Liangli Ma

Learn More
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the(More)
Component metadata is one of the most effective methods to improve the testability of component-based software. In this paper, we firstly give a formal definition of component, and summarize the basic meanings of component metadata. Based on these, an idea of grouped-metadata object (GMO) is introduced, which is divided into two types, respectively named(More)
Component-based software development technique and its intensive use in the industry has led to the wide research in various aspects of component-based systems. How to improve the testability of component-based software is an interesting and useful technique in the component-based software engineering. In this paper, we summarize eight types of dependency(More)
Component-based software development technique and its intensive use in the industry has led to the wide research in various aspects of component-based systems (CBSs). Its relating quality assurance techniques had become the key research content. This paper summarizes eight types of dependency between two components in the CBSs. And it discusses about a(More)
Wireless sensor control networks (WSCNs) are important scenarios and trends in mobile wireless sensor networks. Compared with traditional wireless sensor networks, WSCNs have two specific characteristics: entities in networks are extended from passive sensors to active sensors (e.g., actuators and actors) and the transmitting messages are extended from data(More)