共 50 条
- [22] Using a packet manipulation tool for security analysis of industrial network protocols [J]. ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3, 2007, : 744 - 747
- [24] Counting with Population Protocols [J]. 2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2015, : 35 - 42
- [27] AN INTRODUCTION TO POPULATION PROTOCOLS [J]. BULLETIN OF THE EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE, 2007, (93): : 98 - 117
- [28] Clocked Population Protocols [J]. PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17), 2017, : 431 - 440
- [29] Playing With Population Protocols [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2009, (01): : 3 - 15