[1] |
CHEN Chen, DENG Zhaohong, GAO Yanli, WANG Shitong.
Single Target Tracking Algorithm Based on Multi-Fuzzy Kernel Fusion
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(5): 848-860.
|
[2] |
CHEN Chen, GAO Yanli, DENG Zhaohong, WANG Shitong.
Correlation Filter Tracking Algorithm Using TSK Fuzzy Logic System
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(2): 294-306.
|
[3] |
WEI Jielin, YUAN Shen, LI Yongming, LIANG Changjian.
Model Checking of Generalized Possibilistic Fuzzy-Time CTL with DP
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(10): 1781-1792.
|
[4] |
ZHU Yi, HUANG Zhiqiu, ZHOU Hang.
Formal Method for Verifying BPEL Model Used by Functional Programming Language
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 185-196.
|
[5] |
YU Xianfeng, LI Chao, LI Yongming.
Computation Tree Logic Based on Intuitionistic Fuzzy Measure
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(9): 1523-1530.
|
[6] |
LI Dan, LI Yongming.
Relationship Between Generalized Possibilistic Computation Tree Logic and Computation Tree Logic
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(10): 1681-1688.
|
[7] |
TAO Yang, HE Qianjin.
Research on Vertical Handoff Mechanism in Heterogeneous Convergence Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 504-515.
|
[8] |
BAO Qiushuang, ZHANG Jinjin.
Safety and Liveness in Intuitionistic Computing Tree Logic
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(2): 163-172.
|
[9] |
ZHAO Jie, LI Yongming.
Two Normal Forms Based on Generalized Possibilistic Computation Tree Logic
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(10): 1475-1481.
|
[10] |
ZOU Li, LIU Di, ZHENG Hongliang.
(α,β)-Generalized Lock Resolution of Intuitionistic Fuzzy Logic
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(8): 1004-1009.
|
[11] |
YU Peng, WEI Ou, HAN Lansheng, NIU Yun.
Model Checking Network Transmission Intervention Policies
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(8): 906-918.
|
[12] |
HU Liangwen, MA Jinjing, SUN Bo.
Spin-Based Verification Framework for SysML Activity Diagram
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(7): 836-847.
|
[13] |
ZHU Yi, HUANG Zhiqiu, ZHANG Guangquan, ZHOU Hang, XIAO Fangxiong.
Method for Modeling and Analyzing Hard Real-Time Software Based on Process Algebra
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(6): 684-693.
|
[14] |
ZHANG Shengli.
Formal Deductive System of Fuzzy Propositional Logic with Different Negations
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(4): 494-505.
|
[15] |
ZENG Hongwei+; MIAO Huaikou.
Applying Model Checking to Data Flow Testing of Components
[J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(12): 1121-1130.
|