default search action
Gyungho Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1986
- [b1]Gyungho Lee:
Some Issues in General-Purpose Shared Memory Multiprocessing: Parallelism Exploitation and Memory Access Combining (Shared Memory Machine, Automatic Restructuring). University of Illinois Urbana-Champaign, USA, 1986
Journal Articles
- 2019
- [j30]Yongsuk Lee, Gyungho Lee:
HW-CDI: Hard-Wired Control Data Integrity. IEEE Access 7: 10811-10822 (2019) - [j29]Hyungyu Lee, Changwoo Pyo, Gyungho Lee:
Dynamic reencryption of return addresses. IET Inf. Secur. 13(1): 76-85 (2019) - 2018
- [j28]Yongsuk Lee, Gyungho Lee:
Detecting Code Reuse Attacks with Branch Prediction. Computer 51(4): 40-47 (2018) - 2015
- [j27]Dongkyun Ahn, Gyungho Lee:
A Memory-Access Validation Scheme against Payload Injection Attacks. IEEE Trans. Dependable Secur. Comput. 12(4): 387-399 (2015) - 2014
- [j26]Youngjung Ahn, Yongsuk Lee, Jin-Young Choi, Gyungho Lee, Dongkyun Ahn:
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks. Computer 47(7): 66-72 (2014) - 2012
- [j25]Gyungho Lee:
Special section: Trusting software behavior. Future Gener. Comput. Syst. 28(8): 1236-1237 (2012) - 2010
- [j24]Hui Lin, Gyungho Lee:
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace. J. Information Security 1(1): 1-10 (2010) - [j23]Gyungho Lee, Yixin Shi:
Erratum to "Access region cache with register guided memory reference partitioning" [Journal of Systems Architecture 55 (2009) 434-445]. J. Syst. Archit. 56(1): 75 (2010) - 2009
- [j22]Gyungho Lee, Yixin Shi:
Access region cache with register guided memory reference partitioning. J. Syst. Archit. 55(10-12): 434-445 (2009) - [j21]Gyungho Lee, Yixin Shi, Hui Lin:
Indirect Branch Validation Unit. Microprocess. Microsystems 33(7-8): 461-468 (2009) - 2006
- [j20]Yong-Joon Park, Zhao Zhang, Gyungho Lee:
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks. IEEE Micro 26(4): 62-71 (2006) - 2005
- [j19]Jinseok Kong, Pen-Chung Yew, Gyungho Lee:
Minimizing the Directory Size for Large-Scale Shared-Memory Multiprocessors. IEICE Trans. Inf. Syst. 88-D(11): 2533-2543 (2005) - [j18]Lan Li, Gyungho Lee:
DDoS Attack Detection and Wavelets. Telecommun. Syst. 28(3-4): 435-451 (2005) - 2004
- [j17]Jinseok Kong, Gyungho Lee:
Binding Time in Distributed Shared Memories for Generic Patterns of Memory References. IEICE Trans. Inf. Syst. 87-D(8): 2148-2151 (2004) - 2003
- [j16]Bhooshan S. Thakar, Sun Kyu Park, Gyungho Lee:
A scalable multi-porting solution for future wide-issue processors. Microprocess. Microsystems 27(3): 141-149 (2003) - 2001
- [j15]Sangyeun Cho, Pen-Chung Yew, Gyungho Lee:
A High-Bandwidth Memory Pipeline for Wide Issue Processors. IEEE Trans. Computers 50(7): 709-723 (2001) - 2000
- [j14]Akhilesh Tyagi, Gyungho Lee:
A compiler optimization paradigm for dynamic energy management. SIGARCH Comput. Archit. News 28(1): 72-76 (2000) - 1999
- [j13]Sangyeun Cho, Jinseok Kong, Gyungho Lee:
Coherence and Replacement Protocol of DICE-A Bus-Based COMA Multiprocessor. J. Parallel Distributed Comput. 57(1): 14-32 (1999) - [j12]Gyungho Lee, Bland Quattlebaum, Sangyeun Cho, Larry L. Kinney:
Design of a bus-based shared-memory multiprocessor DICE. Microprocess. Microsystems 22(7): 403-411 (1999) - 1998
- [j11]Gyungho Lee, Byung-Chang Kang:
Limited Combining Strategies for Large-Scale Shared-Memory Multiprocessors. J. Parallel Distributed Comput. 52(2): 109-119 (1998) - [j10]Gyungho Lee, Jinseok Kong:
Prospects of distributed shared memory for reducing global traffic in shared-bus multiprocessors. J. Syst. Archit. 44(11): 867-872 (1998) - [j9]Sangyeun Cho, Jinseok Kong, Gyungho Lee:
On timing constraints of snooping in a bus-based COMA multiprocessor. Microprocess. Microsystems 21(5): 313-318 (1998) - 1997
- [j8]Young-Keun Park, Gyungho Lee:
NN Based ATM Cell Scheduling with Queue Length-Based Priority Scheme. IEEE J. Sel. Areas Commun. 15(2): 261-270 (1997) - 1995
- [j7]Young-Keun Park, Gyungho Lee:
Applications of neural networks in high-speed communication networks. IEEE Commun. Mag. 33(10): 68-74 (1995) - [j6]Gyungho Lee:
Parallelizing Iterative Loops with Conditional Branching. IEEE Trans. Parallel Distributed Syst. 6(2): 185-189 (1995) - [j5]Gyungho Lee, Byung-Chang Kang, Richard Y. Kain:
Analysis of Finite Buffered Multistage Combining Networks. IEEE Trans. Parallel Distributed Syst. 6(7): 760-766 (1995) - 1994
- [j4]Gyungho Lee, Clyde P. Kruskal, David J. Kuck:
On the Effectiveness of Combining in Resolving "Hot Spot" Contention. J. Parallel Distributed Comput. 20(2): 136-144 (1994) - [j3]Young-Keun Park, Vladimir Cherkassky, Gyungho Lee:
Omega network-based ATM switch with neural network-controlled bypass queueing and multiplexing. IEEE J. Sel. Areas Commun. 12(9): 1471-1480 (1994) - 1989
- [j2]Gyungho Lee:
A Performance Bound of Multistage Combining Networks. IEEE Trans. Computers 38(10): 1387-1395 (1989) - 1985
- [j1]Gyungho Lee, Clyde P. Kruskal, David J. Kuck:
An Empirical Study of Automatic Restructuring of Nonnumerical Programs for Parallel Processors. IEEE Trans. Computers 34(10): 927-933 (1985)
Conference and Workshop Papers
- 2012
- [c41]Dongkyun Ahn, Gyungho Lee:
A Memory Access Validation Scheme against Payload Injection Attacks. RAID 2012: 107-126 - 2010
- [c40]Dongkyun Ahn, Gyungho Lee:
Countering code injection attacks with TLB and I/O monitoring. ICCD 2010: 370-375 - [c39]Dongkyun Ahn, Gyungho Lee:
Prospect of Fine Grain Dynamic Memory Access Control with Profiling. SECURWARE 2010: 69-74 - 2009
- [c38]Dongkyun Ahn, Gyungho Lee:
StackLock with simple FSM. EIT 2009: 46-51 - 2007
- [c37]Yong-Joon Park, Zhao Zhang, Gyungho Lee:
An Efficient Hardware Support for Control Data Validation. ASAP 2007: 409-414 - [c36]Yixin Shi, Gyungho Lee:
Augmenting Branch Predictor to Secure Program Execution. DSN 2007: 10-19 - 2006
- [c35]Yixin Shi, Sean Dempsey, Gyungho Lee:
Architectural Support for Run-Time Validation of Control Flow Transfer. ICCD 2006: 506-513 - 2005
- [c34]Enrico Ng, Gyungho Lee:
Eliminating Sorting in IP Lookup Devices using Partitioned Table. ASAP 2005: 119-126 - [c33]Yixin Shi, Gyungho Lee:
Dynamic Partition of Memory Reference Instructions - A Register Guided Approach. Euro-Par 2005: 508-518 - 2004
- [c32]Yong-Joon Park, Gyungho Lee:
Repairing return address stack for buffer overflow protection. Conf. Computing Frontiers 2004: 335-342 - [c31]Changwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee:
Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects. ITCC (1) 2004: 50- - 2003
- [c30]Lan Li, Gyungho Lee:
DDoS attack detection and wavelets. ICCCN 2003: 421-427 - [c29]Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee:
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. ISC 2003: 366-380 - 2002
- [c28]Changwoo Pyo, Gyungho Lee:
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. ICICS 2002: 25-36 - 2001
- [c27]Zhiyuan Li, Junjie Gu, Gyungho Lee:
Interprocedural Analysis Based on Guarded Array Regions. Compiler Optimizations for Scalable Parallel Systems Languages 2001: 221-246 - [c26]Bhooshan S. Thakar, Gyungho Lee:
