Mingqiang Li
Mingqiang Li

Homepage at IBM Research
mingqiangliatcn.ibm.com

  Affiliation history
· Ohio State University
· Harvard University
· York University Canada
· University of Washington, Seattle
· University of Waterloo
· University of Rhode Island
· City University of Hong Kong
· Worcester Polytechnic Institute
· University of California, Santa Barbara
· Microsoft Research Asia
· Microsoft Research
· University of Texas at Dallas
· Massachusetts Institute of Technology
· Oakland University
· University of Rochester
· Carnegie Mellon University
· East China Normal University
· University of Science and Technology of China
· Shanghai Jiaotong University
· Institute of Systems Science Beijing
· Tsinghua University
· Institute of Software Chinese Academy of Sciences
· National University of Defense Technology China
· Nanjing University
· DOE Joint Genome Institute
· Beijing Jiaotong University
· David R. Cheriton School of Computer Science
· University of Maryland
· Cardiff University
· Lanzhou University of Technology
· University of Massachusetts Amherst
· University of California, Los Angeles
· Shanghai University
· Chinese Academy of Sciences
· Unilever
· California State University Fresno
· Dartmouth College
· Deakin University
· Boeing Corporation
· Academy of Mathematics and System Sciences Chinese Academy of Sciences
· Graduate University of Chinese Academy of Sciences
· National University of Singapore
· China University of Mining Technology
· Dalian University of Technology
· Institute of Computing Technology Chinese Academy of Sciences
· Changhai Hospital
· California State University
· Zhejiang University
· IBM Thomas J. Watson Research Center
· IBM, USA
· IBM Research
· Utah State University
Bibliometrics: publication history
Average citations per article11.09
Citation Count4,593
Publication count414
Publication years1983-2015
Available for download128
Average downloads per article532.58
Downloads (cumulative)68,170
Downloads (12 Months)2,616
Downloads (6 Weeks)379
ACM Fellow
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


414 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 414
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1
December 2015 Journal of Network and Computer Applications: Volume 58 Issue C, December 2015
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 1

Content-Centric Networking (CCN), which changes from host-centric communication model to content-centric communication model, has recently attracted a lot of attention from researchers. As recently emerged a clean slate approach of the future Internet, CCN needs to be further supplemented yet. Since power consumption by Internet and user demand for Quality ...
Keywords: Ant colony optimization, Energy-efficiency, Named data networking, Quality of service, Content-Centric Networking

2 published by ACM
June 2015 ACM Transactions on the Web (TWEB): Volume 9 Issue 3, June 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 40,   Downloads (Overall): 173

Full text available: PDFPDF
Distributed service networks are popular platforms for service providers to offer services to consumers and for service consumers to acquire services from unknown parties. eBay and Amazon are two well-known examples of enabling and hosting such service networks to connect service providers to service consumers. Trust management is a critical ...
Keywords: Feedback rating quality, Trust, reliability, attack resilience, distributed service network

3 published by ACM
May 2015 WWW '15 Companion: Proceedings of the 24th International Conference on World Wide Web
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 9,   Downloads (12 Months): 56,   Downloads (Overall): 148

Full text available: PDFPDF
A central task of computational linguistics is to decide if two pieces of texts have similar meanings. Ideally, this depends on an intuitive notion of semantic distance. While this semantic distance is most likely undefinable and uncomputable, in practice it is approximated heuristically, consciously or unconsciously. In this paper, we ...
Keywords: semantic distance, information distance, text classification, question answering

4 published by ACM
April 2015 ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 46,   Downloads (Overall): 154

Full text available: PDFPDF
Physical layer message integrity protection and authentication by countering signal-cancellation has been shown as a promising alternative to traditional pure cryptographic message authentication protocols, due to the non-necessity of neither pre-shared secrets nor secure channels. However, the security of such an approach remained an open problem due to the lack ...

5 published by ACM
February 2015 ACM SIGSOFT Software Engineering Notes: Volume 40 Issue 1, January 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 16,   Downloads (Overall): 87

Full text available: PDFPDF
The second International Workshop on Software Mining (Soft-mine) was held on the 11th of November 2013. The workshop was held in conjunction with the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE) in Silicon Valley, California, USA. The workshop has facilitated researchers who are interested in mining various types ...
Keywords: developer productivity, Software quality, data mining, workshop report

6 published by ACM
June 2014 ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 6,   Downloads (12 Months): 63,   Downloads (Overall): 392

Full text available: PDFPDF
Cloud computing promises users massive scale outsourced data storage services with much lower costs than traditional methods. However, privacy concerns compel sensitive data to be stored on the cloud server in an encrypted form. This posts a great challenge for effectively utilizing cloud data, such as executing common SQL queries. ...
Keywords: multiple dimension, tree structures, range search, encrypted cloud data

7
March 2014 Microelectronic Engineering: Volume 116, March, 2014
Publisher: Elsevier Science Ltd.
Bibliometrics:
Citation Count: 0

The filling mechanism of a special through silicon vias (TSV) structure is investigated by electrochemical test and simulation technique compared with the conventional TSV structure in this paper. The effects of additives in methanesulfonic solution are briefly studied by cyclic voltammetry to obtain the suitable copper plating condition for conventional ...
Keywords: Through-silicon-via, Electroplating, Simulation, Methanesulfonic acid

8
September 2013 BodyNets '13: Proceedings of the 8th International Conference on Body Area Networks
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 9,   Downloads (Overall): 53

Full text available: PDFPDF
Streaming and analysis of time series body sensor data have been well investigated recently for various applications, especially on health data monitoring. However, existing strategies work independently from each other. Obviously, lacking appropriate information sharing, feedback, and interaction mechanisms, these strategies, even in combination, do not provide an efficient and ...
Keywords: streaming, body sensor networks, data analysis, framework, time series data

9 published by ACM
July 2013 Communications of the ACM: Volume 56 Issue 7, July 2013
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 41,   Downloads (Overall): 831

Full text available: HtmlHtml  PDFPDF
The RSVP voice-recognition search engine improves speech recognition and translation accuracy in question answering.

10 published by ACM
May 2013 ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 14,   Downloads (12 Months): 156,   Downloads (Overall): 1,092

Full text available: PDFPDF
With the increasing popularity of cloud computing, huge amount of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryption helps protecting user data confidentiality, it leaves the well-functioning yet practically-efficient secure search functions over encrypted data a challenging problem. In this paper, we ...
Keywords: privacy-preserving search, multi-keyword search, similarity-based ranking, cloud computing

11 published by ACM
April 2013 CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 6,   Downloads (12 Months): 54,   Downloads (Overall): 658

Full text available: PDFPDF
This paper describes the Dubuque Electricity Portal, a city-scale system aimed at supporting voluntary reductions of electricity consumption. The Portal provided each household with fine-grained feedback on its electricity use, as well as using incentives, comparisons, and goal setting to encourage conservation. Logs, a survey and interviews were used to ...
Keywords: behavior change, ecf, sustainability, consumption feedback systems, social comparison, electricity, smart meters

12 published by ACM
April 2013 WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 5,   Downloads (12 Months): 40,   Downloads (Overall): 431

Full text available: PDFPDF
Recently there has been an increasing interest on bootstrapping security for wireless networks merely using physical layer characteristics. In particular, the focus has been on two fundamental security issues - device authentication and secret key extraction. While most existing works emphasize on tackling the two issues separately, it remains an ...
Keywords: physical layer, rss, sensor, authenticated key generation, wireless body area network

13 published by ACM
April 2013 ACM Transactions on Sensor Networks (TOSN): Volume 9 Issue 2, March 2013
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 4,   Downloads (12 Months): 87,   Downloads (Overall): 909

Full text available: PDFPDF
The body area network (BAN) is a key enabling technology in e-healthcare. An important security issue is to establish initial trust relationships among the BAN devices before they are actually deployed and generate necessary shared secret keys to protect the subsequent wireless communications. Due to the ad hoc nature of ...
Keywords: key management, device pairing, body area networks, efficiency, Trust establishment, usable security

14 published by ACM
October 2012 CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 25,   Downloads (Overall): 331

Full text available: PDFPDF
Simultaneously realizing device authentication and fast secret key extraction is a challenging issue in wireless networks. Most existing works solve this problem by utilizing either advanced hardware or out-of-band channel, which is not always available for commercial-off-the-shelf wireless devices. In this work, we solve this challenging issue under the setting ...
Keywords: ban, sensor, authenticated key generation, physical layer

15
September 2012 WABI'12: Proceedings of the 12th international conference on Algorithms in Bioinformatics
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Previous study shows that the same type of bond lengths and angles fit Gaussian distributions well with small standard deviations on high resolution protein structure data. The mean values of these Gaussian distributions have been widely used as ideal bond lengths and angles in bioinformatics. However, we are not aware ...

16
July 2012 Journal of Network and Computer Applications: Volume 35 Issue 4, July, 2012
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 5

Human associated delay-tolerant network (HDTN) is a new delay-tolerant network where mobile devices are associated with humans. It can be viewed from both their geographic and social dimensions. The combination of these different dimensions can enable us to more accurately comprehend a delay-tolerant network and consequently use this multi-dimensional information ...
Keywords: Multiple dimensions, Social aware routing, Delay-tolerant network, Multi-cast

17
June 2012 Automated Software Engineering: Volume 19 Issue 2, June 2012
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 20

Software defect prediction can help us better understand and control software quality. Current defect prediction techniques are mainly based on a sufficient amount of historical project data. However, historical data is often not available for new projects and for many organizations. In this case, effective defect prediction is difficult to ...
Keywords: Machine learning, Sampling, Active semi-supervised learning, Software defect prediction, Quality assurance

18
May 2012 IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB): Volume 9 Issue 3, May 2012
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 1,   Downloads (Overall): 108

Full text available: PDFPDF
Ab initio protein structure prediction methods first generate large sets of structural conformations as candidates (called decoys), and then select the most representative decoys through clustering techniques. Classical clustering methods are inefficient due to the pairwise distance calculation, and thus become infeasible when the number of decoys is large. In ...
Keywords: Protein structure, decoy selection, clustering.

19
May 2012 Journal of Network and Computer Applications: Volume 35 Issue 3, May, 2012
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 18

Along with the development of the service-oriented architecture (SOA) and cloud computing, a large number of service providers have created an intense competitive world of business. Consequently, it is becoming increasingly complex to select a service provider for a user as a result of their various economic and social attributes. ...
Keywords: Service-oriented architecture, Quality of service, Scheduling, Web service

20 published by ACM
April 2012 WISEC '12: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 2,   Downloads (12 Months): 10,   Downloads (Overall): 380

Full text available: PDFPDF
Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. In order to ensure the trustworthy and reliable gathering of patient's critical health information, it is essential to provide node authentication service in a BAN, which prevents an attacker from impersonation ...
Keywords: wireless body area network, physical layer, authentication, rss, sensor



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us