


default search action
Tzi-cker Chiueh
Person information
- affiliation: Industrial Technology Research Institute, Hsinchu, Taiwan
- affiliation (former): Stony Brook University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Shen-Ming Chung
, Ming-Der Shieh, Tzi-Cker Chiueh:
FETCH: A cloud-native searchable encryption scheme enabling efficient pattern search on encrypted data within cloud services. Int. J. Commun. Syst. 36(1) (2023) - 2021
- [c227]Tzi-cker Chiueh:
Keynote I: Advances in memory state-preserving fault tolerance. DSN 2021: xxvii-xxxi - 2020
- [j23]Shen-Ming Chung
, Ming-Der Shieh, Tzi-Cker Chiueh, Chia-Chia Liu, Chia-Heng Tu:
uFETCH: A Unified Searchable Encryption Scheme and Its Saas-Native to Make DBMS Privacy-Preserving. IEEE Access 8: 93894-93906 (2020) - [c226]Chieh-Yu Yu, Che-Rung Lee, Po-Jui Tsao, Yu-Shiang Lin, Tzi-Cker Chiueh:
Efficient Group Fault Tolerance for Multi-tier Services in Cloud Environments. ICC 2020: 1-7 - [c225]Kevin Cheng, Spoorti Doddamani, Tzi-cker Chiueh, Yongheng Li, Kartik Gopalan
:
Directvisor: virtualization for bare-metal cloud. VEE 2020: 45-58
2010 – 2019
- 2019
- [c224]Tzi-cker Chiueh, Peng-Kai Hsu, Chao-Tang Lee, Yu-sheng Lin, Yi-Fu Hung, Sian-Jing Lin, Tai-Hua Hsiao:
Evaluation of a Disaggregated Rack System. APSys 2019: 107-113 - 2018
- [c223]Shen-Ming Chung, Ming-Der Shieh, Tzi-Cker Chiueh:
A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption. SC² 2018: 127-130 - [c222]William Cheng-Chun Tu, Tzi-cker Chiueh:
Seamless Fail-over for PCIe Switched Networks. SYSTOR 2018: 101-111 - [c221]Tzi-cker Chiueh, Mao-Cheng Huang, Kai-Cheung Juang, Shih-Hao Liang, Welkin Ling:
Virtualizing Energy Storage Management Using RAIBA. USENIX ATC 2018: 187-198 - 2017
- [c220]Tzi-cker Chiueh, Jyh Shyuer Peng:
Dynamic Refresh Rate Control for IGZO Display. APSys 2017: 9:1-9:6 - [c219]Yifeng Sun, Tzi-cker Chiueh:
TCP Performance Optimization for Epoch-based Execution. APSys 2017: 10:1-10:7 - 2016
- [c218]Tzi-cker Chiueh:
Keynote speaker: Visualization for deep learning training. PacificVis 2016 - [c217]Ting-Chou Lu, Li-Ren Huang, Yu Lee, Kun-Ju Tsai, Yu-Te Liao
, Nai-Chen Cheng, Yuan-Hua Chu, Yi-Hsing Tsai, Fang-Chu Chen, Tzi-cker Chiueh:
Invited - Wireless sensor nodes for environmental monitoring in internet of things. DAC 2016: 3:1-3:5 - [c216]Tzi-cker Chiueh, Houcheng Lin, Ares Chao, Anthony, Tan-Gen Wu, Chieh-Min Wang, Yu-Sung Wu:
Smartphone Virtualization. ICPADS 2016: 141-150 - [c215]Xiang Gao, Tzi-cker Chiueh:
Towards Seamless Resynchronization for Active-Active Database Clustering. ICPADS 2016: 1127-1134 - [i5]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Duplication of Windows Services. CoRR abs/1608.08051 (2016) - [i4]Zhiyong Shan, Yang Yu, Tzi-cker Chiueh:
Confining Windows Inter-Process Communications for OS-Level Virtual Machine. CoRR abs/1609.04781 (2016) - [i3]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Virtualizing System and Ordinary Services in Windows-based OS-Level Virtual Machines. CoRR abs/1609.04785 (2016) - 2015
- [c214]Jui-Hao Chiang, Tzi-cker Chiueh, Han-Lin Li:
Memory Reclamation and Compression Using Accurate Working Set Size Estimation. CLOUD 2015: 187-194 - [c213]Shih-Hao Liang, Tzi-cker Chiueh, Welkin Ling:
Go Gentle into the Good Night via Controlled Battery Discharging. APSys 2015: 17:1-17:6 - [c212]Tse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei-Heng Tai:
An intelligent surveillance video analysis service in cloud environment. ICCST 2015: 1-6 - [c211]Tzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M. H. Chiang:
Security considerations in ITRI cloud OS. ICCST 2015: 107-112 - [c210]Jui-Hao Chiang, Tzi-cker Chiueh, Han-Lin Li:
Memory Pressure Balancing on Virtualized Servers. RTCSA 2015: 70-79 - [c209]Cheng-Chun Tu, Michael Ferdman, Chao-Tang Lee, Tzi-cker Chiueh:
A Comprehensive Implementation and Evaluation of Direct Interrupt Delivery. VEE 2015: 1-15 - 2014
- [j22]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization. IEEE Trans. Computers 63(5): 1220-1233 (2014) - [c208]Cheng-Chun Tu, Chao-Tang Lee, Tzi-cker Chiueh:
Marlin: a memory-based rack area network. ANCS 2014: 125-136 - [c207]Ming-Wei Chang, Tzi-cker Chiueh, Chia-Ming Chang:
Virtual keyboard for head mounted display-based wearable devices. ICPADS 2014: 225-232 - [c206]Yi-Ling Chen, Tse-Shih Chen, Liang-Chun Yin, Tsiao-Wen Huang, Shiou-Yaw Wang, Tzi-cker Chiueh:
City Eyes: An Unified Computational Framework for Intelligent Video Surveillance in Cloud Environment. iThings/GreenCom/CPSCom 2014: 324-327 - [c205]Cheng-Chun Tu, Pai-Wei Wang, Tzi-cker Chiueh:
