Search the dblp DataBase
Zhijie Shi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ruby B. Lee , Xiao Yang , Zhijie Shi Validating Word-Oriented Processors for Bit and Multi-word Operations. [Citation Graph (0, 0)][DBLP ] Asia-Pacific Computer Systems Architecture Conference, 2004, pp:473-488 [Conf ] Ruby B. Lee , A. Murat Fiskiran , Zhijie Shi , Xiao Yang Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. [Citation Graph (0, 0)][DBLP ] ASAP, 2002, pp:253-264 [Conf ] Zhijie Shi , Ruby B. Lee Bit Permutation Instructions for Accelerating Software Cryptography. [Citation Graph (0, 0)][DBLP ] ASAP, 2000, pp:138-148 [Conf ] Zhijie Shi , Xiao Yang , Ruby B. Lee Arbitrary Bit Permutations in One or Two Cycles. [Citation Graph (0, 0)][DBLP ] ASAP, 2003, pp:237-0 [Conf ] Zhijie Shi , Ruby B. Lee Subword Sorting with Versatile Permutation Instructions. [Citation Graph (0, 0)][DBLP ] ICCD, 2002, pp:234-241 [Conf ] Ruby B. Lee , Zhijie Shi , Yiqun Lisa Yin , Ronald L. Rivest , Matthew J. B. Robshaw On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:569-577 [Conf ] Ruby B. Lee , David K. Karig , John Patrick McGregor , Zhijie Shi Enlisting Hardware Architecture to Thwart Malicious Code Injection. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:237-252 [Conf ] Ruby B. Lee , Xiao Yang , Zhijie Shi Single-Cycle Bit Permutations with MOMR Execution. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2005, v:20, n:5, pp:577-585 [Journal ] Ruby B. Lee , Zhijie Shi , Xiao Yang Cryptography Efficient Permutation Instructions for Fast Software. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2001, v:21, n:6, pp:56-69 [Journal ] Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks. [Citation Graph (, )][DBLP ] SDRT: A reliable data transport protocol for underwater sensor networks. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs