default search action
V. Lakshmi Narasimhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1989
- [b1]V. Lakshmi Narasimhan:
Design and implementation of a dynamic dataflow array processor system (PATTSY). University of Queensland, Australia, 1989
Journal Articles
- 2021
- [j18]Ambili Thomas, V. Lakshmi Narasimhan:
Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment. Int. J. Nat. Comput. Res. 10(2): 21-41 (2021) - 2008
- [j17]V. Lakshmi Narasimhan, Manik Lal Das:
Data and information security (DIS) for BS and MS programs: a proposal. ACM SIGCSE Bull. 40(4): 95-99 (2008) - 2007
- [j16]V. Lakshmi Narasimhan, B. Hendradjaya:
Some theoretical considerations for a suite of metrics for the integration of software components. Inf. Sci. 177(3): 844-864 (2007) - 2006
- [j15]V. Lakshmi Narasimhan, Shuxin Zhao, Hailong Liang, Shuangyi Zhang:
PROVIDE: A Pedagogical Reference Oracle for Virtual IntegrateD E-ducation. J. Inf. Technol. Educ. 5: 179-199 (2006) - 2005
- [j14]Renyi Zhao, V. Lakshmi Narasimhan:
An Event Algebra Based System for Verifying E-Commerce Transactions. J. Res. Pract. Inf. Technol. 37(4) (2005) - 2004
- [j13]Nicholas Comino, V. Lakshmi Narasimhan:
Response to "Comment on 'A Novel Data Distribution Technique for Host-Client Type Parallel Applications''. IEEE Trans. Parallel Distributed Syst. 15(6): 576- (2004) - 2002
- [j12]Nicholas Comino, V. Lakshmi Narasimhan:
A Novel Data Distribution Technique for Host-Client Type Parallel Applications. IEEE Trans. Parallel Distributed Syst. 13(2): 97-110 (2002) - 1997
- [j11]Matthew J. Gallagher, V. Lakshmi Narasimhan:
ADTEST: A Test Data Generation Suite for Ada Software Systems. IEEE Trans. Software Eng. 23(8): 473-484 (1997) - 1996
- [j10]V. Lakshmi Narasimhan, J. Armstrong:
Performance modelling of three parallel sorting algorithms on a pipelined transputer network. Concurr. Pract. Exp. 8(5): 335-355 (1996) - 1995
- [j9]V. Lakshmi Narasimhan, P. S. Wong:
Solving the Tridiagonal Linear System and Poisson's Equation over a LAN-Based Computing Platform Using Distributed Shared Memory. Inf. Sci. 82(1-2): 1-23 (1995) - [j8]V. Lakshmi Narasimhan, S. Price-White:
Design and implementation of a scalable low-cost shared-memory multiprocessor system using IBM compatible PCs. Microprocess. Microsystems 19(7): 383-394 (1995) - 1994
- [j7]V. Lakshmi Narasimhan, A. C. Lewty:
Distributed event-driven simulation of a novel dynamic dataflow multiprocessor system - PATTSY. Microprocess. Microsystems 18(4): 223-230 (1994) - [j6]V. Lakshmi Narasimhan, K. Wood, Tom Downs:
A four-channel communications arbiter for multiprocessor arrays. Microprocess. Microsystems 18(5): 253-260 (1994) - [j5]Anthony Symons, V. Lakshmi Narasimhan, Kurt Sterzl:
Performance Analysis of a Parallel Fft Algorithm on a Transputer Network. Parallel Algorithms Appl. 4(1-2): 111-124 (1994) - 1993
- [j4]Matthew J. Gallagher, V. Lakshmi Narasimhan:
A software system for the generation of test data for Ada programs. Microprocess. Microprogramming 38(1-5): 637-644 (1993) - [j3]V. Lakshmi Narasimhan, S. Price-White:
Analysis and simulation of six bus arbitration protocols. Microprocess. Microprogramming 38(1-5): 655-662 (1993) - 1991
- [j2]V. Lakshmi Narasimhan, Tom Downs:
Fault tolerant aspects of a dynamic dataflow architecture - PATTSY. Microprocessing and Microprogramming 32(1-5): 243-252 (1991) - 1986
- [j1]V. Lakshmi Narasimhan, J. K. Ramachandra, D. K. Anvekar:
Design and evaluation of a dual-microcomputer shared memory system with a shared I/O bus. Microprocess. Microsystems 10(1): 3-10 (1986)
Conference and Workshop Papers
- 2021
- [c14]Doreen A. Lyimo, V. Lakshmi Narasimhan, Zablon A. Mbero:
Sensitivity Analysis of Coffee Leaf Rust Disease using Three Deep Learning Algorithms. AFRICON 2021: 1-6 - 2020
- [c13]Ambili Thomas, V. Lakshmi Narasimhan:
Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment. FICTA (2) 2020: 207-219 - [c12]V. Lakshmi Narasimhan:
A Variance Model for Risk Assessment During Software Maintenance. FICTA (2) 2020: 229-242 - 2019
- [c11]V. Lakshmi Narasimhan:
Botswana's Lab-In-A-Briefcase: A Position Paper. ACSW 2019: 13:1-13:8 - 2009
- [c10]Liguo Yu, Srini Ramaswamy, R. B. Lenin, V. Lakshmi Narasimhan:
Time series analysis of open-source software projects. ACM Southeast Regional Conference 2009 - 2008
- [c9]Manik Lal Das, V. Lakshmi Narasimhan:
A Simple and Secure Authentication and Key Establishment Protocol. ICETET 2008: 844-849 - [c8]Manik Lal Das, V. Lakshmi Narasimhan:
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. ITNG 2008: 545-550 - [c7]Manik Lal Das, V. Lakshmi Narasimhan:
EARS: Efficient Entity Authentication in Remote Systems. ITNG 2008: 603-608 - 2005
- [c6]Aaron Hector, V. Lakshmi Narasimhan:
A New Classification Scheme for Software Agents. ICITA (1) 2005: 191-196 - 2004
- [c5]V. Lakshmi Narasimhan:
INSECT: an Intelligent Software Exploration and Collaboration Environment. Software Engineering Research and Practice 2004: 352-355 - [c4]V. Lakshmi Narasimhan, B. Hendradjaya:
Component Integration Metrics. Software Engineering Research and Practice 2004: 554-558 - 1996
- [c3]E. Yuen, V. Lakshmi Narasimhan:
An indicator of robustness for distributed databases. ANZIIS 1996: 137-141 - [c2]Stefan Slomka, Pierre Castellano, Peter J. Barger, Sridha Sridharan, V. Lakshmi Narasimhan:
A comparison of Gaussian mixture and multiple binary classifier models for speaker verification. ANZIIS 1996: 316-319 - [c1]Bernard K. Gunther, George Milne, V. Lakshmi Narasimhan:
Assessing document relevance with run-time reconfigurable machines. FCCM 1996: 10-17
Editorship
- 1996
- [e1]V. Lakshmi Narasimhan, Lakhmi C. Jain:
Proceedings of the Australian New Zealand Conference on Intelligent Information Systems, ANZIIS 96, Adelaide, South Australia, 18-20 November 1996. IEEE 1996, ISBN 0-7803-3667-4 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint