Peer-reviewed conference and journal papers:
- Chung-Chih Li. Notes no Simple Linear String Equations. TACSA 2010 (Draft)
- Xiang Fu and Chung-Chih Li. Modeling Regular Replacement for String Constraint Solving. NASA Formal Methods Symposium 2010, Washington D.C., USA, April, 2010
- Xiang Fu, Chung-Chih Li, and Kai Qian. On Simple Linear String Equations. 16th International Conference on Tools and Algorithms for The Construction and Analysis of Systems, Paphos, Cyprus, 2010
- Chung-Chih Li. NP-Completeness of RRS Functions Computability in Europe 2009: Mathematical Theory and Computational Practice
- Chung-Chih Li. Union Theorems in Type-2 Computations Computability in Europe 2009: Mathematical Theory and Computational Practice (Full version) CIE slides
- Chung-Chih Li. Speed-up Theorems in Type-2 Computations Using Oracle Turing Machines. Journal of Theory of Computing Systems (Author's proof version)
- Ming Lei, Yang Xiao, Susan V. Vrbsky, and Chung-Chih Li, Virtual Password Using Random Linear Functions for On-line Services, ATM Machines, and Pervasive Computing Journal of Computer Communications 31 (2008) 4367–4375. (Author's proof version)
- Chung-Chih Li. Query-Optimal Oracle Turing Machines for Type-2 Computations. In Proceedings of Computability in Europe 2008 -- Logic and Theory of Algorithms. ppt slides
- Chung-Chih Li, Kishan Mehrotra, and Chu Jong Discrete Mathematics as A Transitional Course. TBA .
- Bo Sun, Yang Xiao, Chung Chih Li, Hsiao-Hwa Chen, T. Andrew Yang Security co-existence of wireless sensor networks and RFID for pervasive computing Computer Communications 31 (2008) 4294–4303.
- Chung-Chih Li. Asymptotic behaviors of type-2 algorithms and induced baire topologies. Journal of -- (TBA) .
- Chung-Chih Li. Time bounds and the unit cost model for clocking type-2 computation. Journal of -- (TBA).
- Yang Xiao, Chung-Chih Li, Ming Lei, and Susan V. Vrbsky Secret Little Functions and Codebook for Protecting Users from Password Theft. IEEE ICC 2008.
- Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih Li, and Li Liu A Virtual Password Scheme to Protect Passwords on the Internet. IEEE ICC 2008.
- Bo Sun, Yang Xiao, Chung Chih Li, and T. Andrew Yang Security Co-existence of Wireless Sensor Networks and RFID. IEEE Wireless Communications: Wireless Sensor Networking
- Chung-Chih Li. Speed-up theorems in type-2 computation. Computability in Europe 2007 -- Computation and Logic in the Real World. In Proceedings edited by S. Barry Cooper, Benedikt Lowe, and Andrea Sorbi. Springer LNCS Vol. 4497, Pages 182-192. June 2007, Siena, Italy. (full version)
- Bo Sun, Chung-Chih Li, and Yang Xiao. A Lightweight Secure Solution for RFID. IEEE GLOBECOM 2006 - Network Security Symposium
- Dehu Qi and Chung-Chih Li, Self-Organizing Map based Web Pages Clustering using Web Logs, Proceedings of 16th International Conference on Software Engineering and Data Engineering, SEDE-2007, Pages 265--270, Las Vegas, Nevada, July 2007
- Chung-Chih Li. Clocking Type-2 Computation in The Unit Cost Model. Computability in Europe, CiE 2006: Logical Approach to Computational Barriers. In Proceedings edited by Arnold Beckmann, Ulrich Berger, Benedikt Lowe and John V. Tucker. Pages 182-192. Walse, UK. June/July 2006. (Full version)
- Chung-Chih Li. An immediate approach to balancing nodes in binary search trees. Journal of Computing Sciences in Colleges , 21(3):238--245 April 2006.
- Bo Sun, Chung-Chih Li, Kui Wu, and Yang Xiao. A lightweight secure protocol for wireless sensor networks. Special Issue of Elsevier Computer Communications on Wireless Sensor Networks, Performance, Reliability, Security and Beyond, 2006. Pages 2556-2568.
- Bo Sun, Chung-Chih Li, Kui Wu, and Yang Xiao. A LCG-based secure protocol for wireless sensor . In Proceedings of IEEE International Conference on Communications, Wireless Ad Hoc and Sensor Networks Symposia, 2006.
- Chung-Chih Li and Hikyoo Koh. Using joseki for tactics deployment in computer go. Journal of International Computer Games Association, ICGA, 28(3):154-158, 2005.
- Chung-Chih Li and Hikyoo Koh. Canonical sequence directed tactics analyzer for computer go games. In Proceedings of the International Conference on Computational Intelligence for Modelling Control and Automation, CIMCA 2005, Pages 1066-1071, Vienna, Austria, November 2005.
- Chung-Chih Li and Bo Sun. Using linear congruential generators for cryptographic purposes. In Proceedings of the ISCA 20th International Conference on Computers and Their Applications, pages 13--18, March 2005.
- Chung-Chih Li, Hema Sagar R. Kandati, and Bo Sun. Security evaluation of email encryption using random noise generated by LCGs. Journal of Computing Sciences in Colleges, 20(4):294--301, 2005.
- Chung-Chih Li. Asymptotic behaviors of type-2 algorithms and induced Baire topologies. In Proceedings of the Third International Conference on Theoretical Computer Science, pages 471--484, Toulouse, France, August 2004.
- Hema Sagar R. Kandati and Chung-Chih Li. Encrypting emails with LCM random noises. In Fifth Annual Lamar Research Conference, Beaumont, Texas, 2004.
- Chung-Chih Li and James S. Royer. On type-2 complexity classes: Abstract. (ps) IEEE Conference on Computational Complexity, May 2003.
- Chung-Chih Li and James S. Royer. On type-2 complexity classes: preliminary report. In Proceedings of the Third International Workshop on Implicit Computational Complexity, pages 123--138, Aarhus, Denmark, May 2001.
Book and Thesis
- Chung-Chih Li and Kishan Mehrotra. Problems on discrete mathematics, Volumes 1 & 2. Table of contents. Lecture notes, 403 pp, Syracuse University, 1998. Used and published by Syracuse University; (currently under negotiation with publishers for public publication).
- Chung-Chih Li. Type-2 Complexity Theory. Ph.D. dissertation, Syracuse University, Syracuse, New York, USA, 2001.
- Chung-Chih Li. Analysis of Go Game Tactics Based on Predefined Canonical Sequences. Master thesis, Lamar University, Beaumont, Texas, USA, 1991.
Under Construction
- Chung-Chih Li. Buffered binary search trees, (experimental results are collected.
- Chung-Chih Li. Speed-up theorems in type-2 computation, (main results are proven)
- Chung-Chih Li and James S. Royer, Type-2 complexity theory (a survey paper aiming at a journal to publish).
- Chung-Chih Li. A Brief Note on Church-Turing Thesis and R.E. Sets,