Name
Affiliation
Papers
JUN PANG
Univ Luxembourg, Fac Sci Technol & Commun, Luxembourg, Luxembourg
42
Collaborators
Citations 
PageRank 
71
521
30.59
Referers 
Referees 
References 
918
1034
725
Search Limit
1001000
Title
Citations
PageRank
Year
Scalable Control Of Asynchronous Boolean Networks00.342019
Model checking with fairness assumptions using PAT170.872014
Location Assurance And Privacy In Gnss Navigation00.342013
A New Access Control Scheme for Facebook-Style Social Networks90.522013
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends.80.492013
Special issue: software verification and testing00.342013
A Trust Framework for Evaluating GNSS Signal Integrity30.702013
Verification of Functional and Non-functional Requirements of Web Service Composition.120.582013
Verification of A Key Chain Based TTP Transparent CEM Protocol40.382011
A Study Of The Pdgf Signaling Pathway With Prism20.372011
Fast leader election in anonymous rings with bounded expected delay.20.392011
Selective location blinding using hash chains30.522011
Brief announcement: asynchronous bounded expected delay networks10.362010
On Probabilistic Alternating Simulations50.492010
Analysis of a receipt-free auction protocol in the applied pi calculus140.562010
Verification of Population Ring Protocols in PAT80.532009
PAT: Towards Flexible Verification under Fairness1845.782009
Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition40.502009
On Automatic Verification of Self-Stabilizing Population Protocols110.692008
Is Timed Branching Bisimilarity a Congruence Indeed?20.382008
Leader Election in Anonymous Rings: Franklin Goes Probabilistic80.502008
Adapting the UPPAAL model of a distributed lift system20.412007
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus80.502007
Model checking a cache coherence protocol of a Java DSM implementation151.052007
Automating verification of cooperation, control, and design in traffic applications130.862007
Exact state set representations in the verification of linear hybrid systems with large discrete state space271.752007
Generalized Unsolicited Tests for Authentication Protocol Analysis20.382006
Metrics for Action-labelled Quantitative Transition Systems381.262006
Automatic verification of hybrid systems with large discrete state space70.612006
Measuring anonymity with relative entropy392.092006
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM80.552006
Cones and foci: A mechanical framework for protocol verification80.512006
Formal Verification of Timed Systems Using Cones and Foci10.392005
Simplifying Itai-Rodeh Leader Election for Anonymous Rings110.672005
Compositional reasoning for probabilistic finite-state behaviors140.682005
Is timed branching bisimilarity an equivalence indeed?90.542005
Abstraction of parallel uniform processes with data10.372004
Verifying a Sliding Window Protocol in µCRL60.472004
A model for slicing JAVA programs hierarchically140.812004
Analyzing the Redesign of a Distributed Lift System in UPPAAL10.382003
A formal software development approach using refinement calculus00.342001
A Formal Software Development Approach Based on COOZ and Refinement Calculus00.341999