The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhijie Shi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ruby B. Lee, Xiao Yang, Zhijie Shi
    Validating Word-Oriented Processors for Bit and Multi-word Operations. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2004, pp:473-488 [Conf]
  2. Ruby B. Lee, A. Murat Fiskiran, Zhijie Shi, Xiao Yang
    Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. [Citation Graph (0, 0)][DBLP]
    ASAP, 2002, pp:253-264 [Conf]
  3. Zhijie Shi, Ruby B. Lee
    Bit Permutation Instructions for Accelerating Software Cryptography. [Citation Graph (0, 0)][DBLP]
    ASAP, 2000, pp:138-148 [Conf]
  4. Zhijie Shi, Xiao Yang, Ruby B. Lee
    Arbitrary Bit Permutations in One or Two Cycles. [Citation Graph (0, 0)][DBLP]
    ASAP, 2003, pp:237-0 [Conf]
  5. Zhijie Shi, Ruby B. Lee
    Subword Sorting with Versatile Permutation Instructions. [Citation Graph (0, 0)][DBLP]
    ICCD, 2002, pp:234-241 [Conf]
  6. Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw
    On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:569-577 [Conf]
  7. Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi
    Enlisting Hardware Architecture to Thwart Malicious Code Injection. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:237-252 [Conf]
  8. Ruby B. Lee, Xiao Yang, Zhijie Shi
    Single-Cycle Bit Permutations with MOMR Execution. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:5, pp:577-585 [Journal]
  9. Ruby B. Lee, Zhijie Shi, Xiao Yang
    Cryptography Efficient Permutation Instructions for Fast Software. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2001, v:21, n:6, pp:56-69 [Journal]

  10. Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks. [Citation Graph (, )][DBLP]


  11. SDRT: A reliable data transport protocol for underwater sensor networks. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002