Loading...
 
I2C Home »
Print

2013

 

2012

 

2011

 

2010

 

Before 2010

 

2008

  • Yang Yu, Zhu Li(external link), Larry Shi, Yi-Chiun Chen, Hua Xu
    • Cross-Layer Optimization for State Update in Mobile Gaming.
    • IEEE Transactions on Multimedia 10(5): 701-710 (2008)
  • Yong Wang, Tianli Yu, Larry Shi, Zhu Li(external link)
    • Using human body gestures as inputs for gaming via depth analysis.
    • IEEE ICME 2008: 993-996

 

2007

  • Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee(external link)
    • Memory-Centric Security Architecture.
    • T. HiPEAC 1: 95-115 (2007)
  • Weidong Shi, Hsien-Hsin S. Lee(external link)
    • Accelerating memory decryption and authentication with frequent value prediction.
    • ACM Conf. Computing Frontiers 2007: 35-46
  • Bogdan Carbunar(external link), Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan(external link)
    • Query privacy in wireless sensor networks.
    • IEEE SECON 2007: 203-212
  • Michael Zyda(external link), Dhruv Thukral, Sumeet Jakatdar, Jonathan Engelsma(external link), James C. Ferrans, Mat Hans, Larry Shi, Frederick L. Kitson, Venu Vasudevan(external link)
    • Educating the Next Generation of Mobile Game Developers.
    • IEEE Computer Graphics and Applications 27(2): 92-96 (2007)
  • Larry Shi, Bogdan Carbunar(external link), Radu Sion(external link)
    • Conditional E-Cash.
    • Financial Cryptography 2007: 15-28
  • Yang Yu, Zhu Li(external link), Larry Shi, Yi-Chiun Chen, Hua Xu
    • Network-Aware State Update For Large Scale Mobile Games.
    • ICCCN 2007: 563-568

 

2006

  • Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S. Lee(external link)
    • M-TREE: A high efficiency security architecture for protecting integrity and privacy of software.
    • J. Parallel Distrib. Comput. 66(9): 1116-1128 (2006)
  • Weidong Shi, Joshua B. Fryman, Guofei Gu(external link), Hsien-Hsin S. Lee(external link), Youtao Zhang(external link), Jun Yang(external link)
    • InfoShield: a security architecture for protecting information usage in memory.
    • HPCA 2006: 222-231
  • Weidong Shi, Hsien-Hsin S. Lee(external link), Laura Falk, Mrinmoy Ghosh
    • An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors.
    • ISCA 2006: 102-113
  • Weidong Shi, Hsien-Hsin S. Lee(external link)
    • Authentication Control Point and Its Implications For Secure Processor Design.
    • MICRO 2006: 103-112

 

2005

  • Weidong Shi, Hsien-Hsin S. Lee(external link), Chenghuai Lu, Mrinmoy Ghosh
    • Towards the issues in architectural support for protection of software execution.
    • SIGARCH Computer Architecture News 33(1): 6-15 (2005)
  • Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee(external link)
    • Memory-Centric Security Architecture.
    • HiPEAC 2005: 153-168
  • Weidong Shi, Hsien-Hsin S. Lee(external link), Guofei Gu(external link), Laura Falk, Trevor N. Mudge(external link), Mrinmoy Ghosh
    • An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
    • ICAC 2005: 263-273
  • Weidong Shi, Hsien-Hsin S. Lee(external link), Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva(external link)
    • High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
    • ISCA 2005: 14-24

 

2004

  • Weidong Shi, Hsien-Hsin S. Lee(external link), Mrinmoy Ghosh, Chenghuai Lu
    • Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems.
    • IEEE PACT 2004: 123-134
  • Weidong Shi, Hsien-Hsin S. Lee(external link), Chenghuai Lu, Tao Zhang
    • Attacks and risk analysis for hardware supported software copy protection systems.
    • Digital Rights Management Workshop 2004: 54-62
  • Tao Zhang, Weidong Shi, Santosh Pande(external link)
    • Static Techniques to Improve Power Efficiency of Branch Predictors.
    • HiPC 2004: 274-285
  • Mrinmoy Ghosh, Weidong Shi, Hsien-Hsin S. Lee(external link)
    • CoolPression - a hybrid significance compression technique for reducing energy in caches.
    • IEEE SoCC 2004: 399-402
  • Larry Shi, Weiyun Huang
    • Apply Social Network Analysis and Data Mining to Dynamic Task Synthesis for Persistent MMORPG Virtual World.
    • ICEC 2004: 204-215

 

2003

  • Weidong Shi, Kalyan S. Perumalla(external link), Richard M. Fujimoto(external link)
    • Power-aware State Dissemination in Mobile Distributed Virtual Environments.
    • ACM PADS 2003: 181
  • Kenneth Mackenzie(external link), Weidong Shi , Austen Mcdonald , Ivan Ganev
    • An Intel IXP1200-based Network Interface (2003)
    • in Proceedings of the Workshop on Novel Uses of System Area Networks at HPCA (SAN-2 2003).

 

2002

  • Weidong Shi, Xiaotong Zhuang, Indrani Paul, Karsten Schwan
    • Efficient Implementation of Packet Scheduling Algorithm on High-Speed Programmable Network Processors.
    • MMNS 2002: 184-197

Created by larryshi. Last Modification: Friday 04 of October, 2013 18:37:12 UTC by larryshi. (Version 3)