Search the dblp DataBase
Fang Yu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Fang Yu , Bow-Yaw Wang Toward Unbounded Model Checking for Region Automata. [Citation Graph (0, 0)][DBLP ] ATVA, 2004, pp:20-33 [Conf ] Fang Yu , Chung-Hung Tsai , Yao-Wen Huang , D. T. Lee , Hung-Yau Lin , Sy-Yen Kuo Efficient Exact Spare Allocation via Boolean Satisfiability. [Citation Graph (0, 0)][DBLP ] DFT, 2005, pp:361-370 [Conf ] Yao-Wen Huang , Fang Yu , Christian Hang , Chung-Hung Tsai , D. T. Lee , Sy-Yen Kuo Verifying Web Applications Using Bounded Model Checking. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:199-208 [Conf ] Fang Yu , Bow-Yaw Wang , Yao-Wen Huang Bounded Model Checking for Region Automata. [Citation Graph (0, 0)][DBLP ] FORMATS/FTRTFT, 2004, pp:246-262 [Conf ] Farn Wang , Geng-Dian Hwang , Fang Yu Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems. [Citation Graph (0, 0)][DBLP ] FORTE, 2003, pp:160-176 [Conf ] Xuyao Luo , Fang Yu , Jun Zhang Study of Parametric Relation in Ant Colony Optimization Approach to Traveling Salesman Problem. [Citation Graph (0, 0)][DBLP ] ICIC (3), 2006, pp:22-32 [Conf ] Sylvia Ratnasamy , Brad Karp , Li Yin , Fang Yu , Deborah Estrin , Ramesh Govindan , Scott Shenker GHT: a geographic hash table for data-centric storage. [Citation Graph (0, 0)][DBLP ] WSNA, 2002, pp:78-87 [Conf ] Fang Yu , Qian Zhang , Wenwu Zhu , Ya-Qin Zhang Network-Adaptive Cache Management Schemes for Mixed Media. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2001, pp:685-692 [Conf ] Farn Wang , Geng-Dian Huang , Fang Yu Symbolic Simulation of Real-Time Concurrent Systems. [Citation Graph (0, 0)][DBLP ] RTCSA, 2003, pp:595-617 [Conf ] Farn Wang , Fang Yu OVL Assertion-Checking of Embedded Software with Dense-Time Semantics. [Citation Graph (0, 0)][DBLP ] RTCSA, 2003, pp:254-278 [Conf ] Sailesh Kumar , Sarang Dharmapurikar , Fang Yu , Patrick Crowley , Jonathan S. Turner Algorithms to accelerate multiple regular expressions matching for deep packet inspection. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:339-350 [Conf ] Oscar H. Ibarra , Sara Woodworth , Fang Yu , Andrei Paun On Spiking Neural P Systems and Partially Blind Counter Machines. [Citation Graph (0, 0)][DBLP ] UC, 2006, pp:113-129 [Conf ] Shuigeng Zhou , Ye Fan , Jiangtao Hu , Fang Yu , Yunfa Hu Hierachically Classifying Chinese Web Documents without Dictionary Support and Segmentation Procedure. [Citation Graph (0, 0)][DBLP ] Web-Age Information Management, 2000, pp:215-226 [Conf ] Fang Yu , Wen Jin An Effective Approach to Mining Exeption Class Association Rules. [Citation Graph (0, 0)][DBLP ] Web-Age Information Management, 2000, pp:145-150 [Conf ] Farn Wang , Geng-Dian Hwang , Fang Yu TCTL Inevitability Analysis of Dense-Time Systems. [Citation Graph (0, 0)][DBLP ] CIAA, 2003, pp:176-187 [Conf ] Yao-Wen Huang , Fang Yu , Christian Hang , Chung-Hung Tsai , Der-Tsai Lee , Sy-Yen Kuo Securing web application code by static analysis and runtime protection. [Citation Graph (0, 0)][DBLP ] WWW, 2004, pp:40-52 [Conf ] Fang Yu , Zhifeng Chen , Yanlei Diao , T. V. Lakshman , Randy H. Katz Fast and memory-efficient regular expression matching for deep packet inspection. [Citation Graph (0, 0)][DBLP ] ANCS, 2006, pp:93-102 [Conf ] Fang Yu , T. V. Lakshman , Martin Austin Motoyama , Randy H. Katz SSA: a power and memory efficient scheme to multi-match packet classification. [Citation Graph (0, 0)][DBLP ] ANCS, 2005, pp:105-113 [Conf ] Farn Wang , Geng-Dian Hwang , Fang Yu TCTL Inevitability Analysis of Dense-time Systems [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Farn Wang , Geng-Dian Hwang , Fang Yu Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Fang Yu , Bow-Yaw Wang Sat-based Model Checking for Region Automata. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2006, v:17, n:4, pp:775-796 [Journal ] Fang Yu , Randy H. Katz , T. V. Lakshman Efficient Multimatch Packet Classification and Lookup with TCAM. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2005, v:25, n:1, pp:50-59 [Journal ] Sylvia Ratnasamy , Brad Karp , Scott Shenker , Deborah Estrin , Ramesh Govindan , Li Yin , Fang Yu Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. [Citation Graph (0, 0)][DBLP ] MONET, 2003, v:8, n:4, pp:427-442 [Journal ] Fang Yu , Qian Zhang , Wenwu Zhu , Ya-Qin Zhang QoS-adaptive proxy caching for multimedia streaming over the Internet. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:3, pp:257-269 [Journal ] Farn Wang , Karsten Schmidt , Fang Yu , Geng-Dian Huang , Bow-Yaw Wang BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2004, v:30, n:6, pp:403-417 [Journal ] Farn Wang , Geng-Dian Huang , Fang Yu TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2006, v:32, n:7, pp:510-526 [Journal ] Yinglian Xie , Fang Yu , Kannan Achan , Eliot Gillum , Moisés Goldszmidt , Ted Wobber How dynamic are IP addresses? [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:301-312 [Conf ] Fang Yu , Tevfik Bultan , Erik Peterson Automated size analysis for OCL. [Citation Graph (0, 0)][DBLP ] ESEC/SIGSOFT FSE, 2007, pp:331-340 [Conf ] Dongling Chen , Daling Wang , Ge Yu , Fang Yu A PLSA-Based Approach for Building User Profile and Implementing Personalized Recommendation. [Citation Graph (0, 0)][DBLP ] APWeb/WAIM, 2007, pp:606-613 [Conf ] A practical reconfigurable hardware accelerator for Boolean satisfiability solvers. [Citation Graph (, )][DBLP ] An Algorithm Evaluating System Stability to Process. [Citation Graph (, )][DBLP ] Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. [Citation Graph (, )][DBLP ] The effectiveness of intelligent scheduling for multicast video-on-demand. [Citation Graph (, )][DBLP ] BotGraph: Large Scale Spamming Botnet Detection. [Citation Graph (, )][DBLP ] Designing an Efficient Hardware Implication Accelerator for SAT Solving. [Citation Graph (, )][DBLP ] De-anonymizing the internet using unreliable IDs. [Citation Graph (, )][DBLP ] Spamming botnets: signatures and characteristics. [Citation Graph (, )][DBLP ] Modular verification of web services using efficient symbolic encoding and summarization. [Citation Graph (, )][DBLP ] Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. [Citation Graph (, )][DBLP ] Symbolic String Verification: An Automata-Based Approach. [Citation Graph (, )][DBLP ] Symbolic String Verification: Combining String Analysis and Size Analysis. [Citation Graph (, )][DBLP ] Stranger: An Automata-Based String Analysis Tool for PHP. [Citation Graph (, )][DBLP ] Target Localization for Autonomous Soccer Robot Based on Vision Perception. [Citation Graph (, )][DBLP ] SBotMiner: large scale search bot detection. [Citation Graph (, )][DBLP ] Knowledge-Based Major Choosing Decision Making for Remote Students. [Citation Graph (, )][DBLP ] Search in 0.108secs, Finished in 0.110secs