Xiaoju Dong

  • Citations Per Year
Learn More
The chi calculus is studied in the framework incorporating two constructions widely useful in applications: asymmetric communication and mismatch condition. The barbed bisimilarity is used to give a general picture of how the two constructions affect the observational theory. Both the operational properties and the algebraic properties of the enriched(More)
The local cause bisimulation is the behavior equivalence between processes enriched with local cause information. This paper proposes a full abstraction between observation theories of the local cause S and π-calculus. And based on the full abstraction, a new, alternative approach, which does not depend on auxiliary operators, to proving(More)
Formal methods have proved useful in the analysis of security protocols. In this paper, we propose a generic model for symbolic analyzing security protocols (GSPM for short) that supports message passing semantics and constructs for modelling the behavior of protocol participants. GSPM is simple, but it is expressive enough to express security protocols and(More)
Data has appeared to be a new kind of commodity with distinctive characteristics, which make it fundamentally different from physical goods as well as traditional digital goods. Therefore, new trading mechanisms for data need to be designed. In this paper, we model the data market as an auction with negative externalities, and design practical mechanisms(More)
In this paper a systematic study of bisimilarities on asymmetric chi<sup>ne</sup>-processes is carried out. The notion of L-bisimilarities on asymmetric chi<sup>ne</sup>-processes is introduced. Twelve distinct L-bisimilarities are derived from all of L-bisimilarities by constructing a bisimulation lattice. For each of these twelve distinct(More)