Freeze-TCP: A true end-to-end TCP enhancement mechanism for mobile environments T Goff, J Moronski, DS Phatak, V Gupta INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and …, 2000 | 750 | 2000 |
Preemptive routing in ad hoc networks T Goff, NB Abu-Ghazaleh, DS Phatak, R Kahvecioglu Proceedings of the 7th annual international conference on Mobile computing …, 2001 | 490 | 2001 |
Complete and partial fault tolerance of feedforward neural nets DS Phatak, I Koren IEEE transactions on neural networks 6 (2), 446-456, 1995 | 222 | 1995 |
A novel mechanism for data streaming across multiple IP links for improving throughput and reliability in mobile environments DS Phatak, T Goff INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002 | 206 | 2002 |
Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing F Krautheim, D Phatak, A Sherman Trust and Trustworthy Computing, 211-227, 2010 | 128 | 2010 |
System, method, and apparata for secure communications using an electrical grid network DS Phatak US Patent 8,639,922, 2014 | 124* | 2014 |
Connectivity and performance tradeoffs in the cascade correlation learning architecture DS Phatak, I Koren IEEE Transactions on Neural Networks 5 (6), 930-935, 1994 | 117 | 1994 |
Hybrid signed-digit number systems: A unified framework for redundant number representations with bounded carry propagation chains DS Phatak, I Koren IEEE Transactions on computers 43 (8), 880-891, 1994 | 108 | 1994 |
Spread identity communications architecture DS Phatak US Patent 7853680, Issued in December 2,010, 2010 | 102 | 2010 |
Investigating the fault tolerance of neural networks EB Tchernev, RG Mulvaney, DS Phatak Neural computation 17 (7), 1646-1664, 2005 | 85 | 2005 |
Identifying core concepts of cybersecurity: Results of two Delphi processes G Parekh, D DeLatte, GL Herman, L Oliva, D Phatak, T Scheponik, ... IEEE Transactions on Education 61 (1), 11-20, 2017 | 82 | 2017 |
Double step branching CORDIC: A new algorithm for fast sine and cosine generation DS Phatak Computers, IEEE Transactions on 47 (5), 587-602, 1998 | 74 | 1998 |
Constant-time addition and simultaneous format conversion based on redundant binary representations DS Phatak, T Goff, I Koren IEEE Transactions on Computers 50 (11), 1267-1278, 2001 | 67 | 2001 |
Dispersion characteristics of optically excited coplanar striplines: comprehensive full-wave analysis DS Phatak, NK Das, AP Defonzo IEEE Transactions on Microwave Theory and Techniques 38 (11), 1719-1730, 1990 | 61 | 1990 |
Dispersion characteristics of optically excited coplanar striplines: Pulse propagation DS Phatak, AP Defonzo IEEE transactions on microwave theory and techniques 38 (5), 654-661, 1990 | 59 | 1990 |
Comparison of branching CORDIC implementations A Singh, DS Phatak, T Goff, M Riggs, J Plusquellic, C Patel Application-Specific Systems, Architectures, and Processors, 2003 …, 2003 | 54* | 2003 |
Cybersecurity: Exploring core concepts through six scenarios AT Sherman, D DeLatte, M Neary, L Oliva, D Phatak, T Scheponik, ... Cryptologia 42 (4), 337-377, 2018 | 46 | 2018 |
IP-in-IP tunneling to enable the simultaneous use of multiple IP interfaces for network level connection striping DS Phatak, T Goff, J Plusquellic Computer Networks 43 (6), 787-804, 2003 | 43 | 2003 |
Unified transport layer support for data striping and host mobility T Goff, DS Phatak IEEE journal on selected areas in communications 22 (4), 737-746, 2004 | 42 | 2004 |
Student misconceptions about cybersecurity concepts: Analysis of think-aloud interviews JD Thompson, GL Herman, T Scheponik, L Oliva, A Sherman, ... Journal of Cybersecurity Education, Research and Practice 2018 (1), 5, 2018 | 40 | 2018 |