Jayantha A. Herath

According to our database1, Jayantha A. Herath authored at least 18 papers between 1984 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Cryptographic algorithms to spatial circuit transformation in an active learning module to enhance the information assurance and security curriculum.
J. Comput. Sci. Coll., 2008

2007
Mathematical modeling of cyber attacks: a learning module to enhance undergraduate security curricula.
J. Comput. Sci. Coll., 2007

Designing computer forensics courses using case studies to enhance computer security curricula.
J. Comput. Sci. Coll., 2007

Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security.
J. Comput. Sci. Coll., 2007

2005
Computer Forensics, Information Security and Law: A Case Study.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

2003
Secret key distribution protocol using public key cryptography.
J. Comput. Sci. Coll., 2003

Integration of computer security laboratories into computer architecture courses to enhance undergraduate education.
Proceedings of the 2003 workshop on Computer architecture education, 2003

2002
An active learning environment for intermediate computer architecture courses.
Proceedings of the 2002 workshop on Computer architecture education, 2002

1994
An Improved Data Flow Architecture for Logic Simulation Acceleration.
VLSI Design, 1994

1992
Algorithmic Transformations for Neural Computing and Performance of Supervised Learning on a Dataflow Machine.
IEEE Trans. Software Eng., 1992

Intelligence Processing Computer Systems - Guest Editor's Introduction.
J. Parallel Distributed Comput., 1992

Computer Architectures for Intelligent Systems - Guest Editor's Introduction to the Special Issue.
Computer, 1992

A logic simulation engine based on a modified data flow architecture.
Proceedings of the 1992 IEEE/ACM International Conference on Computer-Aided Design, 1992

1991
Executing DSP Applications in a Fine-Grained Dataflow Environment.
IEEE Trans. Software Eng., 1991

1988
Dataflow Computing Models, Languages, and Machines for Intelligence Computations.
IEEE Trans. Software Eng., 1988

1987
Dataflow Computing.
Proceedings of the Parallel Algorithms and Architectures, 1987

1986
DBCL: Data-Flow Computing Base Language with n-Value Logic.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986

1984
EM-3: A Lisp-Based Data-Driven Machine.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1984


  Loading...