dblp.uni-trier.dewww.uni-trier.de

Weidong Shi Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2007
17EEWeidong Shi, Hsien-Hsin S. Lee: Accelerating memory decryption and authentication with frequent value prediction. Conf. Computing Frontiers 2007: 35-46
16EEBogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan: Query privacy in wireless sensor networks. SECON 2007: 203-212
15EEWeidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee: Memory-Centric Security Architecture. T. HiPEAC 1: 95-115 (2007)
2006
14EEWeidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang: InfoShield: a security architecture for protecting information usage in memory. HPCA 2006: 222-231
13EEWeidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmoy Ghosh: An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors. ISCA 2006: 102-113
12EEWeidong Shi, Hsien-Hsin S. Lee: Authentication Control Point and Its Implications For Secure Processor Design. MICRO 2006: 103-112
11EEChenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S. Lee: M-TREE: A high efficiency security architecture for protecting integrity and privacy of software. J. Parallel Distrib. Comput. 66(9): 1116-1128 (2006)
2005
10EEWeidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee: Memory-Centric Security Architecture. HiPEAC 2005: 153-168
9EEWeidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh: An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. ICAC 2005: 263-273
8EEWeidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva: High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. ISCA 2005: 14-24
7EEWeidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh: Towards the issues in architectural support for protection of software execution. SIGARCH Computer Architecture News 33(1): 6-15 (2005)
2004
6EEWeidong Shi, Tao Zhang, Santosh Pande: Static Techniques to Improve Power Efficiency of Branch Predictors. Asia-Pacific Computer Systems Architecture Conference 2004: 385-398
5EEWeidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang: Attacks and risk analysis for hardware supported software copy protection systems. Digital Rights Management Workshop 2004: 54-62
4EETao Zhang, Weidong Shi, Santosh Pande: Static Techniques to Improve Power Efficiency of Branch Predictors. HiPC 2004: 274-285
3EEWeidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu: Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. IEEE PACT 2004: 123-134
2003
2EEWeidong Shi, Kalyan S. Perumalla, Richard M. Fujimoto: Power-aware State Dissemination in Mobile Distributed Virtual Environments. PADS 2003: 181
2002
1EEWeidong Shi, Xiaotong Zhuang, Indrani Paul, Karsten Schwan: Efficient Implementation of Packet Scheduling Algorithm on High-Speed Programmable Network Processors. MMNS 2002: 184-197

Coauthor Index

1Alexandra Boldyreva [8]
2Bogdan Carbunar [16]
3Laura Falk [9] [13]
4Joshua B. Fryman [14]
5Richard M. Fujimoto (Richard Fujimoto) [2]
6Mrinmoy Ghosh [3] [7] [8] [9] [13]
7Guofei Gu [9] [14]
8Hsien-Hsin S. Lee [3] [5] [7] [8] [9] [10] [11] [12] [13] [14] [15] [17]
9Chenghuai Lu [3] [5] [7] [8] [10] [11] [15]
10Trevor N. Mudge [9]
11Santosh Pande [4] [6]
12Indrani Paul [1]
13Michael Pearce [16]
14Kalyan S. Perumalla [2]
15Karsten Schwan [1]
16Venu Vasudevan [16]
17Jun Yang [14]
18Yang Yu [16]
19Tao Zhang [4] [5] [6] [11]
20Youtao Zhang [14]
21Xiaotong Zhuang [1]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)