In-Band Control for an Ethernet-Based Software-Defined Network. SYSTOR 2014: 1:1-1:11 - [c204]Tzi-cker Chiueh, Weafon Tsao, Hou-Chiang Sun, Ting-Fang Chien, An-Nan Chang, Cheng-Ding Chen:
Software Orchestrated Flash Array. SYSTOR 2014: 14:1-14:11 - [c203]Jennia Hizver, Tzi-cker Chiueh:
Real-time deep virtual machine introspection and its applications. VEE 2014: 3-14 - 2013
- [j21]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Malware Clearance for Secure Commitment of OS-Level Virtual Machines. IEEE Trans. Dependable Secur. Comput. 10(2): 70-83 (2013) - [c202]Jennia Hizver, Tzi-cker Chiueh:
Cloud-Based Application Whitelisting. IEEE CLOUD 2013: 636-643 - [c201]Alexey Smirnov, Mikhail Zhidko, Ying-Shiuan Pan, Po-Jui Tsao, Kuang-Chih Liu, Tzi-cker Chiueh:
Evaluation of a Server-Grade Software-Only ARM Hypervisor. IEEE CLOUD 2013: 855-862 - [c200]Yi-Ling Chen, Tse-Shih Chen, Tsiao-Wen Huang, Liang-Chun Yin, Shiou-Yaw Wang, Tzi-cker Chiueh:
Intelligent Urban Video Surveillance System for Automatic Vehicle Detection and Tracking in Clouds. AINA 2013: 814-821 - [c199]Yifeng Sun, Tzi-cker Chiueh:
SIDE: Isolated and efficient execution of unmodified device drivers. DSN 2013: 1-12 - [c198]Jui-Hao Chiang, Han-Lin Li, Tzi-cker Chiueh:
Working Set-based Physical Memory Ballooning. ICAC 2013: 95-99 - [c197]Chien-Yung Lee, Yu-Wei Lee, Cheng-Chun Tu, Pai-Wei Wang, Yu-Cheng Wang, Chih-Yu Lin, Tzi-cker Chiueh:
Autonomic Fail-over for a Software-Defined Container Computer Network. ICAC 2013: 225-234 - [c196]Cheng-Chun Tu, Chao-Tang Lee, Tzi-cker Chiueh:
Secure I/O device sharing among virtual machines on multiple hosts. ISCA 2013: 108-119 - [c195]Dilip Nijagal Simha, Tzi-cker Chiueh, Ganesh Karuppur Rajagopalan, Pallav Bose:
High-throughput low-latency fine-grained disk logging. SIGMETRICS 2013: 255-266 - [c194]Dilip Nijagal Simha, Maohua Lu, Tzi-cker Chiueh:
A scalable deduplication and garbage collection engine for incremental backup. SYSTOR 2013: 16:1-16:12 - [c193]Jui-Hao Chiang, Han-Lin Li, Tzi-cker Chiueh:
Introspection-based memory de-duplication and migration. VEE 2013: 51-62 - 2012
- [j20]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Enforcing Mandatory Access Control in Commodity OS to Disable Malware. IEEE Trans. Dependable Secur. Comput. 9(4): 541-555 (2012) - [c192]Tzi-cker Chiueh, Cheng-Chun Tu, Yu-Cheng Wang, Pai-Wei Wang, Kai-Wen Li, Yu-Ming Huang:
Peregrine: An All-Layer-2 Container Computer Network. IEEE CLOUD 2012: 686-693 - [c191]Dilip Nijagal Simha, Maohua Lu, Tzi-cker Chiueh:
An update-aware storage system for low-locality update-intensive workloads. ASPLOS 2012: 375-386 - [c190]Maohua Lu, Tzi-cker Chiueh:
Speculative Memory State Transfer for Active-Active Fault Tolerance. CCGRID 2012: 268-275 - [c189]Tzi-cker Chiueh, Matthew Conover, Bruce Montague:
Surreptitious Deployment and Execution of Kernel Agents in Windows Guests. CCGRID 2012: 507-514 - [c188]Tzi-cker Chiueh, Dilip Nijagal Simha, Alankar Saxena, Saurabh Bhola, Ping-Hung Lin, Cheng-En Pang:
Encryption Domain Text Retrieval. CloudCom 2012: 107-112 - [c187]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng:
Facilitating inter-application interactions for OS-level virtualization. VEE 2012: 75-86 - 2011
- [c186]Jennia Hizver, Tzi-cker Chiueh:
Tracking payment card data flow using virtual machine state introspection. ACSAC 2011: 277-285 - [c185]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing. AsiaCCS 2011: 135-144 - [c184]Jennia Hizver, Tzi-cker Chiueh:
An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems. Financial Cryptography Workshops 2011: 55-69 - [c183]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng:
Safe side effects commitment for OS-level virtualization. ICAC 2011: 111-120 - [c182]Jui-Hao Chiang, Maohua Lu, Tzi-cker Chiueh:
Bootstrapped migration for Linux OS. ICAC 2011: 209-212 - [c181]Jui-Hao Chiang, Maohua Lu, Tzi-cker Chiueh:
Physical Machine State Migration. ICPADS 2011: 25-32 - [c180]Ying-Shiuan Pan, Jui-Hao Chiang, Han-Lin Li, Po-Jui Tsao, Ming-Fen Lin, Tzi-cker Chiueh:
Hypervisor Support for Efficient Memory De-duplication. ICPADS 2011: 33-39 - [c179]Santosh Sonawane, Tzi-cker Chiueh:
Optimization of an Instrumentation Tool for Stripped Win32/X86 Binaries. ICPADS 2011: 134-141 - [c178]Maohua Lu, Dilip Nijagal Simha, Tzi-cker Chiueh:
Scalable Index Update for Block-Level Continuous Data Protection. NAS 2011: 372-381 - [c177]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Virtualizing system and ordinary services in Windows-based OS-level virtual machines. SAC 2011: 579-583 - [c176]Jennia Hizver, Tzi-cker Chiueh:
Automated Discovery of Credit Card Data Flow for PCI DSS Compliance. SRDS 2011: 51-58
