default search action
Carla N. Purdy
Person information
- affiliation: University of Cincinnati, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c29]Nawar H. Obeidat, Carla Purdy:
Improving Security in SCADA Systems through Model-checking with TLA+. MWSCAS 2021: 832-835 - [c28]Carla Purdy, John Marty Emmert, Rashmi Jha, Ranga Vemuri:
Educating the Next Generation of Cybersecurity Defenders at the University of Cincinnati. MWSCAS 2021: 836-839 - 2020
- [c27]Nawar H. Obeidat, Carla Purdy:
Modeling a Smart School Building System Using UML and TLA+. ICICT 2020: 131-136 - [c26]John Musgrave, Carla Purdy, Anca L. Ralescu, David Kapp, Temesgen Kebede:
Semantic Feature Discovery of Trojan Malware using Vector Space Kernels. MWSCAS 2020: 494-499 - [c25]Moustapha Fall, Chris Chuvalas, Nolan Warning, Max Rabiee, Carla Purdy:
Enhancing SCADA System Security. MWSCAS 2020: 830-833
2010 – 2019
- 2019
- [c24]Pranay Bhardwaj, Carla Purdy:
System Design Methodologies for Safety and Security of Future Wireless Technologies in Aviation. MWSCAS 2019: 235-238 - 2018
- [c23]Khaled Alrawashdeh, Carla Purdy:
Fast Activation Function Approach for Deep Learning Based Online Anomaly Intrusion Detection. BigDataSecurity/HPSC/IDS 2018: 5-13 - [c22]Jonathan Lockhart, Carla Purdy, Philip A. Wilsey:
Error Analysis and Reliability Metrics for Software in Safety Critical Systems. MWSCAS 2018: 512-515 - 2017
- [c21]Carla Purdy, Yasaswy Kasarabada, George B. Purdy:
Hardware implementation of the Baillie-PSW primality test. MWSCAS 2017: 651-654 - 2016
- [c20]Khaled Alrawashdeh, Carla Purdy:
Toward an Online Anomaly Intrusion Detection System Based on Deep Learning. ICMLA 2016: 195-200 - [c19]Jonathan Lockhart, Carla Purdy, Philip A. Wilsey:
Error analysis and reliability metrics for software in safety critical systems. MWSCAS 2016: 1-4 - 2015
- [c18]Akshata Anil Muddebihal, Carla Purdy:
Design and implementation of area efficient multi-ported memories with write conflict resolution. MWSCAS 2015: 1-4 - 2014
- [c17]Naren Ramesh, George B. Purdy, Carla Purdy, Justin W. Smith:
A hardware implementation of Hough Transform based on parabolic duality. MWSCAS 2014: 145-148 - [c16]Jonathan Lockhart, Carla Purdy, Philip A. Wilsey:
Formal methods for safety critical system specification. MWSCAS 2014: 201-204 - [c15]Carla Purdy, Chandan Singh, Rashna Seli:
Fixing power bugs at RTL stage using PSL assertions. MWSCAS 2014: 218-221 - 2013
- [c14]Steven B. Bibyk, Carla Purdy, Mohammed Ismail:
Welcome to MWSCAS 2013. MWSCAS 2013: 1 - [c13]Anusha Mantha, George B. Purdy, Carla Purdy:
Improving reliability in DNA-based computations. MWSCAS 2013: 1047-1050 - 2012
- [c12]Indira Jayaram, Carla Purdy:
Using constraint graphs to improve embedded systems design. MWSCAS 2012: 594-597 - 2011
- [c11]Harika Korukonda, Carla Purdy:
Support for Agent Based Simulation of Biomolecular Systems. MAICS 2011: 79-84
2000 – 2009
- 2007
- [j6]Vaishali Vallurupalli, Carla Purdy:
Agent-based Modeling and Simulation of Biomolecular Reactions. Scalable Comput. Pract. Exp. 8(2) (2007) - 2004
- [j5]Roshdy S. Youssif, Carla N. Purdy:
Combining genetic algorithms and neural networks to build a signal pattern classifier. Neurocomputing 61: 39-56 (2004) - 2003
- [c10]Roshdy S. Youssif, Carla N. Purdy:
Fuzzy Similarity Measures for Signal Pattern Classification. MAICS 2003: 173-177 - 2002
- [c9]Roshdy S. Youssif, Carla N. Purdy:
Combining Genetic Algorithms and Neural Networks to Build a Signal Pattern Classifier. HIS 2002: 735-744 - 2001
- [c8]James W. Hauser, Carla Neaderhouser Purdy:
Efficient Function Approximation for Embedded and ASIC Applications. ICCD 2001: 507-510 - [c7]Sang-Eon Park, Carla N. Purdy:
Parameterized Mobile Action Generator for a Wireless PCS Network. MASCOTS 2001: 323-330 - [c6]Robert L. Ewing, Gary B. Lamont, C. Brothers, Mark E. Oxley, Carla Purdy, H. Carter, F. Beyette Jr., J. Boyd, Hoda S. Abdel-Aty-Zohdy, Steven B. Bibyk, Y. Zheng, Krishnaprasad Thirunarayan:
An Interactive Video Course in Multidisciplinarity and Collaborative Design for Systems on a Chip. MSE 2001: 87-88 - [c5]Dan Curtin, Gary Lewandowski, Carla N. Purdy, Dennis Gibson, Lisa Meeden:
The nuts and bolts of academic careers: a primer for students and beginning faculty. SIGCSE 2001: 414-415
1990 – 1999
- 1999
- [j4]Dennis Gibson, Carla N. Purdy:
Extracting Behavioral Data from Physical Descriptions of MEMS for Simulation. J. VLSI Signal Process. 22(2): 135-146 (1999) - [c4]Dennis Gibson, Carla N. Purdy, Alva Hare, Fred R. Beyette Jr.:
Design Automation of MEMS Systems Using Behavioral Modeling. Great Lakes Symposium on VLSI 1999: 266-269 - [c3]Fred R. Beyette Jr., Carla N. Purdy:
Tools for Integrating Multidomain Technologies into Microelectronic Circuit Design Curricula. MSE 1999: 86-87 - 1998
- [c2]David Hertweck, Mihaela Nica, Sang-Eon Park, Carla N. Purdy:
Standard Data Representations for VLSI Algorithm Development. Great Lakes Symposium on VLSI 1998: 446-451 - 1997
- [c1]Carla N. Purdy:
Significant microelectronics systems design experience for a heterogeneous class of CS, CE, and EE students. MSE 1997: 143-144 - 1995
- [j3]Carla N. Purdy, R. Swaminathan:
On a characterization of series-parallel graphs. Ars Comb. 41 (1995) - 1990
- [j2]Carla Neaderhouser Purdy, George B. Purdy:
The Area-Time Complexity of the Greatest Common Divisor Problem: A Lower Bound. Inf. Process. Lett. 34(1): 43-46 (1990)
1980 – 1989
- 1987
- [j1]Carla Neaderhouser Purdy, George B. Purdy:
Integer Division in Linear Time with Bounded Fan-In. IEEE Trans. Computers 36(5): 640-644 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint