The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dhananjay S. Phatak: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jeng-Jong J. Lue, Dhananjay S. Phatak
    Area x Delay (A T) Efficient Multiplier Based on an Intermediate Hybrid Signed-Digit (HSD-1) Representation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 1999, pp:216-224 [Conf]
  2. Dhananjay S. Phatak, Tom Goff
    Fast Modular Reduction for Large Wordlengths via One Linear and One Cyclic Convolution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 2005, pp:179-186 [Conf]
  3. Dhananjay S. Phatak, Israel Koren
    Intermediate Variable Encodings that Enable Multiplexor-Based Implementations of Two Operand Addition. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 1999, pp:22-29 [Conf]
  4. Abhishek Singh, Dhananjay S. Phatak, Tom Goff, Mike Riggs, James F. Plusquellic, Chintan Patel
    Comparison of Branching CORDIC Implementations. [Citation Graph (0, 0)][DBLP]
    ASAP, 2003, pp:215-225 [Conf]
  5. Dhananjay S. Phatak, Israel Koren, Hoon Choi
    Hybrid Number Representations with Bounded Carry Propagation Chains. [Citation Graph (0, 0)][DBLP]
    ICCD, 1993, pp:272-275 [Conf]
  6. Tom Goff, Nael B. Abu-Ghazaleh, Dhananjay S. Phatak
    Analysis of TCP Performance on Wireless Ad Hoc Networks Utilizing Preemptive Maintenance Routing. [Citation Graph (0, 0)][DBLP]
    ICPP, 2001, pp:232-239 [Conf]
  7. Ajit T. Dingankar, Dhananjay S. Phatak
    Simultaneous Approximation with Neural Networks. [Citation Graph (0, 0)][DBLP]
    IJCNN (4), 2000, pp:232-237 [Conf]
  8. Tom Goff, James Moronski, Dhananjay S. Phatak, Vipul Gupta
    Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1537-1545 [Conf]
  9. Dhananjay S. Phatak, Tom Goff
    A Novel Mechanism for Data Streaming Across Multiple IP Links for Improving Throughput and Reliability in Mobile Environments. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  10. Tom Goff, Nael B. Abu-Ghazaleh, Dhananjay S. Phatak, Ridvan Kahvecioglu
    Preemptive routing in Ad Hoc networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:43-52 [Conf]
  11. Bhagyalaxmi Bethala, Anupam Joshi, Dhananjay S. Phatak, Sasikanth Avancha, Tom Goff
    Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:918-922 [Conf]
  12. Nael B. Abu-Ghazaleh, Dhananjay S. Phatak
    Verification caching: towards efficient and secure mobile code execution environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:964-968 [Conf]
  13. Dhananjay S. Phatak, Tom Goff, Jim Plusquellic
    IP-in-IP tunneling to enable the simultaneous use of multiple IP interfaces for network level connection striping. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:43, n:6, pp:787-804 [Journal]
  14. Tom Goff, Nael B. Abu-Ghazaleh, Dhananjay S. Phatak, Ridvan Kahvecioglu
    Preemptive routing in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2003, v:63, n:2, pp:123-140 [Journal]
  15. Elko B. Tchernev, Rory G. Mulvaney, Dhananjay S. Phatak
    Investigating the Fault Tolerance of Neural Networks. [Citation Graph (0, 0)][DBLP]
    Neural Computation, 2005, v:17, n:7, pp:1646-1664 [Journal]
  16. Elko B. Tchernev, Rory G. Mulvaney, Dhananjay S. Phatak
    Perfect Fault Tolerance of the n-k-n Network. [Citation Graph (0, 0)][DBLP]
    Neural Computation, 2005, v:17, n:9, pp:1911-1920 [Journal]
  17. Dhananjay S. Phatak
    Double Step Branching CORDIC: A New Algorithm for Fast Sine and Cosine Generation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:5, pp:587-602 [Journal]
  18. Dhananjay S. Phatak
    Comments on Duprat and Muller's Branching CORDIC Paper. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:9, pp:1037-1040 [Journal]
  19. Dhananjay S. Phatak, Tom Goff, Israel Koren
    Constant-Time Addition and Simultaneous Format Conversion Based on Redundant Binary Representations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2001, v:50, n:11, pp:1267-1278 [Journal]
  20. Dhananjay S. Phatak, Israel Koren
    Hybrid Signed-Digit Number Systems: A Unified Framework for Redundant Number Representations With Bounded Carry Propagation Chains. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1994, v:43, n:8, pp:880-891 [Journal]
  21. Abhishek Singh, Jim Plusquellic, Dhananjay S. Phatak, Chintan Patel
    Defect Simulation Methodology for iDDT Testing. [Citation Graph (0, 0)][DBLP]
    J. Electronic Testing, 2006, v:22, n:3, pp:255-272 [Journal]

  22. Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. [Citation Graph (, )][DBLP]


Search in 0.000secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002