Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wu Weimin is active.

Publication


Featured researches published by Wu Weimin.


conference on industrial electronics and applications | 2008

Improvable Deflate Algorithm

Wu Weimin; Guo Huijiang; Hu Yi; Fan Jingbao; Wang Huan

The Improvable Deflate Algorithm proposed in this paper has a certain improvement based on the previous Deflate Algorithm. In our algorithm, the first step is to implement LZ77 algorithm, the second step is the dynamic or static Huffman encoding. As LZ77 is to operate the bit of the data and change the original character of the byte, we replace the dynamic or static Huffman encoding with active Markov Chain. Dynamic Markov Chain is united by 2 bits of the binary system whose input can only be 01, 01, 10 or 11, which can simplifies and lowers the risk of memory overflow in the status space due to tThe Improvable Deflate Algorithm proposed in this paper has a certain improvement based on the previous Deflate Algorithm. In our algorithm, the first step is to implement LZ77 algorithm, the second step is the dynamic or static Huffman encoding. As LZ77 is to operate the bit of the data and change the original character of the byte, we replace the dynamic or static Huffman encoding with active Markov Chain. Dynamic Markov Chain is united by 2 bits of the binary system whose input can only be 01, 01, 10 or 11, which can simplifies and lowers the risk of memory overflow in the status space due to the rapid increase of the data.he rapid increase of the data.


international conference on computer science and education | 2012

Technique of source code obfuscation based on data flow and control flow tansformations

Su Qing; Wang Zhiyue; Wu Weimin; Li Jing-liang; Huang Zhiwei

This paper mainly present a solution to cross platform problem about the obfuscation in C/C++ source code, and describe the principle and performance of source code obfuscation algorithm, such as layout obfuscation, data flow obfuscation and control structure flow obfuscation. And it analysiss the obfuscation algorithms performance of the strength, flexibility, and cost by experimentation. Finally, it discusses the prospect of the research and application of the source code obfuscation technology.


advanced parallel programming technologies | 2007

Array modeling in Java virtual machine

Wu Weimin; Li Kailun; Su Qing

Array is an important feature in Java and Java Virtual Machine. In spite of its importance, it has not been modeled by any existing Java Virtual Machine Models. In this paper, we define an extending model which uses an existing model as a basis and give the hierarchy of these two models, to model the array. In the extending model, we model the array in three steps. The first step is adding array related instructions in a formal way. The second step is refining the type compatibility to include array types. The last step is implementing array loading process also in a formal way. In the last part of thesis, we give the future work of extending other important features in Java and Java Virtual Machine.


Computer Engineering | 2012

Vulnerability Exploitation Technology of Structured Exception Handling Based on Windows

Wu Weimin; Guo Chaowei; Huang Zhiwei; Su Qing; Chen Qiuwei


Archive | 2017

Cyberspace situation awareness method and device based on sine cosine algorithm (SCA)

Li Zexiong; Wu Weimin; Wu Wangyang; Li Zefeng


Archive | 2017

Lightweight RFID (Radio Frequency Identification) ownership transferring method and system based on chaotic encryption

Zhang Jingjing; Wu Weimin; Su Qing


Archive | 2017

Method and device for classifying network traffic on basis of grey wolf algorithms

Li Zexiong; Wu Weimin; Wu Wangyang; Li Zefeng


Archive | 2017

Prediction method of network traffic and device thereof

Li Zexiong; Wu Weimin; Wu Wangyang; Li Zefeng


Archive | 2017

Similarity measurement method for data structure job program

Wu Wangyang; Wu Weimin; Lin Zhiyi; Li Zexiong; Fang Dianyu


Archive | 2017

Code executing method and device with visualized process

Wu Weimin; Huang Jianfeng; Su Qing; Liu Tiantian; Li Xiaomei

Collaboration


Dive into the Wu Weimin's collaboration.

Top Co-Authors

Avatar

Su Qing

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Huang Zhiwei

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Zhiyue

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Chen Qiuwei

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Fan Jingbao

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Guo Huijiang

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Hu Yi

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Huang Jianwei

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Li Jing-liang

Guangdong University of Technology

View shared research outputs
Top Co-Authors

Avatar

Li Kailun

People's Bank of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge