Guoqiang Li

According to our database1, Guoqiang Li authored at least 65 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Configurable WoT Application Platform Based on Spatiotemporal Semantic Scenarios.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2019

Unsupervised blocking and probabilistic parallelisation for record matching of distributed big data.
The Journal of Supercomputing, 2019

Statistically managing cloud operations for latency-tail-tolerance in IoT-enabled smart cities.
J. Parallel Distrib. Comput., 2019

A context-based service matching approach towards functional reliability for industrial systems.
Enterprise IS, 2019

Hierarchical extreme learning machine based image denoising network for visual Internet of Things.
Appl. Soft Comput., 2019

2018
R2C: Robust Rolling-Upgrade in Clouds.
IEEE Trans. Dependable Sec. Comput., 2018

Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm.
IEEE Trans. Comput. Social Systems, 2018

Verifying OSEK/VDX automotive applications: A Spin-based model checking approach.
Softw. Test., Verif. Reliab., 2018

Asynchronous multi-process timed automata.
Software Quality Journal, 2018

A CNN-SIFT Hybrid Pedestrian Navigation Method Based on First-Person Vision.
Remote Sensing, 2018

Data-Driven Proactive Policy Assurance of Post Quality in Community q&a Sites.
PACMHCI, 2018

Digital image splicing detection based on Markov features in block DWT domain.
Multimedia Tools Appl., 2018

Double JPEG compression detection based on block statistics.
Multimedia Tools Appl., 2018

Detecting users' anomalous emotion using social media for business intelligence.
J. Comput. Science, 2018

A customised automata algorithm and toolkit for language learning and application.
IJBDI, 2018

autoC: an efficient translator for model checking deterministic scheduler based OSEK/VDX applications.
SCIENCE CHINA Information Sciences, 2018

Updatable timed automata with one updatable clock.
SCIENCE CHINA Information Sciences, 2018

Evaluation of redundancy-based system: a model checking approach.
SCIENCE CHINA Information Sciences, 2018

SCFM: Social and crowdsourcing factorization machines for recommendation.
Appl. Soft Comput., 2018

An efficient approach for verifying automobile distributed application systems on timing property.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Examine Manipulated Datasets with Topology Data Analysis: A Case Study.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Exploiting long-term and short-term preferences and RFID trajectories in shop recommendation.
Softw., Pract. Exper., 2017

Dynamic Weight-Based Individual Similarity Calculation for Information Searching in Social Computing.
IEEE Systems Journal, 2017

Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler.
Journal of Systems Architecture - Embedded Systems Design, 2017

A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds.
Future Generation Comp. Syst., 2017

Active Learning with Density-Initialized Decision Tree for Record Matching.
Proceedings of the 29th International Conference on Scientific and Statistical Database Management, 2017

The Complexity of Linear-Time Temporal Logic Model Repair.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2017

Nested Timed Automata with Invariants.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2017

A Novel Hidden Markov Model for Genome-Wide Association Studies.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Behavior Analysis Method Towards Product Quality Management.
Proceedings of the Research and Practical Issues of Enterprise Information Systems, 2017

Nested Timed Automata with Diagonal Constraints.
Proceedings of the Formal Methods and Software Engineering, 2017

Indexing for Large Scale Data Querying Based on Spark SQL.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017

2016
An online greedy allocation of VMs with non-increasing reservations in clouds.
The Journal of Supercomputing, 2016

Non-Intrusive Anomaly Detection With Streaming Performance Metrics and Logs for DevOps in Public Clouds: A Case Study in AWS.
IEEE Trans. Emerging Topics Comput., 2016

A preemptive truthful VMs allocation online mechanism in private cloud.
J. Comput. Science, 2016

On Termination and Boundedness of Nested Updatable Timed Automata.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016

Schedulability Analysis of Timed Regular Tasks by Under-Approximation on WCET.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2016

CAT: A Customized Automata Toolkit.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Probabilistic parallelisation of blocking non-matched records for big data.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Verifying OSEK/VDX applications: An optimized SMT-based bounded model checking approach.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
Constructing format-preserving printing from syntax-directed definitions.
SCIENCE CHINA Information Sciences, 2015

On Reachability Analysis of Updatable Timed Automata with One Updatable Clock.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2015

A Refined Algorithm for Reachability Analysis of Updatable Timed Automata.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Nested Timed Automata with Frozen Clocks.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2015

2014
An Over-Approximation Forward Analysis for Nested Timed Automata.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

Online Mechanism Design for VMs Allocation in Private Cloud.
Proceedings of the Network and Parallel Computing, 2014

Toward SIL Evaluation for a Resilience Strategy.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
Game Analysis of Workload Factoring with the Hybrid Cloud.
Proceedings of the First International Symposium on Computing and Networking, 2013

Nested Timed Automata.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2013

2012
Modeling and Analysis of Real-Time Systems with Mutex Components.
Int. J. Found. Comput. Sci., 2012

Multi-index evaluation algorithm based on principal component analysis for node importance in complex networks.
IET Networks, 2012

An Improved Full Abstraction Approach to Analyzing Locality Semantics.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Emerald: An Automated Modeling and Verification Tool for Component-Based Real-Time Systems.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

Measuring Time Lag with Nested Preemptions and Resumptions.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

2011
A Game Theoretic Model and Tree Analysis Method for Fair Exchange Protocols.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

2010
Modeling and analysis of real -time systems with mutex components.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

2009
Environmental Simulation of Real-Time Systems with Nested Interrupts.
Proceedings of the TASE 2009, 2009

2008
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol.
Proceedings of the Automated Technology for Verification and Analysis, 2008

2007
On-the-Fly Model Checking of Fair Non-repudiation Protocols.
Proceedings of the Automated Technology for Verification and Analysis, 2007

2006
Secrecy of Signals by Typing in Signal Transduction.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

2005
A Simple Process Calculus for the analysis of Security Protocols.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Typing Aberrance in Signal Transduction.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Representation of the Signal Transduction with Aberrance Using Ipi Calculus.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Analyzing iKP Security in Applied Pi Calculus.
Proceedings of the Computational and Information Science, First International Symposium, 2004


  Loading...