonardo Brenner
, Isabel Demongodin
:
ON/OFF Control Trajectory Computation for Steady State Reaching in Batches Petri Nets. 84-99 - Kuangze Wang, Hanifa Boucheneb, Kamel Barkaoui, Zhiwu Li:

Towards Efficient Partial Order Techniques for Time Petri Nets. 100-115 - Salwa Habbachi, Zhiwu Li, Mohamed Khalgui

:
Towards a Generic Framework for Formal Verification and Performance Analysis of Real-Time Scheduling Algorithms. 116-130 - Yasmina Abdeddaïm:

Accurate Strategy for Mixed Criticality Scheduling. 131-146
Formal Modeling and Verification, Testing
- Braham Lotfi Mediouni, Iulia Dragomir

, Ayoub Nouri, Saddek Bensalem:
Model-Based Design of Resilient Systems Using Quantitative Risk Assessment. 149-164 - Mariia Vasileva, Paolo Zuliani

:
An Evaluation of Estimation Techniques for Probabilistic Verification. 165-179 - Amir Eaman, Amy P. Felty:

Formal Verification of a Certified Policy Language. 180-194 - Wilfried Yves Hamilton Adoni, Moez Krichen, Tarik Nahhal, Abdeltif Elbyed:

Multi-path Coverage of All Final States for Model-Based Testing Theory Using Spark In-memory Design. 195-204
Artificial Intelligence and Machine Learning
- Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:

A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. 207-221 - Chengxuan Lu, Jinjun Long, Zichao Xing, Weimin Wu

, Yong Gu, Jiliang Luo, Yisheng Huang:
Deep Reinforcement Learning for Solving AGVs Routing Problem. 222-236 - Nanyan Liu, Jingyang You:

Research on Vehicle Detection Based on Visual Convolution Network Optimization. 237-243 - ZhaoZhao Zhang, Qiu-wan Wang, Ying-qin Zhu

:
A Self-adaptive Multi-hierarchical Modular Neural Network for Complex Problems. 244-256 - Yinfei Lv, Huorong Ren, Xuefeng Gao, Tong Sun, Haopeng Zhang, Xinyu Guo:

Multi-scale Risk Assessment Model of Network Security Based on LSTM. 257-267 - Lina Zhang, Xiangqin Zheng, Xuan Dang, Jiehui Zhang:

Weighted Lightweight Image Retrieval Method Based on Linear Regression. 268-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














