dblp.uni-trier.dewww.uni-trier.de

Fang Yu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
40EEFang Yu, Tevfik Bultan, Oscar H. Ibarra: Symbolic String Verification: Combining String Analysis and Size Analysis. TACAS 2009: 322-336
2008
39EEQing Zhou, Fang Yu: Knowledge-Based Major Choosing Decision Making for Remote Students. CSSE (5) 2008: 474-478
38EEJohn D. Davis, Zhangxi Tan, Fang Yu, Lintao Zhang: A practical reconfigurable hardware accelerator for Boolean satisfiability solvers. DAC 2008: 780-785
37EEGuifang Shao, Yuhua Wen, Fang Yu, Zushu Li: Target Localization for Autonomous Soccer Robot Based on Vision Perception. ISICA 2008: 831-840
36EEJohn D. Davis, Zhangxi Tan, Fang Yu, Lintao Zhang: Designing an Efficient Hardware Implication Accelerator for SAT Solving. SAT 2008: 48-62
35EEYinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov: Spamming botnets: signatures and characteristics. SIGCOMM 2008: 171-182
34EEFang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan: Modular verification of web services using efficient symbolic encoding and summarization. SIGSOFT FSE 2008: 192-202
33EEFang Yu, Tevfik Bultan, Marco Cova, Oscar H. Ibarra: Symbolic String Verification: An Automata-Based Approach. SPIN 2008: 306-324
32EEOscar H. Ibarra, Sara Woodworth, Fang Yu, Andrei Paun: On spiking neural P systems and partially blind counter machines. Natural Computing 7(1): 3-19 (2008)
2007
31EEDongling Chen, Daling Wang, Ge Yu, Fang Yu: A PLSA-Based Approach for Building User Profile and Implementing Personalized Recommendation. APWeb/WAIM 2007: 606-613
30EEFang Yu, Tevfik Bultan, Erik Peterson: Automated size analysis for OCL. ESEC/SIGSOFT FSE 2007: 331-340
29EEYinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber: How dynamic are IP addresses? SIGCOMM 2007: 301-312
2006
28EEFang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, Randy H. Katz: Fast and memory-efficient regular expression matching for deep packet inspection. ANCS 2006: 93-102
27EEXuyao Luo, Fang Yu, Jun Zhang: Study of Parametric Relation in Ant Colony Optimization Approach to Traveling Salesman Problem. ICIC (3) 2006: 22-32
26EESailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan S. Turner: Algorithms to accelerate multiple regular expressions matching for deep packet inspection. SIGCOMM 2006: 339-350
25EEOscar H. Ibarra, Sara Woodworth, Fang Yu, Andrei Paun: On Spiking Neural P Systems and Partially Blind Counter Machines. UC 2006: 113-129
24EEFang Yu, T. V. Lakshman, Martin Austin Motoyama, Randy H. Katz: Efficient Multimatch Packet Classification for Network Security Applications. IEEE Journal on Selected Areas in Communications 24(10): 1805-1816 (2006)
23EEFarn Wang, Geng-Dian Huang, Fang Yu: TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering. IEEE Trans. Software Eng. 32(7): 510-526 (2006)
22EEFang Yu, Bow-Yaw Wang: Sat-based Model Checking for Region Automata. Int. J. Found. Comput. Sci. 17(4): 775-796 (2006)
2005
21EEFang Yu, T. V. Lakshman, Martin Austin Motoyama, Randy H. Katz: SSA: a power and memory efficient scheme to multi-match packet classification. ANCS 2005: 105-113
20EEFang Yu, Chung-Hung Tsai, Yao-Wen Huang, D. T. Lee, Hung-Yau Lin, Sy-Yen Kuo: Efficient Exact Spare Allocation via Boolean Satisfiability. DFT 2005: 361-370
19EEFang Yu, Randy H. Katz, T. V. Lakshman: Efficient Multimatch Packet Classification and Lookup with TCAM. IEEE Micro 25(1): 50-59 (2005)
18EEFarn Wang, Geng-Dian Huang, Fang Yu: Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol. J. Embedded Computing 1(1): 39-56 (2005)
2004
17EEFang Yu, Bow-Yaw Wang: Toward Unbounded Model Checking for Region Automata. ATVA 2004: 20-33
16EEYao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo: Verifying Web Applications Using Bounded Model Checking. DSN 2004: 199-208
15EEFang Yu, Bow-Yaw Wang, Yao-Wen Huang: Bounded Model Checking for Region Automata. FORMATS/FTRTFT 2004: 246-262
14EEYao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo: Securing web application code by static analysis and runtime protection. WWW 2004: 40-52
13EEFarn Wang, Karsten Schmidt, Fang Yu, Geng-Dian Huang, Bow-Yaw Wang: BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction. IEEE Trans. Software Eng. 30(6): 403-417 (2004)
2003
12EEFarn Wang, Geng-Dian Hwang, Fang Yu: TCTL Inevitability Analysis of Dense-Time Systems. CIAA 2003: 176-187
11EEFarn Wang, Geng-Dian Hwang, Fang Yu: Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems. FORTE 2003: 160-176
10EEFarn Wang, Fang Yu: OVL Assertion-Checking of Embedded Software with Dense-Time Semantics. RTCSA 2003: 254-278
9EEFarn Wang, Geng-Dian Huang, Fang Yu: Symbolic Simulation of Real-Time Concurrent Systems. RTCSA 2003: 595-617
8EEFarn Wang, Geng-Dian Hwang, Fang Yu: TCTL Inevitability Analysis of Dense-time Systems CoRR cs.SC/0304003: (2003)
7EEFarn Wang, Geng-Dian Hwang, Fang Yu: Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems CoRR cs.SE/0303027: (2003)
6 Fang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang: QoS-adaptive proxy caching for multimedia streaming over the Internet. IEEE Trans. Circuits Syst. Video Techn. 13(3): 257-269 (2003)
5EESylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu: Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. MONET 8(4): 427-442 (2003)
2002
4EESylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker: GHT: a geographic hash table for data-centric storage. WSNA 2002: 78-87
2001
3EEFang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang: Network-Adaptive Cache Management Schemes for Mixed Media. IEEE Pacific Rim Conference on Multimedia 2001: 685-692
2000
2EEFang Yu, Wen Jin: An Effective Approach to Mining Exeption Class Association Rules. Web-Age Information Management 2000: 145-150
1EEShuigeng Zhou, Ye Fan, Jiangtao Hu, Fang Yu, Yunfa Hu: Hierachically Classifying Chinese Web Documents without Dictionary Support and Segmentation Procedure. Web-Age Information Management 2000: 215-226

Coauthor Index

1Kannan Achan [29] [35]
2Tevfik Bultan [30] [33] [34] [40]
3Dongling Chen [31]
4Zhifeng Chen [28]
5Marco Cova [33]
6Patrick Crowley [26]
7John D. Davis [36] [38]
8Sarang Dharmapurikar [26]
9Yanlei Diao [28]
10Deborah Estrin [4] [5]
11Ye Fan [1]
12Eliot Gillum [29]
13Moisés Goldszmidt [29]
14Ramesh Govindan [4] [5]
15Aarti Gupta [34]
16Christian Hang [14] [16]
17Jiangtao Hu [1]
18Yunfa Hu [1]
19Geng-Dian Huang [9] [13] [18] [23]
20Yao-Wen Huang [14] [15] [16] [20]
21Geoff Hulten [35]
22Geng-Dian Hwang [7] [8] [11] [12]
23Oscar H. Ibarra [25] [32] [33] [40]
24Wen Jin [2]
25Brad Karp [4] [5]
26Randy H. Katz [19] [21] [24] [28]
27Sailesh Kumar [26]
28Sy-Yen Kuo [14] [16] [20]
29T. V. Lakshman [19] [21] [24] [28]
30D. T. Lee [16] [20]
31Der-Tsai Lee [14]
32Zushu Li [37]
33Hung-Yau Lin [20]
34Xuyao Luo [27]
35Martin Austin Motoyama [21] [24]
36Ivan Osipkov [35]
37Rina Panigrahy [35]
38Andrei Paun [25] [32]
39Erik Peterson [30]
40Sylvia Ratnasamy [4] [5]
41Guifang Shao [37]
42Scott Shenker [4] [5]
43Zhangxi Tan [36] [38]
44Chung-Hung Tsai [14] [16] [20]
45Jonathan S. Turner [26]
46Bow-Yaw Wang [13] [15] [17] [22]
47Chao Wang [34]
48Daling Wang [31]
49Farn Wang [7] [8] [9] [10] [11] [12] [13] [18] [23]
50Yuhua Wen [37]
51Ted Wobber [29]
52Karsten Wolf (Karsten Schmidt) [13]
53Sara Woodworth [25] [32]
54Yinglian Xie [29] [35]
55Li Yin [4] [5]
56Ge Yu [31]
57Jun Zhang [27]
58Lintao Zhang [36] [38]
59Qian Zhang [3] [6]
60Ya-Qin Zhang [3] [6]
61Qing Zhou [39]
62Shuigeng Zhou [1]
63Wenwu Zhu [3] [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)