Search For:

Displaying 1-42 out of 42 total
Research and Implementation of Embedded Layout Accelerator Based on Multi-Cores System
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Qing Cheng Li, Liu Yang, Zheng Xuan Bai, Xiao Li Gong, Zhang Jin
Issue Date:December 2008
pp. 645-649
In this paper, our work is to frame multi-core processors systems which complete
 
Fabricating of Lithium-Battery-Grade Precursor Salt Cobaltous Carbonate
Found in: Intelligent Computation Technology and Automation, International Conference on
By Jian Zhou, Li-jun Li, Gong-xiu He, Ke Chen
Issue Date:May 2010
pp. 293-296
Some factors affect precursor capability, for example: raw material CoCl2 solution impurity、feeding methods of reactants、solutions’ pH value of deposition reaction、washing conditions, etc. Cobalt chloride is chosen as raw material, sodium carbonate as prec...
 
Java Security: A Ten Year Retrospective
Found in: Computer Security Applications Conference, Annual
By Li Gong
Issue Date:December 2009
pp. 395-405
The first edition of Java (both the language and the platform) was released in 1995, which contained the all-or-nothing security access model. A mid-1997 paper I published in IEEE Micro laid out a vision for the future of Java security, which notably inclu...
 
Integration Research of Intelligent Traffic Monitoring System for Urban Intersection Based on IEEE and CAN
Found in: Computer and Electrical Engineering, International Conference on
By Da-li Gong, Xiao Hu
Issue Date:December 2008
pp. 606-610
Based on IEEE1451 standards and Controller Area Network (CAN), an opening and
 
Why Cross-Platform Security
Found in: IEEE Internet Computing
By Li Gong
Issue Date:May 2003
pp. 96, 95
<p>Heterogeneity is a given these days in almost any IT system installation. How can developers ensure that required security properties can be correctly implemented and deployed across all the platforms on which an application such as a Web service ...
 
A New Column for a New Year
Found in: IEEE Internet Computing
By Li Gong
Issue Date:January 2003
pp. 96
<p><em>IC</em>'s newest column hopes to provide a forum for exploring potentially controversial topics that impact the whole Internet community.</p>
 
Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2)
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Li Gong, Satya Dodda
Issue Date:November 1999
pp. 89
With the release of Java 2 SE (Standard Edition, also commonly known as JDK 1.2), Java technology has matured such that it is increasingly deployed as part of the information infrastructure in today's economy and for mission-critical applications. These ap...
 
Secure Java Class Loading
Found in: IEEE Internet Computing
By Li Gong
Issue Date:November 1998
pp. 56-61
<p>The class loading mechanism, central to Java, plays a key role in JDK 1.2 by enabling an improved security policy that is permission-based and extensible.</p>
 
Java Security: Present and Near Future
Found in: IEEE Micro
By Li Gong
Issue Date:May 1997
pp. 14-19
This paper gives an overview of the basics of Java-related security issues, and outlines the technical direction of Java in terms of the security architecture and desirable features. This document is a purely technical discussion for the wider Java communi...
 
Integrating Security in a Group Oriented Distributed System
Found in: Security and Privacy, IEEE Symposium on
By Michael Reiter, Kenneth Birman, Li Gong
Issue Date:May 1992
pp. 18
A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions ...
 
K-Means Clustering with Bagging and MapReduce
Found in: Hawaii International Conference on System Sciences
By Hai-Guang Li, Gong-Qing Wu, Xue-Gang Hu, Jing Zhang, Lian Li, Xindong Wu
Issue Date:January 2011
pp. 1-8
Clustering is one of the most widely used techniques for exploratory data analysis. Across all disciplines, from social sciences over biology to computer science, people try to get a first intuition about their data by identifying meaningful groups among t...
   
Model for Renegotiation in Infrastructure Projects with Government Guarantee
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Li Gong,Jin Tian
Issue Date:August 2012
pp. 646-648
This paper aims to study how to renegotiate with the government guarantee again, and the impact of the government guarantee to negotiation. We use dynamic game theory to describe on the government renegotiation model, give the equilibrium path to the reneg...
 
Entry and Exit Decisions in a Symmetric Duopoly Option Game Model
Found in: Business Intelligence and Financial Engineering, International Conference on
By Li Gong,Jin Tian
Issue Date:October 2011
pp. 591-593
How many subsidies can cause firms to enter and exit is an interesting question. Different from the existing literature, the option game theory is applied to construct a symmetric duopoly model of investment with entry and exit decisions under uncertainty ...
 
Research of the Crane System Based on Technology of Storing-Energy with Super-capacitor
Found in: Electrical and Control Engineering, International Conference on
By Zhi-jun Li, Gong-qing Wang, Ke-yu Shen, Tian-fang Zhao, Xiang-gang Ni
Issue Date:June 2010
pp. 4046-4049
Saving energy, lowering energy consumption and reducing pollutants discharge was an important factor of effecting economic development. This is a new research direction to use super capacity to crane system. In this paper, the character of the super capaci...
 
Friction Compensation Based on Iterative Learning
Found in: Innovative Computing ,Information and Control, International Conference on
By Yan Yang, YunKuan Wang, YingHua Song, Li Gong
Issue Date:September 2007
pp. 608
A friction compensation approach based on iterative learning is developed in this note to address a class of nonlinear servo systems with repeatable actions and time-varying parametric uncertainties, which are iteration independent. By using the composite ...
 
An Adaptive Controller for the Temperature of Injection Molding Machine Cylinder
Found in: Innovative Computing ,Information and Control, International Conference on
By Yinghua Song, Yunkuan Wang, Li Gong, Yan Yang
Issue Date:September 2007
pp. 559
The heater of injection molding machine's cylinder is composed of several zones which spread along the cylinder's axis. There are strong coupling effects among the zones. To avoid computing-intensive decoupling matrices, we treat every zone as an independe...
 
Fault Detection and Self-Restore Control for Linear Systems
Found in: Intelligent Systems Design and Applications, International Conference on
By Juan Li, Gong-You Tang, Hong-Wei Gao
Issue Date:October 2006
pp. 873-878
Facing to a class of actuator faults and sensor faults with known dynamic characteristics but unknown initial conditions for linear systems with multiple disturbances, the fault detection and isolation (FDI) problems are considered based on the reduced dim...
 
It's China(town)
Found in: IEEE Internet Computing
By Li Gong
Issue Date:September 2004
pp. 104, 103
The Internet has come of age in China over the past few years in a unique way compared to Western models. It's easy to get connected, and mobile access plays a large role in all things Internet, but there are many mysteries and contradictions inherent to t...
 
Guest Editors' Introduction: Securing the High-Speed Internet
Found in: Computer
By Simon S.Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap
Issue Date:June 2004
pp. 33-35
No summary available.
 
Guest Editor's Introduction: Peer-to-Peer Networks in Action
Found in: IEEE Internet Computing
By Li Gong
Issue Date:January 2002
pp. 37-39
<p>Despite all the hype that continues to surround P2P networking, recent advances have fostered substantial interest in the technology from users and developers. This issue of IC takes a closer look at the state of the art, at the possibilities, and...
 
A Software Architecture for Open Service Gateways
Found in: IEEE Internet Computing
By Li Gong
Issue Date:January 2001
pp. 64-70
<p>Open-standard residential gateways promise to bring a wide variety of managed services to the home—without introducing new wires to the infrastructure.</p>
 
User Authentication and Authorization in the Java(tm) Platform
Found in: Computer Security Applications Conference, Annual
By Charlie Lai, Li Gong, Larry Koved, Anthony Nadalin, Roland Schemers
Issue Date:December 1999
pp. 285
Java(TM) security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java(TM) Platform (the Java(TM) 2 Software Development Kit, v 1.2),...
 
Experience with Secure Multi-Processing in Java
Found in: Distributed Computing Systems, International Conference on
By Dirk Balfanz, Li Gong
Issue Date:May 1998
pp. 398
As the Java(TM) platform is the preferred environment for the deployment of network computers, it is appealing to run multiple applications on a single Java-enabled desktop. We experimented with using the Java platform as a multi-processing, multi-user env...
 
Secure software architectures
Found in: Security and Privacy, IEEE Symposium on
By M. Moriconi, Xiaolei Qian, R.A. Riemenschneider, Li Gong
Issue Date:May 1997
pp. 0084
Abstract: The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software syst...
 
Ensuring assurance in mobile computing
Found in: Security and Privacy, IEEE Symposium on
By M. Schaefer, S. Pinsky, D. Dean, Li Gong, J. Roskind, B. Fox
Issue Date:May 1997
pp. 0114
Abstract: This paper introduces a panel discussion on establishing assurance evidence that mobile code applications perform as expected by the user, without the side effects that have been demonstrated as possible in constructed examples of malicious or
 
New security architectural directions for Java
Found in: Computer Conference, IEEE International
By Li Gong
Issue Date:February 1997
pp. 97
The paper gives an overview of the technical direction of Java in terms of the security architecture and desirable features. It also highlights some of the feasibility constraints on the security solutions. The paper assumes that the reader has prior knowl...
 
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
Found in: Security and Privacy, IEEE Symposium on
By Simon Foley, Li Gong, Xiaolei Qian
Issue Date:May 1996
pp. 0142
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, including high-water marks, downgrading, separation of duties, and Chinese Wall...
 
An Empirical Study of Secure MPEG Video Transmissions
Found in: Network and Distributed System Security, Symposium on
By Iskender Agi, Li Gong
Issue Date:February 1996
pp. 137
MPEG (Moving Pictures Expert Group) is an industrial standard for video processing and is widely used in multimedia applications in the Internet. However, no security provision is specified in the standard. We conducted an experimental study of previously ...
 
Computational Issues in Secure Interoperation
Found in: IEEE Transactions on Software Engineering
By Li Gong, Xiaolei Qian
Issue Date:January 1996
pp. 43-52
<p><b>Abstract</b>—Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We define the interoperation of secure systems and its security, and prove complexity a...
 
Enriching the Expressive Power of Security Labels
Found in: IEEE Transactions on Knowledge and Data Engineering
By Li Gong, Xiaolei Qian
Issue Date:October 1995
pp. 839-841
<p><it>Abstract</it>—Common security models such as Bell-LaPadula focus on the control of access to sensitive data but leave some important systems issues unspecified, such as the implementation of read-only objects, garbage collection, a...
 
Optimal authentication protocols resistant to password guessing attacks
Found in: Computer Security Foundations Workshop, IEEE
By Li Gong
Issue Date:March 1995
pp. 24
Users are typically authenticated by their passwords. Because people are known to choose convenient passwords, which tend to be easy to guess, authentication protocols have been developed that protect user passwords from guessing attacks. These proposed pr...
 
The Complexity and Composability of Secure Interoperation
Found in: Security and Privacy, IEEE Symposium on
By Li Gong, Xiaolei Qian
Issue Date:May 1994
pp. 190
Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We define the interoperation of secure systems and its security, and prove complexity and composability results on obtaining...
 
Preventing Denial and Forgery of Causal Relationships in Distributed Systems
Found in: Security and Privacy, IEEE Symposium on
By Micheal Reiter, Li Gong
Issue Date:May 1993
pp. 30
In a distributed system, it is often important to detect the causal relationships between events, where event el is causally before event e<sub>2</sub> if e<sub>1</sub> happened before e<sub>2</sub> and could possibly ha...
 
Reasoning about Belief in Cryptographic Protocols
Found in: Security and Privacy, IEEE Symposium on
By Li Gong, Roger Needham, Raphael Yahalom
Issue Date:May 1990
pp. 234
Analysis methods for cryptographic protocols have often focused on information leakage rather than on seeing whether a protocol meets its goals. Many protocols, however, fall far short of meeting their goals, sometimes for quite subtle reasons. We introduc...
 
A Secure Identity-Based Capability System
Found in: Security and Privacy, IEEE Symposium on
By Li Gong
Issue Date:May 1989
pp. 56
We present the design of an Identity-based Capability protection system ICAP, which is aimed at a distributed system in a network environment. The semantics of traditional capabilities are modified to incorporate subject identities. This enables the monito...
 
Java security architecture revisited
Found in: Communications of the ACM
By Li Gong
Issue Date:November 2011
pp. 48-52
Difficult technical problems and tough business challenges.
     
Java Security Architecture Revisited
Found in: Queue
By Li Gong
Issue Date:September 2011
pp. 30-36
Hard technical problems and tough business challenges
     
Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems (CHI '01)
By Jennifer Lai, Li Gong
Issue Date:March 2001
pp. 158-165
No summary available.
     
New protocols for third-party-based authentication and secure broadcast
Found in: Proceedings of the 2nd ACM Conference on Computer and communications security (CCS '94)
By Li Gong
Issue Date:November 1994
pp. 176-183
This paper gives Needham-Schroeder style third-party-based authentication and key-distribution protocols that do not use conventional cryptosystems such as DES. The new protocols use polynomial interpolation and secure keyed one-way hash functions, and are...
     
Lower bounds on messages and rounds for network authentication protocols
Found in: Proceedings of the 1st ACM conference on Computer and communications security (CCS '93)
By Li Gong
Issue Date:November 1993
pp. 26-37
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries who obtain the one-way encrypted password file may (i) successfully mimic (spoof) the host to the user, and (ii) mount dictiona...
     
Speech interfaces from an evolutionary perspective
Found in: Communications of the ACM
By Clifford Nass, Li Gong
Issue Date:January 1988
pp. 36-43
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
     
Research on the Application of Cigarette Tobacco-Group?s Intelligent Aided Design
Found in: International Conference on Natural Computation
By Hui-li Gong, Rui-chun Hou, Xiang-qian Ding
Issue Date:October 2008
pp. 655-659
Aiming at the shortcoming of subjectivity, high cost and long period in traditional cigarette formula design, the new method based on the genetic algorithm, uniform design method and industry expert knowledge was presented in this paper to search the ratio...
 
 1