default search action
Wuu Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Arthur Ning-Chih Yang, Shih-Kun Huang, Wuu Yang:
Call-site tree and its application in function inlining. Int. J. Embed. Syst. 17(5): 1-12 (2024) - [c23]Zi-Xuan Chen, Wuu Yang:
Substitution of kernel functions based on pattern matching on schedule trees. ICPP Workshops 2024: 48-57 - 2023
- [c22]Ching-Yi Lin, Wuu Yang:
Enhanced Memory Corruption Detection in C/C++ Programs. ICPP Workshops 2023: 71-78 - 2022
- [j31]Jyun-Siang Huang, Wuu Yang, Yi-Ping You:
Profile-guided optimisation for indirect branches in a binary translator. Connect. Sci. 34(1): 749-765 (2022) - [j30]Jyun-Kai Lai, Wuu Yang:
Hyperchaining for LLVM-Based Binary Translators on the x86-64 Platform. J. Signal Process. Syst. 94(12): 1569-1589 (2022) - 2021
- [c21]Jyun-Kai Lai, Wuu Yang:
Hyperchaining Optimizations for an LLVM-Based Binary Translator on x86-64 and RISC-V Platforms. ICPP Workshops 2021: 13:1-13:9 - [i1]Wuu Yang:
Minimizing LR(1) State Machines is NP-Hard. CoRR abs/2110.00776 (2021) - 2020
- [j29]Ming-Hsiang Huang, Wuu Yang:
PFACC: An OpenACC-like programming model for irregular nested parallelism. Softw. Pract. Exp. 50(10): 1877-1904 (2020)
2010 – 2019
- 2019
- [c20]Yi-Ping You, Tsung-Chun Lin, Wuu Yang:
Translating AArch64 Floating-Point Instruction Set to the x86-64 Platform. ICPP Workshops 2019: 12:1-12:7 - 2018
- [c19]Ming-Yi Yan, Ming-Hsiang Huang, Wuu Yang:
Order Analysis for Translating NESL Programs into Efficient GPU Code. ICS 2018: 330-337 - 2017
- [j28]Jiunn-Yeu Chen, Wuu Yang, Wei-Chung Hsu, Bor-Yeh Shen, Quan-Huei Ou:
On Static Binary Translation of ARM/Thumb Mixed ISA Binaries. ACM Trans. Embed. Comput. Syst. 16(3): 81:1-81:25 (2017) - 2016
- [j27]Yu-Chuan Guo, Wuu Yang, Jiunn-Yeu Chen, Jenq-Kuen Lee:
Translating the ARM Neon and VFP instructions in a binary translator. Softw. Pract. Exp. 46(12): 1591-1615 (2016) - [c18]Ming-Hsiang Huang, Wuu Yang:
Partial Flattening: A Compilation Technique for Irregular Nested Parallelism on GPGPUs. ICPP 2016: 552-561 - 2015
- [j26]Jiunn-Yeu Chen, Wuu Yang, Bor-Yeh Shen, Yuan-Jia Li, Wei-Chung Hsu:
Automatic validation for binary translation. Comput. Lang. Syst. Struct. 43: 96-115 (2015) - [j25]Wuu Yang:
A Brouwerian Model of the Run-Time Memory. J. Inf. Sci. Eng. 31(6): 2103-2124 (2015) - 2014
- [j24]Bor-Yeh Shen, Wei-Chung Hsu, Wuu Yang:
A Retargetable Static Binary Translator for the ARM Architecture. ACM Trans. Archit. Code Optim. 11(2): 18:1-18:25 (2014) - [c17]Wuu Yang, Ming-Hsiang Huang, Jenq-Kuen Lee:
On the and-or-scheduling problems. ICPADS 2014: 969-974 - 2013
- [c16]Jiunn-Yeu Chen, Bor-Yeh Shen, Quan-Huei Ou, Wuu Yang, Wei-Chung Hsu:
Effective code discovery for ARM/Thumb mixed ISA binaries in a static binary translator. CASES 2013: 19:1-19:10 - 2012
- [c15]Bor-Yeh Shen, Jiunn-Yeu Chen, Wei-Chung Hsu, Wuu Yang:
LLBT: an LLVM-based static binary translator. CASES 2012: 51-60 - [c14]Bor-Yeh Shen, Jyun-Yan You, Wuu Yang, Wei-Chung Hsu:
An LLVM-based hybrid binary translation system. SIES 2012: 229-236 - 2011
- [j23]Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan:
DDoS detection and traceback with decision tree and grey relational analysis. Int. J. Ad Hoc Ubiquitous Comput. 7(2): 121-136 (2011) - [j22]Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:
A robust user authentication scheme with self-certificates for wireless sensor networks. Secur. Commun. Networks 4(8): 815-824 (2011) - 2010
- [c13]Wuu Yang, Huei-Ru Tseng, Rong-Hong Jan:
Heap Garbage Collection with Reference Counting. ICSOFT (2) 2010: 267-270 - [c12]Wuu Yang:
A Fast General Parser for Automatic Code Generation. MTPP 2010: 30-39
2000 – 2009
- 2009
- [c11]Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity. ICC 2009: 1-6 - [c10]Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan:
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis. MUE 2009: 306-314 - 2008
- [j21]Shih-Chang Huang, Rong-Hong Jan, Wuu Yang:
SCPS: A self-configuring power-saving protocol for wireless ad hoc networks. Comput. Networks 52(6): 1328-1342 (2008) - [j20]Jen-Yu Fang, Hung-Chi Chu, Rong-Hong Jan, Wuu Yang:
A multiple power-level approach for wireless sensor network positioning. Comput. Networks 52(16): 3101-3118 (2008) - [j19]Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:
A bilateral remote user authentication scheme that preserves user anonymity. Secur. Commun. Networks 1(4): 301-308 (2008) - [c9]Wuu Yang, Huei-Ru Tseng, Rong-Hong Jan, Bor-Yeh Shen:
Broadcasting with the Least Energy is an NP-Complete Problem. MUE 2008: 197-200 - 2007
- [c8]Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. GLOBECOM 2007: 986-990 - 2006
- [j18]Shih-Chang Huang, Rong-Hong Jan, Wuu Yang:
RICA: a ring-based information collection architecture in wireless sensor networks. Int. J. Sens. Networks 1(3/4): 190-199 (2006) - [j17]Ching-Wei Huang, Wuu Yang:
Efficiency and Reliability in Cluster Based Peer-to-Peer Systems. J. Inf. Sci. Eng. 22(5): 1177-1203 (2006) - 2005
- [j16]Yafen Li, Wuu Yang, Ching-Wei Huang:
On Preventing Type Flaw Attacks on Security Protocols With a Simplified Tagging Scheme. J. Inf. Sci. Eng. 21(1): 59-84 (2005) - [c7]Ching-Wei Huang, Wuu Yang:
Efficient Message Flooding on DHT Network. HPCC 2005: 440-454 - [c6]Wuu Yang:
Uncovering Attacks on Security Protocols. ICITA (2) 2005: 572-575 - 2004
- [j15]Jien-Tsai Chan, Wuu Yang:
Advanced obfuscation techniques for Java bytecode. J. Syst. Softw. 71(1-2): 1-10 (2004) - [j14]Jien-Tsai Chan, Wuu Yang, Jing-Wei Huang:
Traps in Java. J. Syst. Softw. 72(1): 33-47 (2004) - [c5]Yafen Li, Wuu Yang, Ching-Wei Huang:
Preventing type flaw attacks on security protocols with a simplified tagging scheme. ISICT 2004: 244-249 - 2002
- [j13]Jien-Tsai Chan, Wuu Yang:
An attribute-grammar framework for specifying the accessibility in Java programs. Comput. Lang. Syst. Struct. 28(2): 203-235 (2002) - [j12]Wuu Yang, Chey-Woei Tsay, Jien-Tsai Chan:
On the applicability of the longest-match rule in lexical analysis. Comput. Lang. Syst. Struct. 28(3): 273-288 (2002) - [j11]Wuu Yang:
Why is 1 + 1 = 2 ? J. Inf. Sci. Eng. 18(3): 281-310 (2002) - [j10]Wuu Yang:
A Classification of Noncircular Attribute Grammars Based on the Look-Ahead Behavior. IEEE Trans. Software Eng. 28(3): 210-227 (2002)
1990 – 1999
- 1999
- [j9]Wuu Yang:
A finest partitioning algorithm for attribute grammars. Comput. Lang. 25(3): 145-164 (1999) - [j8]Wuu Yang:
A Lattice Framework for Analyzing Context-Free Languages with Applications in Parser Simplification and Data-Flow Analysis. J. Inf. Sci. Eng. 15(2): 287-306 (1999) - 1998
- [j7]Wuu Yang:
A Data-Parallel Algorithm for Minimum-Width Tree Layout. Inf. Process. Lett. 67(1): 21-28 (1998) - 1997
- [c4]Wuu Yang:
Multi-Plan Attribute Grammars. APSEC 1997: 62-71 - [c3]Wuu Yang:
Conditional Evaluation in Simple Multi-Visit Attribute-Grammar Evaluators. APSEC 1997: 455- - 1996
- [j6]Wuu Yang:
Mealy Machines are a Better Model of Lexical Analyzers. Comput. Lang. 22(1): 27-38 (1996) - 1995
- [j5]Wuu Yang:
On the Look-Ahead Problem in Lexical Analysis. Acta Informatica 32(5): 459-476 (1995) - 1994
- [j4]Wuu Yang:
How to merge program texts. J. Syst. Softw. 27(2): 129-135 (1994) - 1993
- [j3]Wuu Yang:
An Incremental LL(1) Parsing Algorithm. Inf. Process. Lett. 48(2): 67-72 (1993) - 1992
- [j2]Wuu Yang, Susan Horwitz, Thomas W. Reps:
A Program Integration Algorithm that Accommodates Semantics-Preserving Transformations. ACM Trans. Softw. Eng. Methodol. 1(3): 310-354 (1992) - 1991
- [j1]Wuu Yang:
Identifying Syntactic differences Between Two Programs. Softw. Pract. Exp. 21(7): 739-755 (1991) - 1990
- [c2]Wuu Yang, Susan Horwitz, Thomas W. Reps:
A program integration algorithm that accommodates semantics-preserving transformations. SDE 1990: 133-143
1980 – 1989
- 1989
- [c1]Thomas W. Reps, Wuu Yang:
The Semantics of Program Slicing and Program Integration. TAPSOFT, Vol.2 1989: 360-374
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint