The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fang Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fang Yu, Bow-Yaw Wang
    Toward Unbounded Model Checking for Region Automata. [Citation Graph (0, 0)][DBLP]
    ATVA, 2004, pp:20-33 [Conf]
  2. Fang Yu, Chung-Hung Tsai, Yao-Wen Huang, D. T. Lee, Hung-Yau Lin, Sy-Yen Kuo
    Efficient Exact Spare Allocation via Boolean Satisfiability. [Citation Graph (0, 0)][DBLP]
    DFT, 2005, pp:361-370 [Conf]
  3. Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
    Verifying Web Applications Using Bounded Model Checking. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:199-208 [Conf]
  4. Fang Yu, Bow-Yaw Wang, Yao-Wen Huang
    Bounded Model Checking for Region Automata. [Citation Graph (0, 0)][DBLP]
    FORMATS/FTRTFT, 2004, pp:246-262 [Conf]
  5. Farn Wang, Geng-Dian Hwang, Fang Yu
    Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    FORTE, 2003, pp:160-176 [Conf]
  6. Xuyao Luo, Fang Yu, Jun Zhang
    Study of Parametric Relation in Ant Colony Optimization Approach to Traveling Salesman Problem. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:22-32 [Conf]
  7. Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker
    GHT: a geographic hash table for data-centric storage. [Citation Graph (0, 0)][DBLP]
    WSNA, 2002, pp:78-87 [Conf]
  8. Fang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang
    Network-Adaptive Cache Management Schemes for Mixed Media. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:685-692 [Conf]
  9. Farn Wang, Geng-Dian Huang, Fang Yu
    Symbolic Simulation of Real-Time Concurrent Systems. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2003, pp:595-617 [Conf]
  10. Farn Wang, Fang Yu
    OVL Assertion-Checking of Embedded Software with Dense-Time Semantics. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2003, pp:254-278 [Conf]
  11. Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan S. Turner
    Algorithms to accelerate multiple regular expressions matching for deep packet inspection. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:339-350 [Conf]
  12. Oscar H. Ibarra, Sara Woodworth, Fang Yu, Andrei Paun
    On Spiking Neural P Systems and Partially Blind Counter Machines. [Citation Graph (0, 0)][DBLP]
    UC, 2006, pp:113-129 [Conf]
  13. Shuigeng Zhou, Ye Fan, Jiangtao Hu, Fang Yu, Yunfa Hu
    Hierachically Classifying Chinese Web Documents without Dictionary Support and Segmentation Procedure. [Citation Graph (0, 0)][DBLP]
    Web-Age Information Management, 2000, pp:215-226 [Conf]
  14. Fang Yu, Wen Jin
    An Effective Approach to Mining Exeption Class Association Rules. [Citation Graph (0, 0)][DBLP]
    Web-Age Information Management, 2000, pp:145-150 [Conf]
  15. Farn Wang, Geng-Dian Hwang, Fang Yu
    TCTL Inevitability Analysis of Dense-Time Systems. [Citation Graph (0, 0)][DBLP]
    CIAA, 2003, pp:176-187 [Conf]
  16. Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo
    Securing web application code by static analysis and runtime protection. [Citation Graph (0, 0)][DBLP]
    WWW, 2004, pp:40-52 [Conf]
  17. Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, Randy H. Katz
    Fast and memory-efficient regular expression matching for deep packet inspection. [Citation Graph (0, 0)][DBLP]
    ANCS, 2006, pp:93-102 [Conf]
  18. Fang Yu, T. V. Lakshman, Martin Austin Motoyama, Randy H. Katz
    SSA: a power and memory efficient scheme to multi-match packet classification. [Citation Graph (0, 0)][DBLP]
    ANCS, 2005, pp:105-113 [Conf]
  19. Farn Wang, Geng-Dian Hwang, Fang Yu
    TCTL Inevitability Analysis of Dense-time Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  20. Farn Wang, Geng-Dian Hwang, Fang Yu
    Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  21. Fang Yu, Bow-Yaw Wang
    Sat-based Model Checking for Region Automata. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:4, pp:775-796 [Journal]
  22. Fang Yu, Randy H. Katz, T. V. Lakshman
    Efficient Multimatch Packet Classification and Lookup with TCAM. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2005, v:25, n:1, pp:50-59 [Journal]
  23. Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu
    Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:4, pp:427-442 [Journal]
  24. Fang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang
    QoS-adaptive proxy caching for multimedia streaming over the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:3, pp:257-269 [Journal]
  25. Farn Wang, Karsten Schmidt, Fang Yu, Geng-Dian Huang, Bow-Yaw Wang
    BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:6, pp:403-417 [Journal]
  26. Farn Wang, Geng-Dian Huang, Fang Yu
    TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2006, v:32, n:7, pp:510-526 [Journal]
  27. Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber
    How dynamic are IP addresses? [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:301-312 [Conf]
  28. Fang Yu, Tevfik Bultan, Erik Peterson
    Automated size analysis for OCL. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:331-340 [Conf]
  29. Dongling Chen, Daling Wang, Ge Yu, Fang Yu
    A PLSA-Based Approach for Building User Profile and Implementing Personalized Recommendation. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM, 2007, pp:606-613 [Conf]

  30. A practical reconfigurable hardware accelerator for Boolean satisfiability solvers. [Citation Graph (, )][DBLP]


  31. An Algorithm Evaluating System Stability to Process. [Citation Graph (, )][DBLP]


  32. Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. [Citation Graph (, )][DBLP]


  33. The effectiveness of intelligent scheduling for multicast video-on-demand. [Citation Graph (, )][DBLP]


  34. BotGraph: Large Scale Spamming Botnet Detection. [Citation Graph (, )][DBLP]


  35. Designing an Efficient Hardware Implication Accelerator for SAT Solving. [Citation Graph (, )][DBLP]


  36. De-anonymizing the internet using unreliable IDs. [Citation Graph (, )][DBLP]


  37. Spamming botnets: signatures and characteristics. [Citation Graph (, )][DBLP]


  38. Modular verification of web services using efficient symbolic encoding and summarization. [Citation Graph (, )][DBLP]


  39. Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. [Citation Graph (, )][DBLP]


  40. Symbolic String Verification: An Automata-Based Approach. [Citation Graph (, )][DBLP]


  41. Symbolic String Verification: Combining String Analysis and Size Analysis. [Citation Graph (, )][DBLP]


  42. Stranger: An Automata-Based String Analysis Tool for PHP. [Citation Graph (, )][DBLP]


  43. Target Localization for Autonomous Soccer Robot Based on Vision Perception. [Citation Graph (, )][DBLP]


  44. SBotMiner: large scale search bot detection. [Citation Graph (, )][DBLP]


  45. Knowledge-Based Major Choosing Decision Making for Remote Students. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002