scispace - formally typeset
J

Jiacun Wang

Researcher at Monmouth University

Publications -  94
Citations -  1689

Jiacun Wang is an academic researcher from Monmouth University. The author has contributed to research in topics: Petri net & Workflow. The author has an hindex of 17, co-authored 87 publications receiving 1235 citations. Previous affiliations of Jiacun Wang include Nanjing University of Science and Technology & Nanjing University.

Papers
More filters
Book

Timed Petri Nets: Theory and Application

Jiacun Wang
TL;DR: This paper presents a meta-anatomy of Stochastic Timed Petri Nets, a model for deterministic timed and non-deterministic stochastic petri Nets developed in the 1970s and 1980s from data collected in the aftermath of the Chernobyl disaster.
Journal ArticleDOI

Reachability analysis of real-time systems using time Petri nets

TL;DR: This paper presents a new reachability based analysis technique for TPNs for timing property analysis and verification that effectively addresses the problem and shows how to apply it to timing property verification of the TPN model of a command and control (C2) system.
Journal ArticleDOI

Dynamic hand gesture recognition based on short-term sampling neural networks

TL;DR: A novel deep learning network for hand gesture recognition that integrates several well-proved modules together to learn both short-term and long-term features from video inputs and meanwhile avoid intensive computation.

Petri Nets for Dynamic Event-Driven System Modeling

Jiacun Wang
TL;DR: Monmouth University 24.1 as discussed by the authors 7.5.0 as discussed by the authors 0.1.0 0.00 0.0 2.0 1.1 0.2 0.
Journal ArticleDOI

An approach for modeling and analysis of security system architectures

TL;DR: This work presents a methodology for modeling security system architecture and for verifying whether required security constraints are assured by the composition of the components and introduces the concept of security constraint patterns, which formally specify the generic form of security policies that all implementations of the system architecture must enforce.