2000 – 2009
- 2009
- [j19]Ashish Raniwala, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng, Tzi-cker Chiueh:
WShare: an instant secure collaboration workspace over ad hoc wireless LAN. Int. J. Pervasive Comput. Commun. 5(4): 428-447 (2009) - [c175]Xin Hu, Tzi-cker Chiueh, Kang G. Shin:
Large-scale malware indexing using function-call graphs. CCS 2009: 611-620 - [c174]Maohua Lu, Tzi-cker Chiueh:
Fast memory state synchronization for virtualization-based fault tolerance. DSN 2009: 534-543 - [c173]Zhiyong Shan, Yang Yu, Tzi-cker Chiueh:
Confining windows inter-process communications for OS-level virtual machine. VDTS@EuroSys 2009: 30-35 - [c172]Maohua Lu, Tzi-cker Chiueh:
File Versioning for Block-Level Continuous Data Protection. ICDCS 2009: 327-334 - [c171]Jui-Hao Chiang, Tzi-cker Chiueh:
Accurate Clock Synchronization for IEEE 802.11-Based Multi-Hop Wireless Networks. ICNP 2009: 11-20 - [c170]Fanglu Guo, Tzi-cker Chiueh:
Device-transparent network-layer handoff for micro-mobility. MASCOTS 2009: 1-10 - [c169]Fanglu Guo, Tzi-cker Chiueh:
DAFT: Disk geometry-Aware File system Traversal. MASCOTS 2009: 1-10 - [c168]Ashish Raniwala, Pradipta De, Srikant Sharma, Rupa Krishnan, Tzi-cker Chiueh:
Globally fair radio resource allocation for wireless mesh networks. MASCOTS 2009: 1-10 - [c167]Jui-Hao Chiang, Tzi-cker Chiueh:
Implementation and evaluation of a mobile tetherless VoIP/PSTN gateway. MobiQuitous 2009: 1-10 - [c166]Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh:
Automatic Generation of String Signatures for Malware Detection. RAID 2009: 101-120 - [c165]Yanjun Wu, Tzi-cker Chiueh, Chen Zhao:
Efficient and Automatic Instrumentation for Packed Binaries. ISA 2009: 307-316 - 2008
- [c164]Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:
Web Application Attack Prevention for Tiered Internet Services. IAS 2008: 186-191 - [c163]Susanta Nanda, Tzi-cker Chiueh:
Execution Trace-Driven Automated Attack Signature Generation. ACSAC 2008: 195-204 - [c162]Tzi-cker Chiueh:
Fast Bounds Checking Using Debug Register. HiPEAC 2008: 99-113 - [c161]Gang Peng, Tzi-cker Chiueh:
Availability and Fairness Support for Storage QoS Guarantee. ICDCS 2008: 589-596 - [c160]Tzi-cker Chiueh, Shweta Bajpai:
Accurate and Efficient Inter-Transaction Dependency Tracking. ICDE 2008: 1209-1218 - [c159]Rupa Krishnan, Ashish Raniwala, Tzi-cker Chiueh:
Design of a Channel Characteristics-Aware Routing Protocol. INFOCOM 2008: 2441-2449 - [c158]Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh:
A Study of the Packer Problem and Its Solutions. RAID 2008: 98-115 - [c157]Maohua Lu, Tzi-cker Chiueh, Shibiao Lin:
An Incremental File System Consistency Checker for Block-Level CDP Systems. SRDS 2008: 157-162 - [c156]Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh:
Applications of a feather-weight virtual machine. VEE 2008: 171-180 - [c155]Gang Wu, Sathyanarayana Singh, Tzi-cker Chiueh:
Implementation of dynamic channel switching on IEEE 802.11-based wireless mesh networks. WICON 2008: 39 - [c154]Rupa Krishnan, Ashish Raniwala, Tzi-cker Chiueh:
An empirical comparison of throughput-maximizing wireless mesh routing protocols. WICON 2008: 40 - 2007
- [j18]Kartik Gopalan, Tzi-cker Chiueh, Yow-Jian Lin:
Slack allocation techniques for intra-path load balancing. J. High Speed Networks 16(3): 211-237 (2007) - [j17]Chuan-Kai Yang, Tzi-cker Chiueh:
Time-Critical Rendering of Tetrahedral Meshes. J. Inf. Sci. Eng. 23(5): 1437-1451 (2007) - [j16]Srikant Sharma, Inho Baek, Tzi-cker Chiueh:
OmniCon: a Mobile IP-based vertical handoff system for wireless LAN and GPRS links. Softw. Pract. Exp. 37(7): 779-798 (2007) - [c153]Alexey Smirnov, Tzi-cker Chiueh:
Automatic Patch Generation for Buffer Overflow Attacks. IAS 2007: 165-170 - [c152]Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
Accurate Application-Specific Sandboxing for Win32/Intel Binaries. IAS 2007: 375-382 - [c151]Wei Li, Tzi-cker Chiueh:
Automated Format String Attack Prevention for Win32/X86 Binaries. ACSAC 2007: 398-409 - [c150]Ningning Zhu, Tzi-cker Chiueh:
Portable and Efficient Continuous Data Protection for Network File Servers. DSN 2007: 687-697 - [c149]Ashish Raniwala, Pradipta De, Srikant Sharma, Rupa Krishnan, Tzi-cker Chiueh:
End-to-End Flow Fairness Over IEEE 802.11-Based Wireless Mesh Networks. INFOCOM 2007: 2361-2365 - [c148]Fanglu Guo, Tzi-cker Chiueh:
Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN. INFOCOM 2007: 2366-2370 - [c147]Ashish Raniwala, Srikant Sharma, Pradipta De, Rupa Krishnan, Tzi-cker Chiueh:
Evaluation of a Stateful Transport Protocol for Multi-channel Wireless Mesh Networks. IWQoS 2007: 74-82 - [c146]Kartik Gopalan
, Tzi-cker Chiueh, Yow-Jian Lin:
Load Balancing Routing of Fault Tolerant QoS-Guaranteed VPNs. IWQoS 2007: 100-108 - [c145]Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:
Dynamic multi-process information flow tracking for web application security. Middleware (Demos and Posters) 2007: 19 - [c144]Maohua Lu, Shibiao Lin, Tzi-cker Chiueh:
Efficient Logging and Replication Techniques for Comprehensive Data Protection. MSST 2007: 171-184 - [c143]Gang Wu, Tzi-cker Chiueh:
Passive and accurate traffic load estimation for infrastructure-mode wireless lan. MSWiM 2007: 109-116 - [c142]Gang Wu, Fanglu Guo, Tzi-cker Chiueh:
Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LAN. NCA 2007: 69-78 - [c141]Shibiao Lin, Maohua Lu, Tzi-cker Chiueh:
Transparent Reliable Multicast for Ethernet-Based Storage Area Networks. NCA 2007: 87-94 - [c140]Shweta Bajpai, Alexey Smirnov, Tzi-cker Chiueh:
Accurate Inter-Transaction Dependency Tracking for Repairable DBMS. NCA 2007: 161-168 - [c139]Shibiao Lin, Srikant Sharma, Tzi-cker Chiueh:
Autonomic Resource Management for Multiple-Spanning-Tree Metro-Ethernet Networks. NCA 2007: 239-248 - [c138]David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin:
RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007 - [c137]Jeffrey Wilhelm, Tzi-cker Chiueh:
A Forced Sampled Execution Approach to Kernel Rootkit Identification. RAID 2007: 219-235 - [c136]Tzi-cker Chiueh, Rupa Krishnan, Pradipta De, Jui-Hao Chiang:
A networked robot system for wireless network emulation. ROBOCOMM 2007: 32 - 2006
- [j15]Kartik Gopalan
, Lan Huang, Gang Peng, Tzi-cker Chiueh, Yow-Jian Lin:
Statistical admission control using delay distribution measurements. ACM Trans. Multim. Comput. Commun. Appl. 2(4): 258-281 (2006) - [j14]Chuan-Kai Yang, Tzi-cker Chiueh:
Integration of volume decompression and out-of-core iso-surface extraction from irregular volume data. Vis. Comput. 22(4): 249-265 (2006) - [c135]Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
How to Automatically and Accurately Sandbox Microsoft IIS. ACSAC 2006: 213-222 - [c134]Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
Foreign Code Detection on the Windows/X86 Platform. ACSAC 2006: 279-288 - [c133]Lap-Chung Lam, Tzi-cker Chiueh:
A General Dynamic Information Flow Tracking Framework for Security Applications. ACSAC 2006: 463-472 - [c132]Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh:
Scalable network-based buffer overflow attack detection. ANCS 2006: 163-172 - [c131]Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
BIRD: Binary Interpretation using Runtime Disassembly. CGO 2006: 358-370 - [c130]Lap-Chung Lam, Wei Li, Tzi-cker Chiueh:
Accurate and Automated System Call Policy-Based Intrusion Prevention. DSN 2006: 413-424 - [c129]Kartik Gopalan
, Tzi-cker Chiueh, Yow-Jian Lin:
Network-Wide Load Balancing Routing With Performance Guarantees. ICC 2006: 943-948 - [c128]Fanglu Guo, Jiawu Chen, Tzi-cker Chiueh:
Spoof Detection for Preventing DoS Attacks against DNS Servers. ICDCS 2006: 37 - [c127]Lap-Chung Lam, Yang Yu, Tzi-cker Chiueh:
Secure Mobile Code Execution Service. LISA 2006: 53-62 - [c126]Pradipta De, Ashish Raniwala, Rupa Krishnan, Krishna Tatavarthi, Jatan Modi, Nadeem Ahmed Syed, Srikant Sharma, Tzi-cker Chiueh:
MiNT-m: an autonomous mobile wireless experimentation platform. MobiSys 2006: 124-137 - [c125]Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:
A feather-weight virtual machine for windows applications. VEE 2006: 24-34 - 2005
- [j13]Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-cker Chiueh:
Design considerations for a multihop wireless network testbed. IEEE Commun. Mag. 43(10): 102-109 (2005) - [c124]Fanglu Guo, Yang Yu, Tzi-cker Chiueh:
Automated and Safe Vulnerability Assessment. ACSAC 2005: 150-159 - [c123]Fanglu Guo, Tzi-cker Chiueh:
Scalable and Robust WLAN Connectivity Using Access Point Array. DSN 2005: 288-297 - [c122]Lap-Chung Lam, Tzi-cker Chiueh:
Checking Array Bound Violation Using Segmentation Hardware. DSN 2005: 388-397 - [c121]Ningning Zhu, Jiawu Chen, Tzi-cker Chiueh:
TBBT: Scalable and Accurate Trace Replay for File Server Evaluation. FAST 2005 - [c120]Gang Peng, Srikant Sharma, Tzi-cker Chiueh:
Network-Centric Buffer Cache Organization. ICDCS 2005: 219-228 - [c119]Tzi-cker Chiueh, Dhruv Pilania:
Design, Implementation, and Evaluation of a Repairable Database Management System. ICDE 2005: 1024-1035 - [c118]Ashish Raniwala, Tzi-cker Chiueh:
Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network. INFOCOM 2005: 2223-2234 - [c117]Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-cker Chiueh:
MiNT: a miniaturized network testbed for mobile wireless research. INFOCOM 2005: 2731-2742 - [c116]Alexey Smirnov, Tzi-cker Chiueh:
DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks. NDSS 2005 - [c115]Fanglu Guo, Tzi-cker Chiueh:
Sequence Number-Based MAC Address Spoof Detection. RAID 2005: 309-329 - [c114]Ningning Zhu, Jiawu Chen, Tzi-cker Chiueh, Daniel Ellard:
TBBT: scalable and accurate trace replay for file server evaluation. SIGMETRICS 2005: 392-393 - [c113]Chuan-Kai Yang, Tzi-cker Chiueh:
An Integrated Pipeline of Decompression, Simplification and Rendering for Irregular Volume Data. VG 2005: 147-155 - [c112]Bin Tang, Zongheng Zhou, Anand Kashyap, Tzi-cker Chiueh:
An integrated approach for P2P file sharing on multi-hop wireless networks. WiMob (3) 2005: 268-274 - 2004
- [j12]Kartik Gopalan
, Tzi-cker Chiueh, Yow-Jian Lin:
Load balancing routing with bandwidth-delay guarantees. IEEE Commun. Mag. 42(6): 108-113 (2004) - [j11]Srikant Sharma, Ningning Zhu, Tzi-cker Chiueh:
Low-latency mobile IP handoff for infrastructure-mode wireless LANs. IEEE J. Sel. Areas Commun. 22(4): 643-652 (2004) - [j10]Ashish Raniwala, Kartik Gopalan
, Tzi-cker Chiueh:
Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(2): 50-65 (2004) - [c111]Tzi-cker Chiueh, Dhruv Pilania:
Design, Implementation, and Evaluation of A Repairable Database Management System. ACSAC 2004: 179-188 - [c110]Amit Purohit, Vishnu Navda, Tzi-cker Chiueh:
Tracing the Root of "Rootable" Processes. ACSAC 2004: 284-303 - [c109]Fu-Hau Hsu, Tzi-cker Chiueh:
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. ACSAC 2004: 335-344 - [c108]Lap-Chung Lam, Peitao Deng, Tzi-cker Chiueh:
DataPhone: an intelligent phone for data conferencing. CCNC 2004: 563-568 - [c107]Pradipta De, Srikant Sharma, Andrew Shuvalov, Tzi-cker Chiueh:
WiVision: a wireless video system for real-time distribution and on-demand playback. CCNC 2004: 575-580 - [c106]Yang Yu, Tzi-cker Chiueh:
Display-only file server: a solution against information theft due to insider attack. Digital Rights Management Workshop 2004: 31-39 - [c105]Alexey Smirnov, Tzi-cker Chiueh:
A Portable Implementation Framework for Intrusion-Resilient Database Management Systems. DSN 2004: 443-452 - [c104]Ashish Raniwala, Tzi-cker Chiueh:
Evaluation of a wireless enterprise backbone network architecture. Hot Interconnects 2004: 98-104 - [c103]Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh:
Towards Automatic Learning of Valid Services for Honeypots. ICDCIT 2004: 469-470 - [c102]Srikant Sharma, Inho Baek, Yuvrajsinh Dodia, Tzi-cker Chiueh:
OmniCon: A Mobile IP-Based Vertical Handoff System for Wireless LAN and GPRS Links. ICPP Workshops 2004: 330-337 - [c101]Fanglu Guo, Jiawu Chen, Wei Li, Tzi-cker Chiueh:
Experiences in Building A Multihoming Load Balancing System. INFOCOM 2004: 1241-1251 - [c100]Kartik Gopalan
, Tzi-cker Chiueh, Yow-Jian Lin:
Delay Budget Partitioning to Maximize Network Resource Usage Efficiency. INFOCOM 2004: 2060-2071 - [c99]Srikant Sharma, Kartik Gopalan
, Susanta Nanda, Tzi-cker Chiueh:
Viking: A Multi-Spanning-Tree Ethernet Architecture for Metropolitan Area and Cluster Networks. INFOCOM 2004: 2283-2294 - [c98]Kartik Gopalan
, Tzi-cker Chiueh, Yow-Jian Lin:
Probabilistic delay guarantees using delay distribution measurement. ACM Multimedia 2004: 900-907 - [c97]Lap-Chung Lam, Tzi-cker Chiueh:
Automatic Extraction of Accurate Application-Specific Sandboxing Policy. RAID 2004: 1-20 - [c96]Lan Huang, Gang Peng, Tzi-cker Chiueh:
Multi-dimensional storage virtualization. SIGMETRICS 2004: 14-24 - [i2]Srikant Sharma, Tzi-cker Chiueh:
Programmable Ethernet Switches and Their Applications. CoRR cs.NI/0411019 (2004) - [i1]Srikant Sharma, Kartik Gopalan, Ningning Zhu, Gang Peng, Pradipta De, Tzi-cker Chiueh:
Supporting Bandwidth Guarantee and Mobility for Real-Time Applications on Wireless LANs. CoRR cs.NI/0411079 (2004) - 2003
- [c95]Chang Li, Gang Peng, Kartik Gopalan
, Tzi-cker Chiueh:
Performance Guarantees for Cluster-Based Internet Services. CCGRID 2003: 276-283 - [c94]Tulika Mitra
, Tzi-cker Chiueh:
Compression-Domain Editing of 3D Models. DCC 2003: 343-352 - [c93]Ningning Zhu, Tzi-cker Chiueh:
Design, Implementation, and Evaluation of Repairable File Service. DSN 2003: 217-226 - [c92]Srikant Sharma, Jiawu Chen, Wei Li, Kartik Gopalan
, Tzi-cker Chiueh:
Duplex: A Reusable Fault Tolerance Extension Framework for Network Access Devices. DSN 2003: 501-510 - [c91]Gang Peng, Srikant Sharma, Tzi-cker Chiueh:
A case for network-centric buffer cache organization. Hot Interconnects 2003: 66-71 - [c90]Pradipta De, Anindya Neogi, Tzi-cker Chiueh:
VirtualWire: A Fault Injection and Analysis Tool for Network Protocols. ICDCS 2003: 214-221 - [c89]Fu-Hau Hsu, Tzi-cker Chiueh:
A Path Information Caching and Aggregation Approach to Traffic Source Identification. ICDCS 2003: 332-339 - [c88]Chang Li, Gang Peng, Kartik Gopalan
, Tzi-cker Chiueh:
Performance Guarantees for Cluster-Based Internet Services. ICDCS 2003: 378-385 - [c87]Nikolai Joukov, Tzi-cker Chiueh:
Lectern II: a multimedia lecture capturing and editing system. ICME 2003: 681-684 - [c86]Nikolai Joukov, Markus Fauster, Tzi-cker Chiueh:
Design, Implementation, and Evaluation of a Digital Lectern System. ICWL 2003: 241-252 - [c85]Maxim Lifantsev, Tzi-cker Chiueh:
Implementation of a Modern Web Search Engine Cluster. USENIX ATC, FREENIX Track 2003: 1-14 - [c84]Manish Prasad, Tzi-cker Chiueh:
A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks. USENIX ATC, General Track 2003: 211-224 - 2002
- [j9]Tzi-cker Chiueh, Harish Sankaran, Anindya Neogi:
Spout: a transparent proxy for safe execution of Java applets. IEEE J. Sel. Areas Commun. 20(7): 1426-1433 (2002) - [c83]Anindya Neogi, Tzi-cker Chiueh:
Compression Techniques for Active Video Content. DCC 2002: 466 - [c82]Tzi-cker Chiueh, Lan Huang:
Track-Based Disk Logging. DSN 2002: 429-438 - [c81]Tulika Mitra
, Tzi-cker Chiueh:
An FPGA Implementation of Triangle Mesh Decompression. FCCM 2002: 22- - [c80]Prashant Pradhan, Tzi-cker Chiueh:
Evaluation of A Programmable Cluster-Based IP Router. ICPADS 2002: 321-326 - [c79]Chang Li, Gang Peng, Kartik Gopalan
, Tzi-cker Chiueh:
Performance Guarantee for Cluster-Based Internet Services. ICPADS 2002: 327- - [c78]Tzi-cker Chiueh, Kartik Gopalan
, Anindya Neogi, Chang Li, Srikant Sharma, Sheng-Ming Shan, Jiawu Chen, Wei Li, Nikolai Joukov, Jie Zhang, Fu-Hau Hsu, Fanglu Guo, Sheng-I Doong:
Sago: A Network Resource Management System for Real-Time Content Distribution. ICPADS 2002: 557-562 - [c77]Tulika Mitra
, Tzi-cker Chiueh:
Compression-Domain Parallel Rendering. IPDPS 2002 - [c76]Kartik Gopalan
, Tzi-cker Chiueh:
Improving route lookup performance using network processor cache. SC 2002: 29:1-29:10 - [c75]Prashant Pradhan, Tzi-cker Chiueh:
Implementation and evaluation of a QoS-capable cluster-based IP router. SC 2002: 58:1-58:13 - [c74]Chuan-Kai Yang, Tulika Mitra, Tzi-cker Chiueh:
A Decoupled Architecture for Application-Specific File Prefetching. USENIX ATC, FREENIX Track 2002: 157-170 - [c73]Maxim Lifantsev, Tzi-cker Chiueh:
I/O-Conscious Data Preparation for Large-Scale Web Search Engines. VLDB 2002: 382-393 - 2001
- [c72]Tzi-cker Chiueh:
Stonehenge: a fault-tolerant real-time network-attached storage device. Hot Interconnects 2001: 57-61 - [c71]Srikant Sharma, Kartik Gopalan
, Ningning Zhu, Pradipta De, Gang Peng, Tzi-cker Chiueh:
Quality of service guarantee on 802.11 networks. Hot Interconnects 2001: 99-103 - [c70]Prashant Pradhan, Kartik Gopalan
, Tzi-cker Chiueh:
Design Issues in System Support for Programmable Routers. HotOS 2001: 9-14 - [c69]Tzi-cker Chiueh, Fu-Hau Hsu:
RAD: A Compile-Time Solution to Buffer Overflow Attacks. ICDCS 2001: 409-417 - [c68]Lan Huang, Tzi-cker Chiueh:
Charm: An I/O-Driven Execution Strategy for High-Performance Transaction Processing. USENIX ATC, General Track 2001: 275-288 - [c67]Chuan-Kai Yang, Tzi-cker Chiueh:
I/O-Conscious Volume Rendering. VisSym 2001: 263-272 - [e2]Nicolas D. Georganas, Radu Popescu-Zeletin, Tzi-cker Chiueh, Wolfgang Klas, Aidong Zhang, Vincent Oria:
Proceedings of the 2001 International Workshop on Multimedia Middleware, M3W, Ottawa, Ontario, Canada. ACM 2001 [contents] - [e1]Nicolas D. Georganas, Radu Popescu-Zeletin, Tzi-cker Chiueh, Wolfgang Klas, Aidong Zhang:
Proceedings of the 2001 ACM workshops on Multimedia: multimedia information retrieval, Ottawa, ON, Canada, September 30 - October 5, 2001. ACM 2001, ISBN 1-58113-395-2 [contents] - 2000
- [j8]Tzi-cker Chiueh, Prashant Pradhan:
Cache Memory Design for Internet Processors. IEEE Micro 20(1): 28-33 (2000) - [j7]Tzi-cker Chiueh, Tulika Mitra
, Anindya Neogi, Chuan-Kai Yang:
Zodiac: A history-based interactive video authoring system. Multim. Syst. 8(3): 201-211 (2000) - [c66]Tzi-cker Chiueh, Prashant Pradhan:
Cache Memory Design for Network Processors. HPCA 2000: 409-418 - [c65]Prashant Pradhan, Tzi-cker Chiueh, Anindya Neogi:
Aggregate TCP Congestion Control using Multiple Network Probing. ICDCS 2000: 30-37 - [c64]Tzi-cker Chiueh, Prashant Pradhan:
Suez: A Cluster-based Scalable Real-Time Packet Router. ICDCS 2000: 136-143 - [c63]Tzi-cker Chiueh, Harish Sankaran, Anindya Neogi:
Spout: A Transparent Distributed Execution Engine for Java Applets. ICDCS 2000: 394-401 - [c62]Tzi-cker Chiueh, Peitao Deng:
A Digital Desk System for Video-Free Course - Lecture Capturing and Playback. IEEE International Conference on Multimedia and Expo (I) 2000: 3-6 - [c61]Tzi-cker Chiueh, Wei Wu, Lap-Chung Lam:
Variorum: A Multimedia-Based Program Documentation System. IEEE International Conference on Multimedia and Expo (I) 2000: 155-158 - [c60]Tulika Mitra, Chuan-Kai Yang, Tzi-cker Chiueh:
Application-Specific File Prefetching for Multimedia Programs. IEEE International Conference on Multimedia and Expo (I) 2000: 459-462 - [c59]Ashish Raniwala, Srikant Sharma, Anindya Neogi, Tzi-cker Chiueh:
Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device. IEEE Symposium on Mass Storage Systems 2000: 89-104 - [c58]Chuan-Kai Yang, Tulika Mitra, Tzi-cker Chiueh:
On-the-Fly rendering of losslessly compressed irregular volume data. IEEE Visualization 2000: 101-108
1990 – 1999
- 1999
- [j6]Tzi-Cker Chiueh, Chitra Venkatramani, Michael Vernick:
The integration of real-time I/O and network support in the Stony Brook Video Server. IEEE Netw. 13(2): 30-36 (1999) - [j5]Anindya Neogi, Tzi-Cker Chiueh, Paul A. Stirpe:
Performance analysis of an RSVP-capable router. IEEE Netw. 13(5): 56-63 (1999) - [c57]Tzi-cker Chiueh:
RETHER: A Software-Only Real-Time Ethernet for PLC Networks. USENIX Workshop on Embedded Systems 1999 - [c56]Prashant Pradhan, Tzi-cker Chiueh:
Operating Systems Support for Programmable Cluster-based Internet Routers. Workshop on Hot Topics in Operating Systems 1999: 76-81 - [c55]Tzi-cker Chiueh, Ganesh Venkitachalam, Prashant Pradhan:
Intra-Address Space Protection using Segmentation Hardware. Workshop on Hot Topics in Operating Systems 1999: 110-115 - [c54]Srinidhi Varadarajan, Tzi-cker Chiueh:
Automatic Fault Detection and Recovery in Real Time Switched Ethernet Networks. INFOCOM 1999: 161-169 - [c53]Tzi-cker Chiueh, Prashant Pradhan:
High Performance IP Routing Table Lookup using CPU Caching. INFOCOM 1999: 1421-1428 - [c52]Tulika Mitra, Tzi-cker Chiueh:
Dynamic 3D Graphics Workload Characterization and the Architectural Implications. MICRO 1999: 62-71 - [c51]Anindya Neogi, Ashish Raniwala, Tzi-cker Chiueh:
Phoenix: a low-power fault-tolerant real-time network-attached storage device. ACM Multimedia (1) 1999: 447-456 - [c50]Tzi-cker Chiueh, Ganesh Venkitachalam, Prashant Pradhan:
Integrating segmentation and paging protection for safe, efficient and transparent software extensions. SOSP 1999: 140-153 - 1998
- [c49]Tzi-cker Chiueh, Allen Ballman, Kevin Kreeger:
Multi-Resolution Indexing for Shape Images. CIKM 1998: 297-305 - [c48]Tulika Mitra, Tzi-cker Chiueh:
A Breadth-First Approach To Efficient Mesh Traversal. Workshop on Graphics Hardware 1998: 31-37 - [c47]Srinidhi Varadarajan, Tzi-cker Chiueh:
EtheReal: A Host-Transparent Real-Time Fast Ethernet Switch. ICNP 1998: 12-21 - [c46]Tzi-cker Chiueh, Dimitris Margaritis, Srinidhi Varadarajan:
Design, Implementation, and Evaluation of a Parallel Index Server for Shape Image Database. ICPADS 1998: 42-49 - [c45]Tulika Mitra, Tzi-cker Chiueh:
Implementation and Evaluation of the Parallel Mesa Library. ICPADS 1998: 84-91 - [c44]Manish Verma, Tzi-cker Chiueh:
Implementation and Performance Evaluation of Locust. ICPP 1998: 96-105 - [c43]Tzi-cker Chiueh, Michael Vernick:
An Empirical Study of Admission Control Strategies in Video Servers. ICPP 1998: 313-320 - [c42]Tzi-cker Chiueh, Michael Vernick, Chitra Venkatramani:
Performance Evaluation of the Stony Brook Video Server. ICPP Workshops 1998: 48-57 - [c41]Tzi-cker Chiueh, Tulika Mitra
, Anindya Neogi, Chuan-Kai Yang:
Zodiac: A History-Based Interactive Video Authoring System. ACM Multimedia 1998: 435-444 - [c40]Prashant Pradhan, Tzi-cker Chiueh:
Real-Time Performance Guarantees over Wired/Wireless LANs. IEEE Real Time Technology and Applications Symposium 1998: 29-38 - [c39]Tzi-cker Chiueh, Anindya Neogi, Paul A. Stirpe:
Performance Analysis of an RSVP-Capable Router. IEEE Real Time Technology and Applications Symposium 1998: 39-48 - 1997
- [j4]Tzi-cker Chiueh:
Chitra Venkatramani, Michael Vernick: Design and Implementation of the Stony Brook Video Server. Softw. Pract. Exp. 27(2): 139-154 (1997) - [c38]Tzi-cker Chiueh, Wei-Jen Lin:
Characterization of Static 3D Graphics Workloads. Workshop on Graphics Hardware 1997: 17-23 - [c37]Tzi-cker Chiueh:
Heresy: A Virtual Image-Space 3D Rasterization Architecture. Workshop on Graphics Hardware 1997: 69-77 - [c36]Tzi-cker Chiueh:
Distributed Systems Support for Networked Games. Workshop on Hot Topics in Operating Systems 1997: 99-104 - [c35]T. Niranjan, Tzi-cker Chiueh, Gerhard A. Schloss:
Implementation and Evaluation of a Multimedia File System. ICMCS 1997: 269-276 - [c34]Chitra Venkatramani, Tzi-cker Chiueh:
Design and implementation of a real-time switch for segmented Ethernets. ICNP 1997: 152- - [c33]Tzi-cker Chiueh, Kwan-Liu Ma:
A Parallel Pipelined Renderer for Time-Varying Volume Data. ISPAN 1997: 9-15 - [c32]Tzi-cker Chiueh, Srinidhi Varadarajan:
Design and Evaluation of a DRAM-based Shared Memory ATM Switch. SIGMETRICS 1997: 248-259 - [c31]Srinidhi Varadarajan, Tzi-cker Chiueh:
SASE: Implementation of a Compressed Text Search Engine. USENIX Symposium on Internet Technologies and Systems 1997 - [c30]Tzi-cker Chiueh, Chuan-Kai Yang, Taosong He, Hanspeter Pfister, Arie E. Kaufman:
Integrated volume compression and visualization. IEEE Visualization 1997: 329-336 - 1996
- [c29]Tzi-cker Chiueh, Peitao Deng:
Evaluation of Checkpoint Mechanisms for Massively Parallel Machines. FTCS 1996: 370-379 - [c28]Tzi-cker Chiueh, L.-C. Chang:
Burst Handling of Digital Video Traffic. ICMCS 1996: 549-556 - [c27]Michael Vernick, Chitra Venkatramani, Tzi-cker Chiueh:
Adventures in Building the Stony Brook Video Server. ACM Multimedia 1996: 287-295 - 1995
- [c26]Tzi-cker Chiueh, Manish Verma:
A Compiler-Directed Distributed Shared Memory System. International Conference on Supercomputing 1995: 77-86 - [c25]Tzi-cker Chiueh:
Performance Optimization for Parallel Tape Arrays. International Conference on Supercomputing 1995: 375-384 - [c24]Chitra Venkatramani, Tzi-cker Chiueh:
Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol. SIGCOMM 1995: 27-37 - [c23]Hanspeter Pfister
, Arie E. Kaufman, Tzi-cker Chiueh:
Cube-3: A Real-Time Architecture for High-Resolution Volume Visualization. VVS 1995: 75-82 - 1994
- [c22]Tzi-cker Chiueh, Randy H. Katz:
Papyrus: A History-Based VLSI Design Process Management System. ICDE 1994: 385-392 - [c21]Tzi-cker Chiueh, Manish Verma, Sanjay A. Padubidri:
Efficient implementation techniques for vector memory systems. ISPAN 1994: 270-277 - [c20]Chitra Venkatramani, Tzi-cker Chiueh:
Supporting Real-Time Traffic on Ethernet. RTSS 1994: 282-286 - [c19]Tzi-cker Chiueh:
Sunder: a programmable hardware prefetch architecture for numerical loops. SC 1994: 488-497 - [c18]Tzi-cker Chiueh:
Content-Based Image Indexing. VLDB 1994: 582-593 - 1993
- [j3]Tzi-cker Chiueh:
Polar: A Storage Architecture for Fast Checkpointing. J. Inf. Sci. Eng. 9(1): 61-80 (1993) - [j2]Tzi-cker Chiueh, Randy H. Katz:
A History Approach of Automatic Relationships Establisment for VLSI Design Database. IEEE Trans. Knowl. Data Eng. 5(6): 987-990 (1993) - [c17]Tzi-cker Chiueh:
A Vector Memory System Based on Wafer-Scale Integrated Memory Arrays. ICCD 1993: 284-288 - [c16]Tzi-cker Chiueh:
Trail: A Track-Based Logging Disk Architecture for Zero-Overhead Writes. ICCD 1993: 339-343 - [c15]Tzi-cker Chiueh:
A Generational Algorithm to Multiprocessor Cache Coherence. ICPP (1) 1993: 20-24 - [c14]Tzi-cker Chiueh, Randy H. Katz:
Multi-Resolution Video Representation for Parallel Disk Arrays. ACM Multimedia 1993: 401-409 - [c13]Tzi-cker Chiueh:
A novel memory access mechanism for arbitrary-view-projection volume rendering. SC 1993: 690-698 - 1992
- [j1]Tzi-cker Chiueh:
Optimization of Fuzzy Logic Inference Architecture. Computer 25(5): 6771 (1992) - [c12]Tzi-cker Chiueh, Randy H. Katz:
Eliminating the Address Translation Bottleneck for Physical Address Cache. ASPLOS 1992: 137-148 - [c11]Tzi-cker Chiueh:
A Case for Wafer-Scale Interconnected Memory Arrays. SC 1992: 468-477 - 1991
- [c10]Tzi-cker Chiueh, Randy H. Katz:
Papyrus: A Structured History Database for VLSI Design Flow Management. DASFAA 1991: 293-301 - [c9]Tzi-cker Chiueh:
HERESY: a hybrid approach to automatic schematic generation. EURO-DAC 1991: 419-423 - [c8]Tzi-cker Chiueh:
An Architectural Technique for Cache-level Garbage Collection. FPCA 1991: 520-537 - [c7]Tzi-cker Chiueh:
Liger: A Hybrid Dataflow Architeture Exploiting Data/Control Locality. ICPP (1) 1991: 346-350 - [c6]Tzi-cker Chiueh:
Multi-Threaded Vectorization. ISCA 1991: 352-361 - [c5]Tzi-cker Chiueh:
Optimization of Fuzzy Logic Implementation. ISMVL 1991: 348-355 - [c4]Tzi-cker Chiueh:
An integrated memory management scheme for dynamic alias resolution. SC 1991: 682-691 - [c3]Tzi-cker Chiueh, Randy H. Katz:
Trait: An Attribute Management System for VLSI Design Objects. SIGMOD Conference 1991: 228-237 - 1990
- [c2]Tzi-cker Chiueh, Randy H. Katz:
A History Model for Managing the VLSI Design Process. ICCAD 1990: 358-361
1980 – 1989
- 1989
- [c1]Tzi-cker Chiueh, Randy H. Katz, Valerie King:
Managing the VLSI Design Process. MIT-JSME Workshop 1989: 183-199
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint