Mengjun Li

According to our database1, Mengjun Li authored at least 52 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
The capability spaces complexity measure method of Weapon System of Systems.
Proceedings of the IEEE International Systems Conference, 2020

ANN-based Command and Control Seat Allocation Optimization with Simulation Data.
Proceedings of the IEEE International Systems Conference, 2020

How Gamification Increases Learning Performance? Investigating the Role of Task Modularity.
Proceedings of the Augmented Cognition. Human Cognition and Behavior, 2020

Recommendation or Advertisement? The Influence of Advertising-Disclosure Language with Pictorial Types on Influencer Credibility and Consumers' Brand Attitudes.
Proceedings of the HCI International 2020 - Late Breaking Papers: Interaction, Knowledge and Social Media, 2020

2019
基于视觉特性的手机屏幕亮度自适应调节算法 (Adaptive Adjustment Algorithm of Mobile Phone Screen Brightness Based on Visual Characteristics).
计算机科学, 2019

Early Prediction of Scientific Impact Based on Multi-Bibliographic Features and Convolutional Neural Network.
IEEE Access, 2019

Solving Constraint Optimization Problems Based on Mathematica and Abstraction.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2019

A Deep Learning Methodology for Citation Count Prediction with Large-scale Biblio-Features.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

2018
Image Multi-human Behavior Analysis Based on Low Rank Texture Direction.
J. Signal Process. Syst., 2018

Photographer trajectory detection from images.
Pers. Ubiquitous Comput., 2018

A Network-Based Portfolio Optimization Approach for Military System of Systems Architecting.
IEEE Access, 2018

Temporal Impact Analysis for Technological Innovation Based on Box-Cox Transformation.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

A Model-Based Architecture for Technological Management in Defense Acquisition.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

2017
Evolution monitoring for innovation sources using patent cluster analysis.
Scientometrics, 2017

Development trend forecasting for coherent light generator technology based on patent citation network analysis.
Scientometrics, 2017

Arms race analysis using capability-based graph model for conflict resolution.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A Scheduling Scheme of Task Allocation in Real Time Multiple-Partition Embedded Avionic.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

A Performance-Improved and Storage-Efficient Secondary Index for Big Data Processing.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Addressing Inefficiency of Floating-Point Operations in Cloud Computing: Implementation and a Case Study of Variable Precision Computing.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Ore image thresholding segmentation using double windows with fisher discrimination.
Proceedings of the 13th International Conference on Natural Computation, 2017

Tendency determining of knowledge-transfer evolution based on patent citation network.
Proceedings of the 13th International Conference on Natural Computation, 2017

Tackling Gaps in Floating-Point Arithmetic: Unum Arithmetic Implementation on FPGA.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

Exploring High Efficiency Hardware Accelerator for the Key Algorithm of Square Kilometer Array Telescope Data Processing.
Proceedings of the 25th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2017

Enhancing Precision and Bandwidth in Cloud Computing: Implementation of a Novel Floating-Point Format on FPGA.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Generating Equality Loop Invariants with Functions Based on Random Testing, Constraint Solving and Verification.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

2016
Belief preference in graph model for conflict resolution with two decision-makers.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A Versatile Event-Driven Data Model in HBase Database for Multi-source Data of Power Grid.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Finding All-One Hyper-Submatrix of an Incidence Matrix.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Evaluation of variable precision computing with variable precision FFT implementation on FPGA.
Proceedings of the 2016 International Conference on Field-Programmable Technology, 2016

2015
Parameter learning for the belief rule base system in the residual life probability prediction of metalized film capacitor.
Knowl. Based Syst., 2015

Automatic proving or disproving equality loop invariants based on finite difference techniques.
Inf. Process. Lett., 2015

A novel differential evolution algorithm for threat-oriented weapon system planning.
Proceedings of the Annual IEEE Systems Conference, 2015

2014
Organization-based agent-oriented programming: model, mechanisms, and language.
Frontiers Comput. Sci., 2014

Inferring loop invariants of programs with polynomial post-conditions.
Proceedings of the 6th Asia-Pacific Symposium on Internetware, 2014

2013
Structure learning for belief rule base expert system: A comparative study.
Knowl. Based Syst., 2013

Automatic classification for vulnerability based on machine learning.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Assisting Specification Refinement by Random Testing.
Proceedings of the Formal Methods and Software Engineering, 2013

Software Defect Prediction Using Dynamic Support Vector Machine.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A Practical Loop Invariant Generation Approach Based on Random Testing, Constraint Solving and Verification.
Proceedings of the Formal Methods and Software Engineering, 2012

2011
An Iterative Method for Generating Loop Invariants.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2011

2010
Automated Program Verification Using Generation of Invariants.
Proceedings of the 10th International Conference on Quality Software, 2010

2009
Constructing Program Invariants via Solving QBF.
Proceedings of the TASE 2009, 2009

2008
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Electron. Notes Theor. Comput. Sci., 2008

A Novel Derivation Framework For Definite Logic Program.
Electron. Notes Theor. Comput. Sci., 2008

Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Constraint Abstraction in Verification of Security Protocols.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Local abstract verification and refinement of security protocols.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

2007
Constraints Solution for Time Sensitive Security Protocols.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
Proceedings of the Advances in Computer Science, 2007

2006
An Value Range Analysis Based on Abstract Interpretation and Generalized Monotone Data Flow Framework.
J. Comput. Res. Dev., 2006

A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006


  Loading...