The SCEAS System
Navigation Menu

Search the dblp DataBase


Gershon Kedem: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fareed Zaffar, Gershon Kedem, Ashish Gehani
    Paranoid: A Global Secure File Access Control System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:322-332 [Conf]
  2. Fareed Zaffar, Gershon Kedem
    A Service Architecture for Countering Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:36-42 [Conf]
  3. Thomas Alexander, John L. Ellis, Gershon Kedem
    A Solid Translation Engine using Ray Representation. [Citation Graph (0, 0)][DBLP]
    ASAP, 1995, pp:157-165 [Conf]
  4. Ashish Gehani, Surendar Chandra, Gershon Kedem
    Augmenting storage with an intrusion response primitive to ensure the security of critical data. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:114-124 [Conf]
  5. J. Apte, Gershon Kedem
    Strip Layout: A New Layout Methodology for Standard Circuit Modules. [Citation Graph (0, 0)][DBLP]
    DAC, 1987, pp:363-369 [Conf]
  6. Jack V. Briner Jr., John L. Ellis, Gershon Kedem
    Breaking the Barrier of Parallel Simulation of Digital Systems. [Citation Graph (0, 0)][DBLP]
    DAC, 1991, pp:223-226 [Conf]
  7. Sujit Dey, Franc Brglez, Gershon Kedem
    Corolla Based Circuit Partitioning and Resynthesis. [Citation Graph (0, 0)][DBLP]
    DAC, 1990, pp:607-612 [Conf]
  8. Thomas Alexander, Gershon Kedem
    Distributed Prefetch-buffer/Cache Design for High-Performance Memory Systems. [Citation Graph (0, 0)][DBLP]
    HPCA, 1996, pp:254-263 [Conf]
  9. Sujit Dey, Franc Brglez, Gershon Kedem
    Partitioning Sequential Circuits for Logic Optimization. [Citation Graph (0, 0)][DBLP]
    ICCD, 1991, pp:70-76 [Conf]
  10. Haifeng Yu, Gershon Kedem
    DRAM-Page Based Prediction and Prefetching. [Citation Graph (0, 0)][DBLP]
    ICCD, 2000, pp:267-275 [Conf]
  11. Franc Brglez, Gershon Kedem, Clay Gloster
    Hardware-Based Weighted Random Pattern Generation for Boundary Scan. [Citation Graph (0, 0)][DBLP]
    ITC, 1989, pp:264-274 [Conf]
  12. Ashish Gehani, Gershon Kedem
    RheoStat: Real-Time Risk Management. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:296-314 [Conf]
  13. Pierre J. Malraison, Gershon Kedem, Greg Lee, Donald Meagher
    Solid modeling with hardware (panel session). [Citation Graph (0, 0)][DBLP]
    SIGGRAPH, 1985, pp:328- [Conf]
  14. John L. Ellis, Gershon Kedem, T. C. Lyerly, D. G. Thielman, R. J. Marisa, Jai Menon, Herbert B. Voelcker
    The Ray casting engine and Ray representatives. [Citation Graph (0, 0)][DBLP]
    Symposium on Solid Modeling and Applications, 1991, pp:255-267 [Conf]
  15. Sujit Dey, Franc Brglez, Gershon Kedem
    Identification and Resynthesis of Pipelines in Sequential Networks. [Citation Graph (0, 0)][DBLP]
    VLSI, 1991, pp:439-449 [Conf]
  16. John L. Ellis, Gershon Kedem, T. C. Lyerly, D. G. Thielman, R. J. Marisa, Jai Menon, Herbert B. Voelcker
    The ray casting engine and ray representations: a technical summary. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Geometry Appl., 1991, v:1, n:4, pp:347-380 [Journal]
  17. Gershon Kedem, Hiroyuki Watanabe
    Graph-Optimization Techniques for IC Layout and Compaction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1984, v:3, n:1, pp:12-20 [Journal]
  18. Peter Ramyalal Suaris, Gershon Kedem
    A quadrisection-based combined place and route scheme for standard cells. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1989, v:8, n:3, pp:234-244 [Journal]
  19. Gershon Kedem
    Automatic Differentiation of Computer Programs. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Math. Softw., 1980, v:6, n:2, pp:150-165 [Journal]

Search in 0.042secs, Finished in 0.043secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002