Regular Accepted Papers
Paper ID | Title | Authors |
---|---|---|
10 | A Review on Concepts, Algorithms and Recognition based Applications of Artificial Immune System | Shahram Golzari Hormozi - Shyamala Doraisamy |
15 | a Secure Cross-Layer Design of Clustering-Based Routing Protocol for MANET | Arash Dana |
21 | Energy Adaptive Cluster-Heads Selection for Wireless Sensor Networks Using Center of Energy Mass | Ehsan Akhtarkavan - Mohammad taghi Manzuri-Shalmani |
26 | A New Feedback ANC System Approach | Pooya Davari - Hamid Hassanpour |
30 | A Low Power SRAM Based on Five Transistor Cell | Arash Azizi-Mazreah - Mohammad Taghi Manzuri - Gholam Hosin Eslami |
38 | Discrimination of Bony Structures in Cephalograms for Automatic Landmark Detection | rahele kafieh - saeed sadri - alireza mehri - hamid raji |
43 | Optimizing Fixpoint Evaluation of Logic Programs with Uncertainty | Nematollaah Shiri - ZhiHong Zheng |
45 | Variant Combination of Multiple Classifiers Methods for Classifying the EEG Signals in Brain-Computer Interface | Zahra Shoaie Shirehjini - Saeed Bagheri Shouraki - Maryam Esmailee |
49 | A Robust and Efficient SIP Authentication Scheme | Alireza Mohammadi-nodooshan - Yousef Darmani - Rasool Jalili - Mehrdad Nourani |
51 | Challenges in Using Peer-to-Peer Structures in Order to Design a Large-Scale Web Search Engine | Hamid Mousavi - Ali Movaghar |
80 | Evaluating the Metro-on-Chip Methodology in Physical Design Flow to Improve the Congestion and Routability | Ali Jahanian - Morteza Saheb Zamani - Mostafa Rezvani |
100 | Clustering Search Engine Log for Query Recommendation | Mehdi Hosseini - Hassan Abolhassani |
116 | Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers | amin rasoulifard - abbas Ghaemi bafghi - mohsen kahani |
120 | Unequal Error Protection for Scalable Extension of H.264/AVC Using Genetic Algorithm | Amir Naghdinezhad - Mahmoud Reza Hashemi - Omid Fatemi |
133 | Fuzzy Voronoi Diagram | Mohammad Reza Jooyandeh Roodsary - Ali Mohades Khorasani |
185 | Methods for analyzing information contained in an enterprise email database | mohsen sadeghi - Khaled HADJ-HAMOU |
199 | An Adaptive Method for Moving Object Blending in Dynamic Mosaicing | Mojtaba Bagheri Bagheri - Taiebeh Lotfi - Shohreh Kasaei |
211 | Sequential Equivalence Checking Using a Hybrid Boolean-Word Level Decision Diagram | Bijan Alizadeh - Masahiro Fujita |
221 | A Centrally Managed Dynamic Spectrum Management Algorithm for Digital Subscriber Line Systems | Adnan Rashdi - Noor M. Sheikh |
222 | Benefiting White Noise in Developing Feedforward Active Noise Control Systems | Pooya Davari - Hamid Hassanpour |
223 | A Nonspeculative Maximally Redundant Signed Digit Adder | Ghassem Jaberipur - Saeid Gorgin |
230 | Efficient Parallel Routing Algorithms for Cartesian and Composition Networks | Marzieh Bakhshi - Saeede Bakhshi - Hamid Sarbazi-azad |
231 | Efficient VLSI layout of WK-Recursive Based Networks | Saeede Bakhshi - Hamid Sarbazi-azad |
243 | Retinal Vessel Extraction using Gabor Filters and Support Vector Machines | Alireza Osareh - Bita Shadgar |
266 | Kinetic Polar Diagram | Mojtaba Nouri Bygi - Maryam Yazdandoost - Fatemeh Chitforoush - Mohammad Ghodsi |
278 | An Approximation Algorithm for the k-level Uncapacitated Facility Location Problem with Penalties | Mohsen Asadi - Ali Niknafs - Mohamad ghodsi |
292 | Improvement of MAC Performance for Wireless Sensor Networks | Mohammad Hossein Fotouhi Ghazvini - Maryam Vahabi - Mohd Fadlee A. Rasid - Raja Syamsul Azmir Raja Abdullah |
