default search action
Nimal Nissanke
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Riyad Dhuny, Arshad Ahmud Iqbal Peer, Nawaz Ali Mohamudally, Nimal Nissanke:
Performance evaluation of a portable single-board computer as a 3-tiered LAMP stack under 32-bit and 64-bit Operating Systems. Array 15: 100196 (2022) - 2021
- [i3]Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke:
A Fault Tolerant Mechanism for Partitioning and Offloading Framework in Pervasive Environments. CoRR abs/2101.03733 (2021) - 2020
- [i2]Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke:
A Dynamic Load Balancing Algorithm for Distributing Mobile Codes in Multi-Applications and Multi-Hosts Environment. CoRR abs/2008.12385 (2020)
2010 – 2019
- 2019
- [c22]Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke:
Application Partitioning for Offloading in Mobile Pervasive Environments. EUSPN/ICTH 2019: 206-213 - 2016
- [j5]Simeon Veloudis, Nimal Nissanke:
A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models. Comput. J. 59(4): 462-492 (2016) - [c21]Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke:
Partitioning Application Using Graph Theory for Mobile Devices in Pervasive Computing Environments. FNC/MobiSPC 2016: 105-112 - 2015
- [c20]Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke:
A Practical Approach to Partition Applications in Pervasive Computing Environments. FNC/MobiSPC 2015: 74-81 - 2014
- [i1]Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke:
Towards a Generic Application Partitioning and Retraction Framework for Pervasive Environments. CoRR abs/1406.7524 (2014) - 2013
- [c19]Geerish Suddul, Nimal Nissanke, Nawaz Mohamudally:
A pattern based tokenization model for XML parsing on mobile devices. AFRICON 2013: 1-5 - [c18]Geerish Suddul, Nimal Nissanke, Nawaz Mohamudally:
An Effective Approach to Parse SOAP Messages on Mobile Clients. MobiWIS 2013: 9-21 - 2012
- [j4]Fevzi Belli, Mutlu Beyazit, Aditya P. Mathur, Nimal Nissanke:
Modeling, Analysis, and Testing of System Vulnerabilities. Adv. Comput. 84: 39-92 (2012)
2000 – 2009
- 2007
- [c17]Nimal Nissanke:
An integrated security model for component-based systems. ETFA 2007: 638-645 - [c16]Fevzi Belli, Axel Hollmann, Nimal Nissanke:
Modeling, Analysis and Testing of Safety Issues - An Event-Based Approach and Case Study. SAFECOMP 2007: 276-282 - 2005
- [c15]Nimal Nissanke:
Component Security - Issues and an Approach. COMPSAC (2) 2005: 152-155 - [c14]Simeon Veloudis, Nimal Nissanke:
An approach to modelling and analysis of coordinated atomic actions. ETFA 2005 - 2004
- [c13]Fevzi Belli, Christof J. Budnik, Nimal Nissanke:
Finite-State Modeling, Analysis and Testing of System Vulnerabilities. ARCS Workshops 2004: 19-33 - [c12]Nimal Nissanke, Etienne J. Khayat:
Risk Based Security Analysis of Permissions in RBAC. WOSIS 2004: 332-341 - 2003
- [c11]Hamdan Dammag, Nimal Nissanke:
A Mathematical Framework for Safecharts. ICFEM 2003: 620-640 - [c10]Amare Mengesha Leulseged, Nimal Nissanke:
Probabilistic Analysis of Multi-processor Scheduling of Tasks with Uncertain Parameters. RTCSA 2003: 103-122 - 2001
- [c9]Laurent David, F. Cottet, Nimal Nissanke:
Jitter Control in On-Line Scheduling of Dependent Real-Time Tasks. RTSS 2001: 49-58 - 2000
- [c8]Simeon Veloudis, Nimal Nissanke:
Modelling Coordinated Atomic Actions in Timed CSP. FTRTFT 2000: 228-239 - [c7]Nimal Nissanke, Hamdan Dammag:
Risk Bands - A Novel Feature of Safecharts. ISSRE 2000: 293-303 - [c6]Nimal Nissanke, Hamdan Dammag:
Risk Ordering of States in Safecharts. SAFECOMP 2000: 395-405
1990 – 1999
- 1999
- [j3]Irina M. Smarandache, Nimal Nissanke:
Applicability of SIGNAL in safety critical system development. IEE Proc. Softw. 146(2): 86-95 (1999) - [c5]Hamdan Dammag, Nimal Nissanke:
Safecharts for Specifying and Designing Safety Critical Systems. SRDS 1999: 78-87 - 1998
- [b2]Nimal Nissanke:
Introductory logic and sets for computer scientists. Addison-Wesley-Longman 1998, ISBN 978-0-201-17957-6, pp. I-XVI, 1-384 - [c4]Simeon Veloudis, Nimal Nissanke:
Duration Calculus in the Specification of Safety Requirements. FTRTFT 1998: 103-112 - 1997
- [b1]Nimal Nissanke:
Realtime systems. Prentice Hall series in computer science, Prentice Hall 1997, ISBN 978-0-13-651274-5, pp. I-XVI, 1-441 - 1996
- [j2]Johnson P. Thomas, P. Nimal Nissanke, Keith D. Baker:
A hierarchical Petri net framework for the representation and analysis of assembly. IEEE Trans. Robotics Autom. 12(2): 268-279 (1996) - [j1]Johnson P. Thomas, P. Nimal Nissanke, Keith D. Baker:
Boundary models for assembly knowledge representation. IEEE Trans. Robotics Autom. 12(2): 302-312 (1996) - 1995
- [c3]Nimal Nissanke:
Towards refinement in realtime programming. RTS 1995: 244-253 - [c2]Johnson P. Thomas, P. Nimal Nissanke:
A Graph-Based Formalism for Modelling Assembly Tasks. ICRA 1995: 1296-1301 - [c1]Johnson P. Thomas, P. Nimal Nissanke:
Properties of assembly Petri net. IROS (3) 1995: 191-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint