Ming Gu

Affiliations:
  • Tsinghua University, School of Software, Beijing, China


According to our database1, Ming Gu authored at least 209 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Implicit Filtering for Learning Neural Signed Distance Functions from 3D Point Clouds.
Proceedings of the Computer Vision - ECCV 2024, 2024

GridFormer: Point-Grid Transformer for Surface Reconstruction.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

NeuSurf: On-Surface Priors for Neural Surface Reconstruction from Sparse Input Views.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
MVDLite: A fast validation algorithm for Model View Definition rules.
Adv. Eng. Informatics, October, 2023

Modeling and validating temporal rules with semantic Petri net for digital twins.
Adv. Eng. Informatics, August, 2023

Design of multimodal hub-and-spoke transportation network for emergency relief under COVID-19 pandemic: A meta-heuristic approach.
Appl. Soft Comput., January, 2023

Removing Backdoors in Pre-trained Models by Regularized Continual Pre-training.
Trans. Assoc. Comput. Linguistics, 2023

A Parallel IFC Normalization Algorithm for Incremental Storage and Version Control.
CoRR, 2023

Beat LLMs at Their Own Game: Zero-Shot LLM-Generated Text Detection via Querying ChatGPT.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
Moderate-fitting as a Natural Backdoor Defender for Pre-trained Language Models.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

A Geometric-Relational Deep Learning Framework for BIM Object Classification.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

A New Baseline of Policy Gradient for Traveling Salesman Problem.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Pass off Fish Eyes for Pearls: Attacking Model Selection of Pre-trained Models.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
A GPU Acceleration Framework for Motif and Discord Based Pattern Mining.
IEEE Trans. Parallel Distributed Syst., 2021

Automatic Integer Error Repair by Proper-Type Inference.
IEEE Trans. Dependable Secur. Comput., 2021

Knowledge Enhanced Fact Checking and Verification.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

Sensing Error Handling Bugs in SSL Library Usages.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Scalable Fault Detection Based on Precise Access Path.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Online Scheduling for Dynamic VM Migration in Multicast Time-Sensitive Networks.
IEEE Trans. Ind. Informatics, 2020

A Flattened-Priority Framework for Mixed-Criticality Systems.
IEEE Trans. Ind. Electron., 2020

Model-Based Adaptation of Mixed-Criticality Multiservice Systems for Extreme Physical Environments.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Time-Triggered Switch-Memory-Switch Architecture for Time-Sensitive Networking Switches.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Adaptive Group Routing and Scheduling in Multicast Time-Sensitive Networks.
IEEE Access, 2020

Escape from escape analysis of Golang.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020

2019
An Enhanced Reconfiguration for Deterministic Transmission in Time-Triggered Networks.
IEEE/ACM Trans. Netw., 2019

Synthesizing Fault-Tolerant Schedule for Time-Triggered Network Without Hot Backup.
IEEE Trans. Ind. Electron., 2019

Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation.
ACM Trans. Cyber Phys. Syst., 2019

Tolerating C Integer Error via Precision Elevation.
IEEE Trans. Computers, 2019

API Misuse Detection in C Programs: Practice on SSL APIs.
Int. J. Softw. Eng. Knowl. Eng., 2019

MVDLite: A Light-weight Representation of Model View Definition with Fast Validation for BIM Applications.
CoRR, 2019

IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Dynamically Optimizing End-to-End Latency for Time-Triggered Networks.
Proceedings of the ACM SIGCOMM 2019 Workshop on Networking for Emerging Applications and Technologies, 2019

SSLDoc: Automatically Diagnosing Incorrect SSL API Usages in C Programs.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

Fast Low-rank Metric Learning for Large-scale and High-dimensional Data.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Ares: Inferring Error Specifications through Static Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Go-clone: graph-embedding based clone detector for Golang.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

VBSAC: a value-based static analyzer for C.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Go-Sanitizer: Bug-Oriented Assertion Generation for Golang.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Vetting API usages in C programs with IMChecker.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

An Empirical Study on API-Misuse Bugs in Open-Source C Programs.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Constructing Cost-Aware Functional Test-Suites Using Nested Differential Evolution Algorithm.
IEEE Trans. Evol. Comput., 2018

Temporal Coverage Analysis for Dynamic Verification.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

Parallelizing SMT solving: Lazy decomposition and conciliation.
Artif. Intell., 2018

A Cyber-Physical System Framework for Early Detection of Paroxysmal Diseases.
IEEE Access, 2018

Which Defect Should Be Fixed First? Semantic Prioritization of Static Analysis Report.
Proceedings of the Software Analysis, Testing, and Evolution, 2018

Work-in-Progress: A Flattened Priority Framework for Mixed-Criticality Real-Time Systems.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018

Managing concurrent testing of data race with ComRaDe.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Fast Real-Time Scheduling for Ethernet-Based Train Control Networks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Weak-assert: a weakness-oriented assertion recommendation toolkit for program analysis.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Model-based adaptation to extreme physical environments: a case study on mixed-criticality industrial ethernet.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Scalable Verification Framework for C Program.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

Energy-Efficient Automatic Train Driving by Learning Driving Patterns.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Enhanced Explicit Semantic Analysis for Product Model Retrieval in Construction Industry.
IEEE Trans. Ind. Informatics, 2017

Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System.
IEEE Trans. Ind. Informatics, 2017

Formal Modeling and Verification of a Rate-Monotonic Scheduling Implementation with Real-Time Maude.
IEEE Trans. Ind. Electron., 2017

BIMTag: Concept-based automatic semantic annotation of online BIM product resources.
Adv. Eng. Informatics, 2017

Verification of Implementations of Cryptographic Hash Functions.
IEEE Access, 2017

Path compression kd-trees with multi-layer parallel construction a case study on ray tracing.
Proceedings of the 21st ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games, 2017

A language model for statements of software code.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

A static analysis tool with optimizations for reachability determination.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

IntPTI: automatic integer error repair with proper-type inference.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Handling scheduling uncertainties through traffic shaping in Time-Triggered train networks.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Vertex-Weighted Hypergraph Learning for Multi-View Object Classification.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Stochastic optimization of program obfuscation.
Proceedings of the 39th International Conference on Software Engineering, 2017

Assertion Recommendation for Formal Program Verification.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A Constraint-Pattern Based Method for Reachability Determination.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Human experience knowledge induction based intelligent train driving.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks.
Sensors, 2016

From Stateflow Simulation to Verified Implementation: A Verification Approach and A Real-Time Train Controller Design.
Proceedings of the 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2016

Tsmart-BIPEX: An Integrated Graphical Design Toolkit for Software Systems.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

C Code Verification based on the Extended Labeled Transition System Model.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

Model driven design of heterogeneous synchronous embedded systems.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Verifying simulink stateflow model: timed automata approach.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Automatic Integrity Checking of IFC Models relative to building Regulations.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2016

Taming Interrupts for Verifying Industrial Multifunction Vehicle Bus Controllers.
Proceedings of the FM 2016: Formal Methods, 2016

Safety-Assured Formal Model-Driven Design of the Multifunction Vehicle Bus Controller.
Proceedings of the FM 2016: Formal Methods, 2016

Improving Failure Detection by Automatically Generating Test Cases Near the Boundaries.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Automatic Fix for C Integer Errors by Precision Improvement.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An integrated Medical CPS for early detection of paroxysmal sympathetic hyperactivity.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
First, Debug the Test Oracle.
IEEE Trans. Software Eng., 2015

Design of Mixed Synchronous/Asynchronous Systems with Multiple Clocks.
IEEE Trans. Parallel Distributed Syst., 2015

Design and Optimization of Multiclocked Embedded Systems Using Formal Techniques.
IEEE Trans. Ind. Electron., 2015

Scalable Verification of a Generic End-Around-Carry Adder for Floating-Point Units by Coq.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Estimating the Volume of Solution Space for Satisfiability Modulo Linear Real Arithmetic.
Theory Comput. Syst., 2015

Generalized interface automata with multicast synchronization.
Frontiers Comput. Sci., 2015

VeRV: A temporal and data-concerned verification framework for the vehicle bus systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

PLC programs' checking method and strategy based on module state transfer.
Proceedings of the IEEE International Conference on Information and Automation, 2015

2014
Reliability Analysis for a Data Flow in Event-Driven Wireless Sensor Networks.
Wirel. Pers. Commun., 2014

Symbolic Analysis of Programmable Logic Controllers.
IEEE Trans. Computers, 2014

Array Theory of Bounded Elements and its Applications.
J. Autom. Reason., 2014

Modeling a Heterogeneous Embedded System in Coloured Petri Nets.
J. Appl. Math., 2014

Functional Verification of High Performance Adders in COQ.
J. Appl. Math., 2014

Reliability analysis for chain topology wireless sensor networks with multiple-sending transmission scheme.
EURASIP J. Wirel. Commun. Netw., 2014

A New Barrier Certificate for Safety Verification of Hybrid Systems.
Comput. J., 2014

iDola: Bridge Modeling to Verification and Implementation of Interrupt-Driven Systems.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Application-Specific Architecture Selection for Embedded Systems via Schedulability Analysis.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systems.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Clause Replication and Reuse in Incremental Temporal Induction.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Optimal robust control for generalized fuzzy dynamical systems: A novel use on fuzzy uncertainties.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Control and Automation, 2014

2013
Bayesian-Network-Based Reliability Analysis of PLC Systems.
IEEE Trans. Ind. Electron., 2013

A Unified Framework for DPLL(T) + Certificates.
J. Appl. Math., 2013

An Effective Heuristic-Based Approach for Partitioning.
J. Appl. Math., 2013

OntCheck: An Ontology-Driven Static Correctness Checking Tool for Component-Based Models.
J. Appl. Math., 2013

Probabilistic analysis of system outage in distributed antenna systems with composite channels.
EURASIP J. Wirel. Commun. Netw., 2013

Formal component-based modeling and synthesis for PLC systems.
Comput. Ind., 2013

The IFC-based path planning for 3D indoor spaces.
Adv. Eng. Informatics, 2013

Optimizing the SAT Decision Ordering of Bounded Model Checking by Structural Information.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

System reliability calculation based on the run-time analysis of ladder program.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Design and optimization of multi-clocked embedded systems using formal technique.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Reusing Search Tree for Incremental SAT Solving of Temporal Induction.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Modeling and Verification of Component-Based Systems with Data Passing Using BIP.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Component-Based Modeling and Code Synthesis for Cyclic Programs.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Verification and Implementation of the Protocol Standard in Train Control System.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Exponential-Condition-Based Barrier Certificate Generation for Safety Verification of Hybrid Systems.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

Sequential dependency and reliability analysis of embedded systems.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

2012
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2012

Maxterm Covering for Satisfiability.
IEEE Trans. Computers, 2012

New strategies for reliability analysis of Programmable Logic Controllers.
Math. Comput. Model., 2012

Semantic characterization of programmable logic controller programs.
Math. Comput. Model., 2012

Obtaining more Karatsuba-like formulae over the binary field.
IET Inf. Secur., 2012

Modeling and Validation of PLC-Controlled Systems: A Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Reliability Analysis of PLC Systems by Bayesian Network.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Uncertain Model and Algorithm for Hardware/Software Partitioning.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

2011
A novel fault diagnosis mechanism for wireless sensor networks.
Math. Comput. Model., 2011

Energy-Efficient Key Distribution Using Electrocardiograph Biometric Set for Secure Communications in Wireless Body Healthcare Networks.
J. Medical Syst., 2011

Formalisation and verification of programmable logic controllers timers in Coq.
IET Softw., 2011

Formal modeling and synthesis of programmable logic controllers.
Comput. Ind., 2011

Competent predicate abstraction in model checking.
Sci. China Inf. Sci., 2011

MENs: Multi-user Emergency Navigation System Using.
Ad Hoc Sens. Wirel. Networks, 2011

An Efficient Resolution Based Algorithm for SAT.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Proving Computational Geometry Algorithms in TLA+2.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing.
Proceedings of the Information Security Practice and Experience, 2011

Domain-Driven Probabilistic Analysis of Programmable Logic Controllers.
Proceedings of the Formal Methods and Software Engineering, 2011

De-Anonymizing Dynamic Social Networks.
Proceedings of the Global Communications Conference, 2011

Directional diagnosis for wireless sensor networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.
IEEE Trans. Veh. Technol., 2010

Integrating Evolutionary Computation with Abstraction Refinement for Model Checking.
IEEE Trans. Computers, 2010

BodySec: synchronized key distribution using biometric slots for wireless body sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Trust Based Routing for Misbehavior Detection in Ad Hoc Networks.
J. Networks, 2010

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms.
IET Inf. Secur., 2010

Field programmable gate array prototyping of end-around carry parallel prefix tree architectures.
IET Comput. Digit. Tech., 2010

Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs.
Frontiers Comput. Sci. China, 2010

Specifying and verifying PLC systems with TLA<sup>+</sup> : A case study.
Comput. Math. Appl., 2010

Parameterized Specification and Verification of PLC Systems in Coq.
Proceedings of the 4th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2010

Compositional Abstraction Refinement for Timed Systems.
Proceedings of the 4th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2010

A Refinement-Based Validation Method for Programmable Logic Controllers.
Proceedings of the 10th International Conference on Quality Software, 2010

Evaluating Importance of Websites on News Topics.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

DAWN: Energy efficient data aggregation in WSN with mobile sinks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

A Domain-related Authority Model for Web Pages based on Source and Related Information.
Proceedings of the ICSOFT 2010, 2010

Specifying Time-Sensitive Systems with TLA+.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

On Array Theory of Bounded Elements.
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010

A Brief Survey on De-anonymization Attacks in Online Social Networks.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Modeling job shop scheduling with batches and setup times by timed Petri nets.
Math. Comput. Model., 2009

Formal modeling and analysis of a narrow bandwidth protocol for establishing and terminating connections.
Math. Comput. Model., 2009

QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector.
J. Comput. Sci. Technol., 2009

<i>n</i> PAKE<sup>+</sup>: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009

Workflow-based resource allocation to optimize overall performance of composite services.
Future Gener. Comput. Syst., 2009

Heuristic-Guided Abstraction Refinement.
Comput. J., 2009

Specifying and Verifying PLC Systems with TLA+.
Proceedings of the TASE 2009, 2009

CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks.
Proceedings of the MSN 2009, 2009

Formal Specification and Code Generation of Programable Logic Controllers.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Data mining based decomposition for assume-guarantee reasoning.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, 2009

Translation-Based Model Checking for PLC Programs.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Formalization and Verification of PLC Timers in Coq.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Extracting Content from Web Pages Using the Sliding Window.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Effective Predicate Abstraction for Program Verification.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

Modeling and analysis of stage machinery control systems by timed colored Petri nets.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008

Verifying programmable logic controllers with abstraction.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008

Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

A Maximum Weight Heuristic Method for Abstract State Computation.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Modeling and Analysis of Real-Life Job Shop Scheduling Problems by Petri nets.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008

2007
Modelling and verification of program logic controllers using timed automata.
IET Softw., 2007

Predicting Defective Software Components from Code Complexity Measures.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Effective heuristics for counterexample-guided abstraction refinement.
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007

2006
Probabilistic optimization for FPGA board level routing problems.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

Congestion estimation for hexagonal routing.
Int. J. Comput. Math., 2006

A combinatorial congestion estimation approach with generalized detours.
Comput. Math. Appl., 2006

An Efficient Algorithm for Fingercode-Based Biometric Identification.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Minimal Threshold Closure.
Proceedings of the Computer Security, 2006

Verifying Java Programs By Theorem Prover HOL.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Probabilistic Learning Approach for Counterexample Guided Abstraction Refinement.
Proceedings of the Automated Technology for Verification and Analysis, 2006

2005
Efficient vector quantization using genetic algorithm.
Neural Comput. Appl., 2005

Multiterminal net assignments by scatter search.
Math. Comput. Model., 2005

On Theoretical Upper Bounds for Routing Estimation.
J. Univers. Comput. Sci., 2005

On synthesis of 3 × 3 reversible logic functions.
Int. J. Comput. Math., 2005

Probabilistic Estimation for Routing Space.
Comput. J., 2005

Secure Anonymous Communication with Conditional Traceability.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

A Hierachical Method for Wiring and Congestion Prediction.
Proceedings of the 2005 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2005), 2005

Segmented channel routing with pin rearrangements via satisfiability.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A SOM-wavelet networks for face identification.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Adaptive matching wavelet networks for face recognition.
Proceedings of the 2005 International Conference on Image Processing, 2005

An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A stochastic model for cellassignments in PCS networks.
Math. Comput. Model., 2004

A comparative study on search strategies for cell assignments.
Int. J. Comput. Math., 2004

Anomaly Detection in Grid Computing Based on Vector Quantization.
Proceedings of the Grid and Cooperative Computing, 2004

Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Security middleware for enhancing interoperability of Public Key Infrastructure.
Comput. Secur., 2003

Lightweight security for mobile commerce transactions.
Comput. Commun., 2003

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...