2008 |
13 | EE | Ming-Yung Ko,
Chung-Ching Shen,
Shuvra S. Bhattacharyya:
Memory-constrained Block Processing for DSP Software Optimization.
Signal Processing Systems 50(2): 163-177 (2008) |
2007 |
12 | EE | Chia-Jui Hsu,
Ming-Yung Ko,
Shuvra S. Bhattacharyya,
Suren Ramasubbu,
José Luis Pino:
Efficient simulation of critical synchronous dataflow graphs.
ACM Trans. Design Autom. Electr. Syst. 12(3): (2007) |
11 | EE | Ming-Yung Ko,
Praveen K. Murthy,
Shuvra S. Bhattacharyya:
Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls.
ACM Trans. Embedded Comput. Syst. 6(2): (2007) |
10 | EE | Ming-Yung Ko,
Claudiu Zissulescu,
Sebastian Puthenpurayil,
Shuvra S. Bhattacharyya,
Bart Kienhuis,
Ed F. Deprettere:
Parameterized Looped Schedules for Compact Representation of Execution Sequences in DSP Hardware and Software Implementation.
IEEE Transactions on Signal Processing 55(6-2): 3126-3138 (2007) |
2006 |
9 | EE | Ming-Yung Ko,
Claudiu Zissulescu,
Sebastian Puthenpurayil:
Parameterized Looped Schedules for Compact Representationof Execution Sequences.
ASAP 2006: 223-230 |
8 | EE | Chia-Jui Hsu,
Suren Ramasubbu,
Ming-Yung Ko,
José Luis Pino,
Shuvra S. Bhattacharyya:
Efficient simulation of critical synchronous dataflow graphs.
DAC 2006: 893-898 |
7 | EE | Ming-Yung Ko,
Chung-Ching Shen,
Shuvra S. Bhattacharyya:
Memory-constrained Block Processing Optimization for Synthesis of DSP Software.
ICSAMOS 2006: 137-143 |
2004 |
6 | EE | Chia-Jui Hsu,
Fuat Keceli,
Ming-Yung Ko,
Shahrooz Shahparnia,
Shuvra S. Bhattacharyya:
DIF: An Interchange Format for Dataflow-Based Design Tools.
SAMOS 2004: 423-432 |
5 | EE | Ming-Yung Ko,
Praveen K. Murthy,
Shuvra S. Bhattacharyya:
Compact Procedural Implementation in DSP Software Synthesis Through Recursive Graph Decomposition.
SCOPES 2004: 47-61 |
2003 |
4 | EE | Ming-Yung Ko,
Shuvra S. Bhattacharyya:
Partitioning for DSP Software Synthesis.
SCOPES 2003: 344-358 |
1995 |
3 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chih-Hung Wang,
Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system.
Computer Communications 18(12): 978-981 (1995) |
2 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chuan-Ming Li,
Ming-Yung Ko,
Yung-Hsiang Chen:
Two Attacks on Neuman-Stubblebine Authentication Protocols.
Inf. Process. Lett. 53(2): 103-107 (1995) |
1994 |
1 | EE | Ming-Yung Ko,
Tzonelih Hwang,
Chin-Chen Chang:
Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem.
Computer Communications 17(9): 674-676 (1994) |