Fei Xie

ORCID: 0000-0002-7324-3287
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Formal Methods in Verification
  • Software Testing and Debugging Techniques
  • Radiation Effects in Electronics
  • Embedded Systems Design Techniques
  • VLSI and Analog Circuit Testing
  • Software Reliability and Analysis Research
  • Real-Time Systems Scheduling
  • Advanced Software Engineering Methodologies
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Security and Verification in Computing
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Malware Detection Techniques
  • Cloud Computing and Resource Management
  • Safety Systems Engineering in Autonomy
  • Parallel Computing and Optimization Techniques
  • Software System Performance and Reliability
  • Peer-to-Peer Network Technologies
  • IoT and Edge/Fog Computing
  • Model-Driven Software Engineering Techniques
  • Wireless Networks and Protocols
  • Quantum Computing Algorithms and Architecture
  • Vehicular Ad Hoc Networks (VANETs)
  • Distributed and Parallel Computing Systems

Portland State University
2014-2024

Northeastern University
2020-2024

Northwest A&F University
2024

University of Wollongong
2017-2022

Southwest Jiaotong University
2013-2022

Southeast University
2021

Oak Ridge National Laboratory
2021

Xi'an University of Science and Technology
2021

University at Buffalo, State University of New York
2021

Shandong Normal University
2020

Power transformers are the vital and expensive components of power system. Timely identifying diagnosing transformer faults is critical to maintaining stability grid. As a sensitive economical tool, frequency response analysis (FRA) method has been widely employed detect winding faults. However, it still challenge accurately identify fault types degrees only by FRA method. In this article, new diagnosis that combines with kernel-based extreme learning machine (KELM) optimized seagull...

10.1109/access.2024.3385229 article EN cc-by-nc-nd IEEE Access 2024-01-01

Abstract In this paper, an equipment management system based on Bluetooth Angle of Arrival (AoA) technology is proposed, aiming at realizing high-precision localization and real-time monitoring materials in military warehouses. By designing improved antenna switching strategy, optimizing the array layout, introducing e-map e-fence technologies, study dedicated to solving problem insufficient positioning accuracy existing improving practicality value system. addition, corresponding algorithms...

10.1088/1742-6596/2936/1/012011 article EN Journal of Physics Conference Series 2025-01-01

Live video streaming over vehicular ad hoc networks (VANET) is an attractive feature to many applications, such as emergency live transmission, road-side advertisement broadcasting and inter-vehicle conversation. Though vehicles have ample bandwidth, computation storage capacity support data intensive communication, the high mobility may cause persistent network partition. The performance of suffers from delay packet loss incurred by long time disconnection. Although solutions been proposed...

10.1109/vetecf.2007.445 article EN IEEE Vehicular Technology Conference 2007-09-01

Fitness is a measure of human being's healthy status. With more and come out poverty today, people pursue fit lives through various ways such as reasonable nutrition, regular exercise sufficient sleep. improving smart wearables popularly with the prevalence Internet Things phones. There are glasses, wristbands, watches, gloves, clothes, hats shoes, etc. Typically, these form personal area network (PAN) based on Bluetooth around phone. In this survey, we studied underlying technologies for...

10.1109/dasc-picom-datacom-cyberscitec.2017.64 article EN 2017-11-01

Device drivers are a principal source of failures in computer systems. Therefore, improving driver reliability greatly improves overall system reliability. However, development largely has to wait until first stable version the device becomes available. This dependency often leaves not enough time for validation. Recently, virtual machines and devices have found their way into early Virtual enable even before real become available bring complete observability trace ability that evade...

10.1109/qsic.2013.44 article EN 2013-07-01

Robustness testing is a crucial stage in the device driver development cycle. To accelerate robustness testing, effective fault scenarios need to be generated and injected without requiring much time human effort. In this paper, we present practical approach automatic runtime generation injection of for testing. We identify target functions that can fail from execution traces, generate on these using bounded trace-based iterative strategy, inject at test permutation-based mechanism. have...

10.1145/2771783.2771811 article EN 2015-07-10

Although concolic testing is increasingly being explored as a viable software verification technique, its adoption in mainstream development and the industry not yet extensive. In this paper, we discuss challenges to widespread of an industrial setting highlight further opportunities where can find renewed applicability.

10.1109/naecon.2015.7443099 article EN 2015-06-01

Spatiotemporal predictive learning methods generally fall into two categories: recurrent-based approaches, which face challenges in parallelization and performance, recurrent-free methods, employ convolutional neural networks (CNNs) as encoder-decoder architectures. These benefit from strong inductive biases but often at the expense of scalability generalization. This paper proposes PredFormer, a pure transformer-based framework for spatiotemporal learning. Motivated by Vision Transformers...

10.48550/arxiv.2410.04733 preprint EN arXiv (Cornell University) 2024-10-06

The paper presents an approach to model checking software system designs specified in xUML (http://www.kc.com/html/xuml.html), executable subset of UML. This is enabled by the execution semantics and based on automatic translation from S/R, input language COSPAN checker (R.H. Hardin et al., 1996). Model transformations are applied reduce state space resulting S/R that be verified COSPAN. An level logic for specifying properties checked defined. Automated support provided translating...

10.1109/ase.2001.989823 article EN 2005-08-25

Behavioral synthesis is the compilation of an Electronic system-level (ESL) design into RTL implementation. We present a suite optimizations for equivalence checking generated through behavioral synthesis. The exploit high-level structure ESL description to ameliorate verification complexity. Experiments on representative benchmarks indicate that can handle synthesized designs with tens thousands lines RTL.

10.5555/1870926.1871290 article EN Design, Automation, and Test in Europe 2010-03-08

This paper presents an approach to integration of model checking into component-based development software systems. assists in highly reliable systems and reduces the complexity verifying these by utilizing their compositional structures. Temporal properties a component are specified, verified, packaged with component. Selection for reuse considers not only its functionality but also temporal properties. When is composed from other components, property verified on abstraction The constructed...

10.1145/940071.940109 article EN 2003-09-01

This paper formulates and illustrates the integration of resource safety verification into a design methodology for development verified robust real-time embedded systems. Resource-related concerns are not closely linked with current xUML model-based software although they critical We describe how to integrate analysis techniques early phase an xUML-based cycle. Our hybrid framework combines static runtime monitoring. A case study based on controller satellite simulation, TableSat, benefits...

10.1109/rtas.2008.28 article EN 2008-04-01

Loop pipelining is a critical transformation in behavioral synthesis. It crucial to producing hardware designs with acceptable latency and throughput. However, it complex involving aggressive scheduling strategies for high throughput careful control generation eliminate hazards. We present an equivalence checking approach certifying synthesized the presence of transformations. Our works by (1) constructing provably correct pipeline reference model from sequential specification, (2) applying...

10.1145/2228360.2228423 article EN 2012-05-31

Post-silicon validation is a crucial stage in the system development cycle. To accelerate post-silicon validation, high-quality tests should be ready before first silicon prototype becomes available. In this paper, we present concolic testing approach to generation of with virtual prototypes. We identify device states under test from concrete executions based on concept transaction, symbolically execute these generate tests, and issue generated concretely device. have applied prototypes...

10.5555/2561828.2561891 article EN International Conference on Computer Aided Design 2013-11-18
Coming Soon ...