default search action
Dhananjay S. Phatak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j20]Alan T. Sherman, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. IEEE Secur. Priv. 17(6): 77-83 (2019) - [i5]Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. CoRR abs/1901.09286 (2019) - [i4]Dhananjay S. Phatak, Alan T. Sherman, Steven D. Houston, Andrew Henry:
PPT: New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues. A Set of Three Companion Manuscripts. CoRR abs/1908.06964 (2019) - 2018
- [j19]Alan T. Sherman, David DeLatte, Michael Neary, Linda Oliva, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Julia Thompson:
Cybersecurity: Exploring core concepts through six scenarios. Cryptologia 42(4): 337-377 (2018) - [j18]Geet Parekh, David DeLatte, Geoffrey L. Herman, Linda Oliva, Dhananjay S. Phatak, Travis Scheponik, Alan T. Sherman:
Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes. IEEE Trans. Educ. 61(1): 11-20 (2018) - 2017
- [i3]Alan T. Sherman, Linda Oliva, David DeLatte, Enis Golaszewski, Michael Neary, Konstantinos Patsourakos, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Julia Thompson:
Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project. CoRR abs/1706.05092 (2017) - 2016
- [j17]Dhananjay S. Phatak, Steven D. Houston:
New distributed algorithms for fast sign detection in residue number systems (RNS). J. Parallel Distributed Comput. 97: 78-95 (2016) - [c21]Travis Scheponik, Alan T. Sherman, David DeLatte, Dhananjay S. Phatak, Linda Oliva, Julia Thompson, Geoffrey L. Herman:
How students reason about Cybersecurity concepts. FIE 2016: 1-5 - 2014
- [i2]Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Y. A. Ryan, Konstantinos Kalpakis:
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptol. ePrint Arch. 2014: 670 (2014) - [i1]Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman:
A Preliminary FPGA Implementation and Analysis of Phatak's Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System. IACR Cryptol. ePrint Arch. 2014: 1009 (2014) - 2013
- [j16]Dhananjay S. Phatak, Alan T. Sherman, Nikhil Joshi, Bhushan Sonawane, Vivek G. Relan, Amol Dawalbhakta:
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense. J. Comput. Secur. 21(2): 233-281 (2013) - [c20]Michael Oehler, Dhananjay S. Phatak:
A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching. DPM/SETOP 2013: 353-361 - [c19]Michael Oehler, Dhananjay S. Phatak:
A Conjunction for Private Stream Searching. SocialCom 2013: 441-447 - 2012
- [j15]Alan T. Sherman, Dhananjay S. Phatak, Vivek G. Relan, Bhushan Sonawane:
Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies. Cryptologia 36(2): 129-148 (2012) - 2011
- [c18]Dhananjay S. Phatak, Alan T. Sherman, John Pinkston:
A New Paradigm to Approximate Oblivious Data Processing (ODP) for Data Confidentiality in Cloud Computing. SERVICES 2011: 391-398 - 2010
- [c17]F. John Krautheim, Dhananjay S. Phatak, Alan T. Sherman:
Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. TRUST 2010: 211-227 - [c16]Michael Oehler, Dhananjay S. Phatak, F. John Krautheim:
Visualizing your key for secure phone calls and language independence. VizSEC 2010: 64-69
2000 – 2009
- 2006
- [j14]Abhishek Singh, Jim Plusquellic, Dhananjay S. Phatak, Chintan Patel:
Defect Simulation Methodology for iDDT Testing. J. Electron. Test. 22(3): 255-272 (2006) - [j13]Rory G. Mulvaney, Dhananjay S. Phatak:
Generalized haar DWT and transformations between decision trees and neural networks. IEEE Trans. Neural Networks 17(1): 81-93 (2006) - 2005
- [j12]Elko B. Tchernev, Rory G. Mulvaney, Dhananjay S. Phatak:
Investigating the Fault Tolerance of Neural Networks. Neural Comput. 17(7): 1646-1664 (2005) - [j11]Elko B. Tchernev, Rory G. Mulvaney, Dhananjay S. Phatak:
Perfect Fault Tolerance of the n-k-n Network. Neural Comput. 17(9): 1911-1920 (2005) - [c15]Dhananjay S. Phatak, Tom Goff:
Fast Modular Reduction for Large Wordlengths via One Linear and One Cyclic Convolution. IEEE Symposium on Computer Arithmetic 2005: 179-186 - [c14]Dhananjay S. Phatak:
Spread-Identity mechanisms for DOS resilience and Security. SecureComm 2005: 23-34 - 2004
- [j10]Tom Goff, Dhananjay S. Phatak:
Unified transport layer support for data striping and host mobility. IEEE J. Sel. Areas Commun. 22(4): 737-746 (2004) - 2003
- [j9]Dhananjay S. Phatak, Tom Goff, Jim Plusquellic:
IP-in-IP tunneling to enable the simultaneous use of multiple IP interfaces for network level connection striping. Comput. Networks 43(6): 787-804 (2003) - [j8]Tom Goff, Nael B. Abu-Ghazaleh, Dhananjay S. Phatak, Ridvan Kahvecioglu:
Preemptive routing in ad hoc networks. J. Parallel Distributed Comput. 63(2): 123-140 (2003) - [c13]Abhishek Singh, Dhananjay S. Phatak, Tom Goff, Mike Riggs, James F. Plusquellic, Chintan Patel:
Comparison of Branching CORDIC Implementations. ASAP 2003: 215-225 - 2002
- [c12]Dhananjay S. Phatak, Rory G. Mulvaney:
Clustering for personalized mobile Web usage. FUZZ-IEEE 2002: 705-710 - [c11]Dhananjay S. Phatak, Tom Goff:
A Novel Mechanism for Data Streaming Across Multiple IP Links for Improving Throughput and Reliability in Mobile Environments. INFOCOM 2002: 773-781 - [c10]Bhagyalaxmi Bethala, Anupam Joshi, Dhananjay S. Phatak, Sasikanth Avancha, Tom Goff:
Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs. PDPTA 2002: 918-922 - [c9]Nael B. Abu-Ghazaleh, Dhananjay S. Phatak:
Verification caching: towards efficient and secure mobile code execution environments. SAC 2002: 964-968 - 2001
- [j7]Dhananjay S. Phatak, Tom Goff, Israel Koren:
Constant-Time Addition and Simultaneous Format Conversion Based on Redundant Binary Representations. IEEE Trans. Computers 50(11): 1267-1278 (2001) - [c8]Tom Goff, Nael B. Abu-Ghazaleh, Dhananjay S. Phatak:
Analysis of TCP Performance on Wireless Ad Hoc Networks Utilizing Preemptive Maintenance Routing. ICPP 2001: 232-239 - [c7]Tom Goff, Nael B. Abu-Ghazaleh, Dhananjay S. Phatak, Ridvan Kahvecioglu:
Preemptive routing in Ad Hoc networks. MobiCom 2001: 43-52 - 2000
- [c6]Ajit T. Dingankar, Dhananjay S. Phatak:
Simultaneous Approximation with Neural Networks. IJCNN (4) 2000: 232-237 - [c5]Tom Goff, James Moronski, Dhananjay S. Phatak, Vipul Gupta:
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments. INFOCOM 2000: 1537-1545
1990 – 1999
- 1999
- [c4]Dhananjay S. Phatak, Israel Koren:
Intermediate Variable Encodings that Enable Multiplexor-Based Implementations of Two Operand Addition. IEEE Symposium on Computer Arithmetic 1999: 22-29 - [c3]Jeng-Jong J. Lue, Dhananjay S. Phatak:
Area x Delay (A T) Efficient Multiplier Based on an Intermediate Hybrid Signed-Digit (HSD-1) Representation. IEEE Symposium on Computer Arithmetic 1999: 216-224 - [c2]Dhananjay S. Phatak:
Relationship between fault tolerance, generalization and the Vapnik-Chervonenkis (VC) dimension of feedforward ANNs. IJCNN 1999: 705-709 - 1998
- [j6]Dhananjay S. Phatak:
Double Step Branching CORDIC: A New Algorithm for Fast Sine and Cosine Generation. IEEE Trans. Computers 47(5): 587-602 (1998) - [j5]Dhananjay S. Phatak:
Comments on Duprat and Muller's Branching CORDIC Paper. IEEE Trans. Computers 47(9): 1037-1040 (1998) - 1995
- [j4]Dhananjay S. Phatak, Israel Koren:
Complete and partial fault tolerance of feedforward neural nets. IEEE Trans. Neural Networks 6(2): 446-456 (1995) - 1994
- [j3]Dhananjay S. Phatak, Israel Koren:
Hybrid Signed-Digit Number Systems: A Unified Framework for Redundant Number Representations With Bounded Carry Propagation Chains. IEEE Trans. Computers 43(8): 880-891 (1994) - [j2]Dhananjay S. Phatak, Israel Koren:
Connectivity and performance tradeoffs in the cascade correlation learning architecture. IEEE Trans. Neural Networks 5(6): 930-935 (1994) - 1993
- [j1]Dhananjay S. Phatak, Hoon Choi, Israel Koren:
Construction of Minimal n-2-n Encoders for Any n. Neural Comput. 5(5): 783-794 (1993) - [c1]Dhananjay S. Phatak, Israel Koren, Hoon Choi:
Hybrid Number Representations with Bounded Carry Propagation Chains. ICCD 1993: 272-275
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint