Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("LEE, Ruby B")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 15 of 15

  • Page / 1
Export

Selection :

  • and

New constructive approach to covert channel modeling and channel capacity estimationZHENGHONG WANG; LEE, Ruby B.Lecture notes in computer science. 2005, pp 498-505, issn 0302-9743, isbn 3-540-29001-X, 1Vol, 8 p.Conference Paper

Evaluating instruction set extensions for fast arithmetic on binary finite fieldsFISKIRAN, A. Murat; LEE, Ruby B.IEEE International Conference on Application-Specific Systems, Architectures, and Processors. 2004, pp 125-136, isbn 0-7695-2226-2, 1Vol, 12 p.Conference Paper

Architectural techniques for accelerating subword permutations with repetitionsMCGREGOR, John P; LEE, Ruby B.IEEE transactions on very large scale integration (VLSI) systems. 2003, Vol 11, Num 3, pp 325-335, issn 1063-8210, 11 p.Conference Paper

PLX FP : An efficient floating-point instruction set for 3d graphicsXIAO YANG; LEE, Ruby B.IEEE International Conference on multimedia. 2004, isbn 0-7803-8603-5, 3Vol, vol1, 137-140Conference Paper

Configuration and extension of embedded processors to optimize IPSec protocol executionPOTLAPALLY, Nachiketh R; RAVI, Srivaths; RAGHUNATHAN, Anand et al.IEEE transactions on very large scale integration (VLSI) systems. 2007, Vol 15, Num 5, pp 605-609, issn 1063-8210, 5 p.Article

Enlisting hardware architecture to thwart malicious code injectionLEE, Ruby B; KARIG, David K; MCGREGOR, John P et al.Lecture notes in computer science. 2004, pp 237-252, issn 0302-9743, isbn 3-540-20887-9, 16 p.Conference Paper

Runtime Execution Monitoring (REM) to detect and prevent malicious code executionFISKIRAN, A. Murat; LEE, Ruby B.IEEE International Conference on Computer Design. 2004, pp 452-457, isbn 0-7695-2231-9, 1Vol, 6 p.Conference Paper

Aiding side-channel attacks on cryptographic software with satisfiability-based analysisPOTLAPALLY, Nachiketh R; RAGHUNATHAN, Anand; RAVI, Srivaths et al.IEEE transactions on very large scale integration (VLSI) systems. 2007, Vol 15, Num 4, pp 465-470, issn 1063-8210, 6 p.Article

Subword sorting with versatile permutation instructionsZHIJIE SHI; LEE, Ruby B.Proceedings, IEEE International Conference on Computer Design. 2002, pp 234-241, issn 1063-6404, isbn 0-7695-1700-5, 8 p.Conference Paper

A traitor tracing scheme based on RSA for fast decryptionMCGREGOR, John Patrick; YIQUN LISA YIN; LEE, Ruby B et al.Lecture notes in computer science. 2005, pp 56-74, issn 0302-9743, isbn 3-540-26223-7, 19 p.Conference Paper

Comparing fast implementations of bit permutation instructionsHILEWITZ, Yedidya; SHI, Zhijie Jerry; LEE, Ruby B et al.Asilomar Conference on Signals, Systems & Computers. 2004, isbn 0-7803-8622-1, 2Vol, vol 2, 1856-1863Conference Paper

Alternative application-specific processor architectures for fast arbitrary bit permutationsSHI, Zhijie Jerry; XIAO YANG; LEE, Ruby B et al.International journal of embedded systems (Print). 2008, Vol 3, Num 4, pp 219-228, issn 1741-1068, 10 p.Article

On permutation operations in cipher designLEE, Ruby B; SHI, Z. J; YIN, Y. L et al.International conference on information technology. 2004, pp vol2.569-577, isbn 0-7695-2108-8, 2VolConference Paper

Exploration and evaluation of PLX floating-point instructions and implementations for 3D graphicsXIAO YANG; VALIA, Shamik K; SCHULTE, Michael J et al.Asilomar Conference on Signals, Systems & Computers. 2004, isbn 0-7803-8622-1, 2Vol, vol 2, 1873-1878Conference Paper

Validating word-oriented processors for bit and Multi-word operationsLEE, Ruby B; XIAO YANG; SHI, Zhijie Jerry et al.Lecture notes in computer science. 2004, pp 473-488, issn 0302-9743, isbn 3-540-23003-3, 16 p.Conference Paper

  • Page / 1