Embedded architecture description language

J Li, NT Pilkington, F Xie, Q Liu - Journal of Systems and Software, 2010 - Elsevier
In the state-of-the-art hardware/software (HW/SW) co-design of embedded systems, there is
a lack of sufficient support for architectural specifications across HW/SW boundaries. Such …

An automata-theoretic approach to hardware/software co-verification

J Li, F Xie, T Ball, V Levin, C McGarvey - … , FASE 2010, Held as Part of the …, 2010 - Springer
In this paper, we present an automata-theoretic approach to Hardware/ Software (HW/SW)
co-verification. We designed a co-specification framework describing HW/SW systems; …

Relational databases watermark technique based on content characteristic

Y Zhang, X Niu, D Zhao, J Li… - … Conference on Innovative …, 2006 - ieeexplore.ieee.org
With the development of the Internet and wide applications of databases, the databases
providers are worrying about their ownership of the databases. Combined with the digital …

Formalizing hardware/software interface specifications

J Li, F Xie, T Ball, V Levin… - 2011 26th IEEE/ACM …, 2011 - ieeexplore.ieee.org
Software drivers are usually developed after hardware devices become available. This
dependency can induce a long product cycle. Although co-simulation and co-verification …

Component-based abstraction and refinement

J Li, X Sun, F Xie, X Song - International Conference on Software Reuse, 2008 - Springer
In this paper, we present a comprehensive approach to model check- ing component-based
systems (including software, hardware, and embedded systems) through abstraction and …

[PDF][PDF] A fingerprint enhancement algorithm using a federated filter

Y Zhang, Y Jiao, J Li, X Niu - HIT, China, 2002 - Citeseer
In the application of the Automatic Fingerprint Identification System (AFIS), some fingerprint
images are noisy and corrupted. In such situation, an effectively enhancement algorithm to …

Research on a novel hashing stream cipher

Y Zhang, X Niu, J Li, C Li - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
A stream cipher namely the HSC (hashing stream cipher) which uses a regular one-way
hash function to generate pseudorandom keystream iteratively is proposed. Since the …

The psychological status of 8817 hospital workers during COVID-19 Epidemic: A cross-sectional study in Chongqing

…, J Guanghua, H Zhiqin, B Nkundimana, K Li - Journal of affective …, 2020 - Elsevier
Background There was an outbreak of COVID-19 towards the end of 2019 in China, which
spread all over the world rapidly. The Chinese healthcare system is facing a big challenge …

Guiding component-based hardware/software co-verification with patterns

J Li, F Xie, H Liu - 33rd EUROMICRO Conference on Software …, 2007 - ieeexplore.ieee.org
In component-based hardware/software co-verification, properties of an embedded system
are established from properties of its hardware and software components. A major challenge …

Eside: An integrated development environment for component-based embedded systems

NT Pilkington, J Li, F Xie - 2009 33rd Annual IEEE International …, 2009 - ieeexplore.ieee.org
In this paper we present ESIDE, an integrated development environment for component-based
embedded systems. It leverages component-based software engineering principles to …