Wuu Yang

According to our database1, Wuu Yang authored at least 46 papers between 1989 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Translating AArch64 Floating-Point Instruction Set to the x86-64 Platform.
Proceedings of the 48th International Conference on Parallel Processing, 2019

Order Analysis for Translating NESL Programs into Efficient GPU Code.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

On Static Binary Translation of ARM/Thumb Mixed ISA Binaries.
ACM Trans. Embedded Comput. Syst., 2017

Translating the ARM Neon and VFP instructions in a binary translator.
Softw., Pract. Exper., 2016

Partial Flattening: A Compilation Technique for Irregular Nested Parallelism on GPGPUs.
Proceedings of the 45th International Conference on Parallel Processing, 2016

A Brouwerian Model of the Run-Time Memory.
J. Inf. Sci. Eng., 2015

Automatic validation for binary translation.
Computer Languages, Systems & Structures, 2015

A Retargetable Static Binary Translator for the ARM Architecture.
TACO, 2014

On the and-or-scheduling problems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Effective code discovery for ARM/Thumb mixed ISA binaries in a static binary translator.
Proceedings of the International Conference on Compilers, 2013

An LLVM-based hybrid binary translation system.
Proceedings of the 7th IEEE International Symposium on Industrial Embedded Systems, 2012

LLBT: an LLVM-based static binary translator.
Proceedings of the 15th International Conference on Compilers, 2012

A robust user authentication scheme with self-certificates for wireless sensor networks.
Security and Communication Networks, 2011

A Fast General Parser for Automatic Code Generation.
Proceedings of the Methods and Tools of Parallel Programming Multicomputers, 2010

Heap Garbage Collection with Reference Counting.
Proceedings of the ICSOFT 2010, 2010

DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity.
Proceedings of IEEE International Conference on Communications, 2009

A bilateral remote user authentication scheme that preserves user anonymity.
Security and Communication Networks, 2008

SCPS: A self-configuring power-saving protocol for wireless ad hoc networks.
Computer Networks, 2008

A multiple power-level approach for wireless sensor network positioning.
Computer Networks, 2008

Broadcasting with the Least Energy is an NP-Complete Problem.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Efficiency and Reliability in Cluster Based Peer-to-Peer Systems.
J. Inf. Sci. Eng., 2006

RICA: a ring-based information collection architecture in wireless sensor networks.
IJSNet, 2006

On Preventing Type Flaw Attacks on Security Protocols With a Simplified Tagging Scheme.
J. Inf. Sci. Eng., 2005

Uncovering Attacks on Security Protocols.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Efficient Message Flooding on DHT Network.
Proceedings of the High Performance Computing and Communications, 2005

Traps in Java.
Journal of Systems and Software, 2004

Advanced obfuscation techniques for Java bytecode.
Journal of Systems and Software, 2004

Preventing type flaw attacks on security protocols with a simplified tagging scheme.
Proceedings of the Intenational Symposium on Information and Communication Technologies, 2004

A Classification of Noncircular Attribute Grammars Based on the Look-Ahead Behavior.
IEEE Trans. Software Eng., 2002

Why is 1 + 1 = 2 ?
J. Inf. Sci. Eng., 2002

On the applicability of the longest-match rule in lexical analysis.
Comput. Lang., 2002

An attribute-grammar framework for specifying the accessibility in Java programs.
Comput. Lang., 2002

A Lattice Framework for Analyzing Context-Free Languages with Applications in Parser Simplification and Data-Flow Analysis.
J. Inf. Sci. Eng., 1999

A finest partitioning algorithm for attribute grammars.
Comput. Lang., 1999

A Data-Parallel Algorithm for Minimum-Width Tree Layout.
Inf. Process. Lett., 1998

Conditional Evaluation in Simple Multi-Visit Attribute-Grammar Evaluators.
Proceedings of the 4th Asia-Pacific Software Engineering and International Computer Science Conference (APSEC '97 / ICSC '97), 1997

Multi-Plan Attribute Grammars.
Proceedings of the 4th Asia-Pacific Software Engineering and International Computer Science Conference (APSEC '97 / ICSC '97), 1997

Mealy Machines are a Better Model of Lexical Analyzers.
Comput. Lang., 1996

On the Look-Ahead Problem in Lexical Analysis.
Acta Inf., 1995

How to merge program texts.
Journal of Systems and Software, 1994

An Incremental LL(1) Parsing Algorithm.
Inf. Process. Lett., 1993

Identifying Syntactic differences Between Two Programs.
Softw., Pract. Exper., 1991

A program integration algorithm that accommodates semantics-preserving transformations.
Proceedings of the SIGSOFT'90 4th Symposium on Software Development Environments, 1990

The Semantics of Program Slicing and Program Integration.
Proceedings of the TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1989