2008 |
30 | EE | Wuu Yang,
Huei-Ru Tseng,
Rong-Hong Jan,
Bor-Yeh Shen:
Broadcasting with the Least Energy is an NP-Complete Problem.
MUE 2008: 197-200 |
29 | EE | Jen-Yu Fang,
Hung-Chi Chu,
Rong-Hong Jan,
Wuu Yang:
A multiple power-level approach for wireless sensor network positioning.
Computer Networks 52(16): 3101-3118 (2008) |
28 | EE | Shih-Chang Huang,
Rong-Hong Jan,
Wuu Yang:
SCPS: A self-configuring power-saving protocol for wireless ad hoc networks.
Computer Networks 52(6): 1328-1342 (2008) |
27 | EE | Huei-Ru Tseng,
Rong-Hong Jan,
Wuu Yang:
A bilateral remote user authentication scheme that preserves user anonymity.
Security and Communication Networks 1(4): 301-308 (2008) |
2007 |
26 | EE | Huei-Ru Tseng,
Rong-Hong Jan,
Wuu Yang:
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks.
GLOBECOM 2007: 986-990 |
2006 |
25 | EE | Shih-Chang Huang,
Rong-Hong Jan,
Wuu Yang:
RICA: a ring-based information collection architecture in wireless sensor networks.
IJSNet 1(3/4): 190-199 (2006) |
24 | EE | Ching-Wei Huang,
Wuu Yang:
Efficiency and Reliability in Cluster Based Peer-to-Peer Systems.
J. Inf. Sci. Eng. 22(5): 1177-1203 (2006) |
2005 |
23 | EE | Ching-Wei Huang,
Wuu Yang:
Efficient Message Flooding on DHT Network.
HPCC 2005: 440-454 |
22 | EE | Wuu Yang:
Uncovering Attacks on Security Protocols.
ICITA (2) 2005: 572-575 |
21 | EE | Yafen Li,
Wuu Yang,
Ching-Wei Huang:
On Preventing Type Flaw Attacks on Security Protocols With a Simplified Tagging Scheme.
J. Inf. Sci. Eng. 21(1): 59-84 (2005) |
2004 |
20 | EE | Yafen Li,
Wuu Yang,
Ching-Wei Huang:
Preventing type flaw attacks on security protocols with a simplified tagging scheme.
ISICT 2004: 244-249 |
19 | EE | Jien-Tsai Chan,
Wuu Yang:
Advanced obfuscation techniques for Java bytecode.
Journal of Systems and Software 71(1-2): 1-10 (2004) |
18 | EE | Jien-Tsai Chan,
Wuu Yang,
Jing-Wei Huang:
Traps in Java.
Journal of Systems and Software 72(1): 33-47 (2004) |
2002 |
17 | | Jien-Tsai Chan,
Wuu Yang:
An attribute-grammar framework for specifying the accessibility in Java programs.
Comput. Lang. 28(2): 203-235 (2002) |
16 | | Wuu Yang,
Chey-Woei Tsay,
Jien-Tsai Chan:
On the applicability of the longest-match rule in lexical analysis.
Comput. Lang. 28(3): 273-288 (2002) |
15 | EE | Wuu Yang:
A Classification of Noncircular Attribute Grammars Based on the Look-Ahead Behavior.
IEEE Trans. Software Eng. 28(3): 210-227 (2002) |
14 | EE | Wuu Yang:
Why is 1 + 1 = 2 ?
J. Inf. Sci. Eng. 18(3): 281-310 (2002) |
13 | EE | Wuu Yang:
Why is 1 + 1 = 2 ?
J. Inf. Sci. Eng. 18(3): 281-310 (2002) |
1999 |
12 | | Wuu Yang:
A finest partitioning algorithm for attribute grammars.
Comput. Lang. 25(3): 145-164 (1999) |
11 | EE | Wuu Yang:
A Lattice Framework for Analyzing Context-Free Languages with Applications in Parser Simplification and Data-Flow Analysis.
J. Inf. Sci. Eng. 15(2): 287-306 (1999) |
1998 |
10 | EE | Wuu Yang:
A Data-Parallel Algorithm for Minimum-Width Tree Layout.
Inf. Process. Lett. 67(1): 21-28 (1998) |
1997 |
9 | EE | Wuu Yang:
Conditional Evaluation in Simple Multi-Visit Attribute-Grammar Evaluators.
APSEC 1997: 455- |
8 | EE | Wuu Yang:
Multi-Plan Attribute Grammars.
APSEC 1997: 62-71 |
1996 |
7 | | Wuu Yang:
Mealy Machines are a Better Model of Lexical Analyzers.
Comput. Lang. 22(1): 27-38 (1996) |
1995 |
6 | | Wuu Yang:
On the Look-Ahead Problem in Lexical Analysis
Acta Inf. 32(5): 459-476 (1995) |
1994 |
5 | EE | Wuu Yang:
How to merge program texts.
Journal of Systems and Software 27(2): 129-135 (1994) |
1993 |
4 | | Wuu Yang:
An Incremental LL(1) Parsing Algorithm.
Inf. Process. Lett. 48(2): 67-72 (1993) |
1992 |
3 | EE | Wuu Yang,
Susan Horwitz,
Thomas W. Reps:
A Program Integration Algorithm that Accommodates Semantics-Preserving Transformations.
ACM Trans. Softw. Eng. Methodol. 1(3): 310-354 (1992) |
1991 |
2 | | Wuu Yang:
Identifying Syntactic differences Between Two Programs.
Softw., Pract. Exper. 21(7): 739-755 (1991) |
1989 |
1 | | Thomas W. Reps,
Wuu Yang:
The Semantics of Program Slicing and Program Integration.
TAPSOFT, Vol.2 1989: 360-374 |