Access Region Cache: A Multi-Porting Solution for Future Wide-Issue Processors. ICCD 2001: 293-301 - [c25]Pipat Reungsang, Sun Kyu Park, Seh-Woong Jeong, Hyung-Lae Roh, Gyungho Lee:
Reducing Cache Pollution of Prefetching in a Small Data Cache. ICCD 2001: 530-533 - [c24]Rajesh Ramanujam, Murali Ravirala, Gyungho Lee:
Alloyed Path-pattern Scheme for Branch Prediction. ICCD 2001: 534-537 - 2000
- [c23]Gyungho Lee, Akhilesh Tyagi:
Encoded Program Counter: Self-Protection from Buffer Overflow Attacks. International Conference on Internet Computing 2000: 387-394 - [c22]Gyungho Lee, Akhilesh Tyagi:
Instruction-level Distributed Microarchitecture Based on Data Decoupling. PDPTA 2000 - 1999
- [c21]Sangyeun Cho, Pen-Chung Yew, Gyungho Lee:
Decoupling Local Variable Accesses in a Wide-Issue Superscalar Processor. ISCA 1999: 100-110 - [c20]Sangyeun Cho, Pen-Chung Yew, Gyungho Lee:
Access Region Locality for High-Bandwidth Processor Memory System Design. MICRO 1999: 136-146 - 1998
- [c19]Jinseok Kong, Gyungho Lee:
Binding Time in Distributed Shared Memory Architectures. ICPP 1998: 198-206 - 1997
- [c18]Junjie Gu, Zhiyuan Li, Gyungho Lee:
Experience with Efficient Array Data-Flow Analysis for Array Privatization. PPoPP 1997: 157-167 - 1996
- [c17]Jinseok Kong, Gyungho Lee:
Relaxing the Inclusion Property in Cache Only Memory Architecture. Euro-Par, Vol. II 1996: 435-444 - [c16]Sangyeun Cho, Gyungho Lee:
Reducing Coherence Overhead in Shared-Bus Multiprocessors. Euro-Par, Vol. II 1996: 492-497 - [c15]Gyungho Lee, Bland Quattlebaum, Sangyeun Cho, Larry L. Kinney:
Global Bus Design of a Bus-Based COMA Multiprocessor DICE. ICCD 1996: 231-240 - 1995
- [c14]Young-Keun Park, Gyungho Lee:
Intelligent Congestion Control in ATM Networks. FTDCS 1995: 369-375 - [c13]Young-Keun Park, Gyungho Lee:
ATM cell scheduling with queue length-based priority scheme. ICCCN 1995: 671 - [c12]Gyungho Lee:
An assessment of COMA multiprocessors. IPPS 1995: 388-392 - [c11]Gyungho Lee, Sujat Jamil:
Memory Block Relocation in Cache-Only Memory Multiprocessors. Parallel and Distributed Computing and Systems 1995: 75-77 - [c10]Junjie Gu, Zhiyuan Li, Gyungho Lee:
Symbolic Array Dataflow Analysis for Array Privatization and Program Parallelization. SC 1995: 47 - 1994
- [c9]Young-Keun Park, Gyungho Lee:
A High Throughput Packet-Switching Network with Neural Network Controlled Bypass Queueing and Multiplexing. ICPP (1) 1994: 9-12 - 1991
- [c8]Byung-Chang Kang, Gyungho Lee, Richard Y. Kain:
Performance of Multistage Combining Networks. ICPP (1) 1991: 550-553 - [c7]Byung-Chang Kang, Gyungho Lee, Richard Y. Kain:
A performance bound analysis of multistage combining networks using a probabilistic model. ICS 1991: 448-457 - 1988
- [c6]Gyungho Lee:
Automatic Restructuring of Conditional Cyclic Loops. ICPP (2) 1988: 42-45 - [c5]Gyungho Lee, Sizheng Wei:
Design and Analysis of A Fault-Tolerant Multistage Interconnection Network for Large-Scale Shared Memory Parallel Computers. ICPP (1) 1988: 201-204 - [c4]Sizheng Wei, Gyungho Lee:
Extra Group Network: A Cost-Effective Fault-Tolerant Multistage Interconnection Network. ISCA 1988: 108-115 - 1987
- [c3]Gyungho Lee:
Another Combining Scheme to Reduce Hot Spot Contention in Large Scale Shared Memory Parallel Computers. ICS 1987: 68-79 - 1986
- [c2]Gyungho Lee, Clyde P. Kruskal, David J. Kuck:
The Effectiveness of Combining in Shared Memory Parallel Computer in the Presence of "Hot Spots". ICPP 1986: 35-41 - 1985
- [c1]Gyungho Lee, Clyde P. Kruskal, David J. Kuck:
The Effectiveness of Automatic Restructuring on Nonnumerical Programs. ICPP 1985: 607-613
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint