Jed Kao-Tung Chang

According to our database1, Jed Kao-Tung Chang authored at least 10 papers between 2010 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
An Auto-tuning Assisted Power-Aware Study of Iris Matching Algorithm on Intel's SCC.
J. Signal Process. Syst., 2015

2013
A web-based simulator to train students in self-organizing wireless networks.
Proceedings of the 2013 Wireless Telecommunications Symposium, 2013

Using Hardware Acceleration to Improve the Security of Wi-Fi Client Devices.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Enhancement for Potential Target in Cryptography Algorithms by Applying Processor-in-Memory Architecture.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

A Power-Aware Study of Iris Matching Algorithms on Intel's SCC.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

Hardware Acceleration for Cryptography Algorithms by Hotspot Detection.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2011
Workload characterization of cryptography algorithms for hardware acceleration (abstracts only).
SIGMETRICS Perform. Evaluation Rev., 2011

Workload Characterization of Cryptography Algorithms for Hardware Acceleration.
Proceedings of the ICPE'11, 2011

2010
The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010


  Loading...