Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    TESDAM: Neural Networks Dataflow Modeling Based on Spatiotemporal Migration Representation

    Spatial architecture has emerged as a promising way to accelerate artificial neural networks (ANNs), but requires to model the ANN hardware dataflow to obtain the optimal dataflow choice to obtain ideal accele...

    Yicong Li, Kuanjiu Zhou, Li Li, Lin Xu in Proceeding of 2022 International Conferenc… (2023)

  2. No Access

    Chapter and Conference Paper

    Ferproof: A Constant Cost Range Proof Suitable for Floating-Point Numbers

    The decentralization of the blockchain has led to the leakage of privacy data at the transaction layer, causing information security issues. The zero-knowledge range proof can confidentially verify that the tr...

    Yicong Li, Kuanjiu Zhou, Lin Xu in Algorithms and Architectures for Parallel … (2022)

  3. No Access

    Article

    EHSTM: a formal model of embedded software and research on several key issues

    The traditional system design method cannot guarantee the dependence of large-scale and complex real-time embedded software. The model constructed by UML and other semi-structured modeling languages does not s...

    Watanabe Masahiko, Kuanjiu Zhou, Yicong Li in CCF Transactions on High Performance Compu… (2021)

  4. No Access

    Chapter and Conference Paper

    A Partition Method of SoC Design Serving the Multi-FPGA Verification Platform

    FPGA (Field-Programmable Gate Array) technology can provide excellent accuracy and efficiency for Chip verification, which has become the key bottleneck of SoC design. Due to the resource constraints of single...

    Shenglai Yang, Kuanjiu Zhou, Jie Wang, Bin Liu, Ting Li in Advanced Computer Architecture (2014)

  5. No Access

    Chapter and Conference Paper

    Accelerating Software Model Checking Based on Program Backbone

    Model checking technique has been gradually applied to verify the reliability of software systems. However, as to software with large scale and complex structure, the verification procedure suffers from the st...

    Kuanjiu Zhou, Jiawei Yong, **aolong Wang in Advanced Parallel Processing Technologies (2013)

  6. No Access

    Chapter and Conference Paper

    Interrupt Modeling and Verification for Embedded Systems Based on Time Petri Nets

    The embedded systems are interrupt-driven systems, but the triggered methods of interrupts are with randomness and uncertainty. The behavior of interrupt can be quite difficult to fully understand, and many ca...

    Gang Hou, Kuanjiu Zhou, Junwang Chang, Rui Li in Advanced Parallel Processing Technologies (2013)

  7. No Access

    Chapter and Conference Paper

    A Method of Software Defects Mining Based on Static Analysis

    Software defects are easy to cause when programming by C++ language, because of its features of flexibility and complexity, as well as its large number of undefined behaviors. According to “MISRA C++ 2008” saf...

    **aochen Lai, Kuanjiu Zhou, Likun Li in Advanced Research in Applied Artificial In… (2012)

  8. No Access

    Chapter and Conference Paper

    An Improved NN-SVM Based on K Congener Nearest Neighbors Classification Algorithm

    Support vector machine constructs an optimal classification hyperplane by support vectors. While samples near the boundary are overlapped seriously, it not only increases the burden of computation but also dec...

    Shirong Zhang, Kuanjiu Zhou, Yuan Tian in Knowledge Science, Engineering and Management (2007)

  9. No Access

    Chapter and Conference Paper

    Algorithm for Public Transit Trip with Minimal Transfer Times and Shortest Travel Time

    Considering passengers’ travel psychoanalysis, the public traffic model of optimum route is proposed, which primary goal is minimal transfer times and the second goal is shortest travel time. On the integrated...

    Gang Hou, Kuanjiu Zhou, Yang Tian in Knowledge Science, Engineering and Management (2007)