293 | Multi-valued voltage model for Delay Fault Testing of Resistive Faults in Deep Sub-Micron Technologies | Reza Sedaghat - Reza Javaheri |
305 | Automated Method for Border Detection in IVUS Images and Characterization of Calcified plaques | Alireza Roodaki - Zahra Najafi - Armin Soltanzadi - Arash Taki - Seyed Kamaledin Setarehdan |
308 | A clustering method based on soft learning of model (prototype) and dissimilarity metrics | Arash Arami - Babak Najar araabi |
310 | Using a Nave Bayes Classifier based on K-Nearest Neighbors with Distance Weighting for Static Hand-Gesture Recognition in a Human-Robot Dialog System | Pujan Ziaie - Thomas Mueller - Mary Ellen Foster - Alois Knoll |
313 | AGraph Transformation-Based Approach to Formal Modeling and Verification of Workflows | Vahid Rafe - Adel Rahmani |
315 | A Circuit Model for Fault Tolerance in the Reliable Assembly of Nano-Systems | Masoud Hashempour - Zahra Mashreghian Arani - Fabrizio Lombardi |
319 | An Approach for Semantic Web Query Approximation Based on Domain Knowledge and User Preferences | Zeinab Iranmanesh - Razieh Piri - Hassan Abolhassani |
326 | A new Architecture for Heterogeneous Context Based Routing | Enrico Dressler - Raphael Zender - Ulrike Lucke - Djamshid Tavangarian |
331 | CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs | Fatemeh Saremi - Hoda Mashayekhi - Rasool Jalili - Ali Movaghar |
332 | A new algorithm for combating free-riders in structured P2P networks | Mohammad Rasool Raeesi Nafchi - Jafar Habibi - Pariya Raoufi - Habib Rostami |
334 | On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices | Amir Moradi - Mohammad Taghi Manzuri Shalmani - Mahmoud Salmasizadeh |
339 | A New Segmentation Method for Iris Recognition Using the Complex Inversion Map and Best-Fitting Curve | Sepehr Attarchi - Karim Faez |
342 | temporal semantic based access control model | Ali Noorollahi Raavari - Morteza Amini - Rasool Jalili |
343 | Inferring a Bayesian network for Content-based Image Classification | Shahriar Shariat - Hamid R. Rabiee - Mohammad Khansari |
354 | A Blocking Reduction Scheme for Multiple Slot Cell Scheduling in Multicast Switching Systems | Fong-Cheng Lee - Wen-Fong Wang - Jung-Bin Shih |
363 | Security Enhancement of Route Optimization in Mobile IPv6 Wireless Networks: A Test-bed Experience | Abbas Mehdizadeh Zare Anari - Sabira Khatun - Raja Syamsul Azmir b.Raja Abdullah - Borhanuddin Mohd Ali - Gopakumar Kurup |
366 | Approximating Component Selection With General Costs | Mostafa Nouri Baygi - Jafar Habibi |
369 | Adaptive End-to-End QoS for Multimedia over Heterogeneous Wireless Networks | Ouldooz Baghban Karimi - Mahmood Fathy - Saleh Yousefi |
380 | Comparison of Linear and Nonlinear Models for Estimating Brain Deformation Using Finite Element Method | Hajar Hamidian - Hamid Soltanian-Zadeh - Alireza Akhondi-Asl - Reza Faraji-Dana |
382 | Ant Colony Optimization with a Genetic Restart Approach toward Global Optimization | Gholam Hossein Hajimirsadeghi - Mahdi Nabaee - Babak Nadjar Araabi |
386 | A Cluster-based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks | Mohammad Sheikh Zefreh - Ali Fanian - Sayyed Mahdi Sajadieh - Pejman Khadivi - Mahdi Brenjkoub |
387 | Grid Based Registration of Diffusion Tensor Images Using Least Square Support Vector Machines | Esmaeil Davoodi - Hamid Soltanian-Zadeh |
389 | Secure Digital Image Watermarking Based | Azadeh Mansouri - Ahmad Mahmoudi Aznaveh - Farah Torkamani Azar |
393 | Context-Dependent Segmentation of Retinal Blood Vessels Using Hidden Markov Models | Amir Pourmorteza - Seyed Hamid Reza Tofighi - Alireza Roodaki - Ashkan Yazdani - Hamid Soltanian-Zadeh |
395 | New Routing Strategies for RSP Problems with Concave Costs | Marjan Momtazpour - Pejman Khadivi |
397 | Automatic Extraction of IS-A relations in Taxonomy Learning | Mahmood Neshati - Hassan Abolhassani - Hassan Fatemi |
402 | The Effect of Core Number and Core Diversity on Power and Performance in Multicore processors | Ali Zolfaghari Jooya - Mohsen Soryani |
407 | Seabed Image Texture Segmentation and Classification Based on Nonsubsampled Contourlet Transfrom | Reza Javidan - Mohammad A. Masnadi-Shirazi - Zohreh Azimifar |
408 | A Novel Piecewise Linear Clustering By Hyper Plane Adjustment | Mohammad Taheri - Elham Chitsaz - Seraj D. Katebi - Mansoor Z. Jahromi |
419 | A Versatile Reconfigurable Bit-Serial Multiplier Architecture in Finite Fields GF(2m) | Morteza Nikooghadam - Ehsan Malekian - Ali Zakerolhosseini |
558 | Performance Comparison of Simple Regular Meshes and their k-ary n-cube Variants in Optical Networks | Ahmad Kianrad - Aresh Dadlani - Ali Rajabi - Ahmad Khonsari - Hasan Seyed Razi |
559 | Object-Based Video Coding for Distance Learning Using Stereo Cameras | Amir Hossein Khalili - Mojtaba Bagheri - Shohreh Kasaei |
600 | Sparse Sinusoidal Signal Representation for Speech and Music signals | Pejman Mowlaee Begzade Mahale - Abolghasem Sayadiyan - Mahdi Rahmati |
624 | An Exact Algorithm for the Multiple-Choice Multidimensional Knapsack based on Core | Mohammad Reza Razzazi - Taha Ghasemi |
637 | A Distributed Proxy System for High Speed Clients | Martin Krohn - Helena Unger - Djamshid Tavangarian |
654 | Effects of Feature Domain Normalizations on Text Independent Speaker Verification Using Sorted Adapted Gaussian Mixture Models | R. Saeidi - H. R. Sadegh Mohammadi - T. Ganchev - R. D. Rodman |
658 | Modeling Routing Protocols in Adhoc Networks | Fatemeh Ghassemi - Ali Movaghar |
667 | Reliability evaluation in grid environment | SAEED PARSA - FERESHTEH-AZADI PARAND |
668 | 3G Wireless Multicasting | zeki yetgin - zeki yetgin - muge fesci - gamze seckin |
669 | High Performance Mathematical Quarter-Pixel Motion Estimation with Novel Rate Distortion Metric for H.264/AVC | Somayeh Sardashti - Hamid Reza Ghasemi - Mehdi Semsarzadeh - Mahmoud Reza Hashemi |
671 | Object Modeling for Multicamera Correspondence Using Fuzzy Region Color Adjacency Graphs | Amir Hossein Khalili - Shohreh Kasaei |
673 | Polyhedral GPU Accelerated Shape From Silhouette | Alireza Haghshenas - Mahmoud Fathy - Maryam Mokhtari |
675 | Nevisa, A Persian Continuous Speech Recognition System | Hossein Sameti - Hadi Veisi - Mohammad Bahrani - Bagher Babaali - Khosro Hosseinzadeh |
676 | A Novel Partitioned Encoding Scheme for Reducing Total Power Consumption of Parallel Bus | Mehdi Kamal - Somayyeh Koohi - Shaahin Hessabi |
680 | Integration of System-Level IP Cores in Object-Oriented Design Methodologies | Shoaleh Hashemi Namin - Shaahin Hessabi |
685 | Time Series Analysis for ARP Anomaly Detection : A Combinatorial Network-based Approach Using Multivariate & Mean-Variance Algorithms | Yasser Yasami - Saadat Pourmozaffari - siavash Khorsandi |
687 | SHRP: A new Routing Protocol to Wireless Sensor Networks | Nelson Cardenas - Claudia Abbas - Giacomo Lobalsamo - Nestor Davila |
689 | Performance Modeling of a Distributed Web Crawler using Stochastic Activity Networks | Mitra Nasri - Saeed Shariati - Mohammad Abdollahi Azgomi |
693 | Performance Enhancement of Asynchronous Circuits | Somaye Raoufifard - Behnam Ghavami - Mehrdad Najibi - Hossein Pedram |
698 | Online Suffix Tree Construction for Streaming Sequences | Giyasettin OZCAN - Adil Alpkocak |
702 | Efficient Parallel Buffer Structure and Its Management Scheme for a Robust Network-on-Chip (NoC) Architecture | Jun Ho Bahn - Nader Bagherzadeh |
709 | Early Bug Detection in Deployed Software | Mojtaba Vahidi Asl - Saeed Parsa - Somaye Arabi |
714 | FORMULATING PRIORY COEFFICIENTS FOR INFORMATION QUALITY CRITERIA ON THE BLOG | Mohammad Javad Kargar - Abd Rahman Ramli - Hamidah Ibrahim - Fatemeh Azimzadeh |
716 | SBUQA Question Answering System | Mahsa Arab Yarmohamadi - Mehrnoush Shamsfard - Mahshid Arab Yarmohamadi |
721 | A Bayesian Network Based Approach for Data Classification Using Structural Learning | Ali Reza Khanteymoori - Mohammad Mehdi Homayounpour - Mohammad Bagher Menhaj |
744 | A Fast-Array Implementation of Adaptive IIR Filter | Allahyar Montazeri - Javad Poshtan |
746 | Polymorphism-Aware Common Bus in an Object-Oriented ASIP | Nima Karimpour - Shaahin Hessabi |
747 | System-Level Assertion-Based Performance Verification for Embedded Systems | Hassan Hatefi-Ardakani - Amir Masoud Gharehbaghi - Shaahin Hessabi |
Short Accepted Papers
Paper ID | Title | Authors |
---|---|---|
13 | A Novel Low Temperature Coefficient Band-gap Reference without Resistors | Yujiao Zhao - Suge Yue - Qiang Bian |
14 | An Operator for Removal of Subsumed Clauses | Mohammad Ghasemzadeh - Christoph Meinel |
23 | Intrusion Detection Using RBF and ART2 Neural Networks in a Hierarchical Structure | Razieh Behjati - Mohammad Javad YazdanPanah |
24 | Low power and Storage Efficient Parallel Lookup Engine Architecture For IP Packets | Alireza Mahini - Reza Berangi - Hossein Mohtashami - Hamidreza Mahini |
31 | Assignment of OVSF codes in Wideband CDMA | mehdi askari - reza saadat - mansour nakhkesh |
34 | A Descriptive Performance Model for OpenMosix Cluster | Bestoun S. Ahmed - Khairulmizam Samsudin - Abdul Rahman Ramli |
52 | Analysis of the Growth Process of Neural Cells in Culture Environment Using Image Processing Techniques | Atefeh Mirsafian - Shirin Efahani - Shohreh Kasaei - Hamid Mobasheri |
55 | Decision Tree Based Arrhythmia Classification using Non-Uniform Sampling | Vahid Tavakoli - Nima Sahba - Mehran Baboli - Alireza Mohammadnia oranj |
56 | A Novel Method for Parallel Video Data Mining | Babak Fakhar - Mohamad reza Kangavari |
60 | Bandwidth-delay constrained least cost multicast routing for multimedia communication | Mehrdad Mahdavi - Rana Forsat - Ali Movaghar |
76 | Cellular Probabilistic Evolutionary Algorithms for Numerical Function Optimization Problems | Mohammad Tayarani - Mohammad Reza Akbarzadeh |
81 | A new approach for scoring relevant documents by applying a Farsi stemming method in Persian web search engines | Hamed Shahbazi - Alireza Mokhtaripour - Mohammad Dalvi |
104 | Research on Trending Variation Ratio Structure Sequence Mining Algorithm and Its Application | Wen Zhuang - Ting Yang - Fei Hao |
119 | A New Learning controller on PM Stepper Motor | Mehdi Roopaei - Mansoor Zolghdr Jahromi |
124 | Ontology Matching Using Vector Space | Zahra Eidoon - Naser Yazdani - Farhad Oroumchian |
127 | FRGA Matching algorithm in High-speed Packet Switches | Mohammad Javad Rostami - Ali Asghar Khodaparast - Siavash Khorsandi |
129 | A New Class of Data Dissemination Algorithms for Multicast Protocols | Mohammad Javad Rostami - Ali Asghar Khodaparast |
134 | Dynamic Point Coverage in Wireless Sensor Networks: A Learning Automata Approach | Mehdi Esnaashari - Mohammad Reza Meybodi |
137 | A Novel Approach in Adaptive Traffic Prediction in Self-Sizing | Hamed Banizaman - Fazollah Adibniya |
159 | A Comparative Study of Two Typical Fusion Methods for Target Tracking in Wireless Sensor Networks | Saeid Pashazadeh - mohsen sharifi |
169 | DESIGN AND ANALYSIS OF RESOURCE MANAGEMENT SUPPORT SOFTWARE FOR MULTIHOMING IN-VEHICLE OF IPV6 NETWORK | oluwshola david adeniji - oluwashola david adeniji |
173 | The Advantage of Implementing Martin's Noise Reduction Algorithm in Critical Bands Using Wavelet Packet Decomposition and Hilbert Transform | Milad Omidi - Nima Derakhshan - Mohammad Hassan Savoji |
196 | A Histogram Sensitive Vector Quantization Algorithm | Pejman Mowlaee - Abolghasem Sayadiyan |
198 | Real-Time Analysis Process Patterns | Naeem Esfahani - Seyed-Hassan Mirian-Hosseinabadi - Kamyar Rafati |
205 | Selecting Informative Genes from Microarray Dataset Using Fuzzy Relational Clustering | Soodeh Kasiri Bidhendi - Saeed Shiry Ghidary |
208 | GMTM: A Grid Transaction Management Model | Ali Asghar Safaei - Mostafa Haghjoo |
220 | Design of a Custom Packet Switching Engine for Network Applications | Mostafa E. Salehi - Sied Mehdi Fakhraie - Abbas Hormati - Abbas Banayian |
224 | Multiple Robots Tasks Allocation: An Auction-Based Approach Using Dynamic-Domain RRT | Ali Nasri Nazif - ehsan iranmanesh - ali mohades |
232 | Teaching Information Technology Project Management at University | Ashwani Kumar |
242 | Efficient Computation of N-S Equation With Free Surface Flow Around an ACV (AIR CUSHION VEHICLE) on ShirazUCFD Grid | Seyyed Mehdi Sheikhalishahi - Davood Alizadehrad - Gholamhossein Dastghaibifard - Mohammad Mehdi Alishahi - Amir Hossein Nikseresht |
246 | Signal Processing Based Techniques for Fetal Electrocardiogram Extraction | Saman Sargolzaei - Karim Faez - Arman Sargolzaei |
248 | An Area-efficient Interpolator Applied in audio ?-?DAC | Binming Luo - Yuanfu Zhao - Zongmin Wang |
249 | Towards a Coordination Model for Open and Dynamic Distributed Systems | Liang Li - Bin Li - Junwu Zhu |
258 | Enhancing Accuracy of Source Localization in High Reverberation Environment with Microphone Array | Nima Yousefian - Ahmad Akbari |
265 | Class Dependent LDA Optimization using Genetic Algorithm for Robust MFCC Extraction | houman abbasian - babak nasersharif - ahmad akbari |
269 | Robust Wavelength Planning in DWDM Transport Networks under Demand Uncertainty using GA | Yousef Seifi Kavian - Majid Naderi - Habib Rashvand - Wei Ren |
270 | TACtic- A Multi Behavioral Agent for Trading Agent Competition | Hassan Khosravi - Mohammad Ebrahim Shiri - Hamid Khosravi - Ehsan Iranmanesh - Alireza Davoodi |
271 | An Optimized Ring-Based Election Algorithm for Trusted Computational Grid Environment | Hossein Deldari - Rasool Taghipoor |
273 | Software Reliability Prediction Based on a Formal Requirements Specification | Hooshmand Alipour - Ayaz Isazadeh |
284 | ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG | Yihua Yu - Shihui Zheng - Yixian Yang |
285 | The Combination of CMS with PMC for Improving the Robustness of Speech Recognition Systems | Hadi Veisi - Hossein Sameti |
286 | A Dynamic Multi Agent-based Approach to Parallelizing Genetic Algorithm | mohsen momeni - Kamran Zamanifar |
288 | Fuzzy Neighborhood Allocation (FNA): A Fuzzy Approach to Improve Near Neighborhood Allocation in DDB | Reza Basseda - Samira Tasharofi - Maseud Rahgozar - Caro Lucas |
290 | OPWUMP: An architecture for online predicting in WUM-based personalization system | Mehrdad Jalali - norwati Mustapha - Md. Nasir B Sulaiman - Ali Mamat |
294 | Position and Speed Controller for a DC Motor Using Artificial Intelligent | HADI DELAVARI - ABOLFAZL RANJBAR NOIEY |
309 | A Multi-Gb/s Parallel String Matching Engine | Vahid Rahmanzadeh - Mohammad Bagher Ghaznavi-Ghoushchi |
312 | Automated Software Verification: A Graph Transformation-Based Approach | Vahid Rafe - Adel Rahmani |
317 | A Modified version of Sugeno-Yasukawa Modeler | Amir H. Hadad - Tom Gedeon - Saeed Shahbazi - Saeed Bahrami |
324 | Directing the Search in the Fast Forward Planning | Seyed Ali Akramifar - Gholamreza Ghassem-Sani |
346 | CAMAC: A Context-Aware Mandatory Access Control Model | Jafar Haadi Jafarian - morteza Amini - Rasool Jalili |
347 | Inferring Trust Using Relation Extraction in Heterogeneous Social Networks | Nima Haghpanah - Masoud Akhoondi - Hassan Abolhassani |
362 | Sorting on OTIS-Networks | Ehsan Akhgari - Alireza Ziai - Mohammad Ghodsi |
364 | A Novel Semi-Supervised Clustering Algorithm for Finding Clusters of Arbitrary Shapes | Mahdieh Soleymani Baghshah - Saeed Bagheri Shouraki |
371 | Improving quality of voice conversion systems | Morteza Farhid - Mohammd ali Tinati |
381 | Feature Selection SDA method in Ensemble Nearest Neighbor classifier | Faatemeh Alimardani - Ebrahim Ansari - Reza Boostani |
388 | A Novel Hybrid Structure for Clustering | Mahdi Yazdian Dehkordi - Reza Boostani |
390 | Hybrid Agent Learning Based on Temporal Difference Method | Zahra Rahaie - Fattaneh Taghiyareh |
400 | 6R Robots;How to Guide and Test Them by Vision? | Azamossadat Nourbakhsh - Moharram Habibnezhad Korayem |
403 | Hierarchical Diagnosis of Vocal Fold Disorders | Babak Seyed Aghazadeh - Hossein Khadivi Heris - Mansour Nikkhah-Bahrami |
406 | Mobile Robot Navigation Using Generalized Voronoi Graph (GVG) | Shahin Mohammadi - Nima Hazar |
409 | Evaluation of PersianCat Agents Accepting policy in Continuous Double Auction, Participant in CAT 2007 Competition | Sina Honari - Amin Foshati - Mojtaba Ebadi - Maziar Gomrokchi |
414 | A Framework for Implementing Virtual Collaborative Networks - Case Study on Automobile Components Production Industry | Elham Parvinnia - Kourosh Ziarati - Raouf Khayami |
415 | Virtual Collaboration Readiness Measurement a Case Study in the Automobile Industry | Raouf Khayami - Kourosh Zirati - Elham Parvinnia - Ghazal Afroozi Milani |
418 | Preprocessing CT-Scan Images of Liver for Automatic Segmentation | Amir Hossein Foruzan - Reza Aghaeizadeh Zoroofi - Yoshinobu Sato |
438 | Fuzzy Controller for Cooperative Object Pushing with Variable Line Contact | Mahsa Aliakbar Golkar - Sarah Taghavi Namin - Hossein Aminaiee - Majid Nili Ahmadabadi |
480 | A Novel Quality of Service Based Multicast Routing Protocol for Multimedia Networks | Mohammad Hossien Yaghmaee - Maryam Baradaran |
490 | Facilitating XML Query Processing Via Execution Plan | Sayyed Kamyar Izadi - Vahid Garakani - Mostafa Haghjoo |
496 | The Impact of Hidden Terminal on MANET Performance | Ali Khayatzadeh Mahani - Yousef Seifi Kavian - Majid Naderi |
521 | ET-MAC: An Energy-efficient with high Throughput MAC protocol for wireless sensor networks | Hadi S. Aghdasi - Maghsoud Abbaspour |
575 | Software Re-modularization for Performance | Saeed Parsa - omid bushehrian |
578 | Reduced Reference Watermark-Based Image Transmission Quality Metric | Mohammad Hosain Kayvanrad - Shabnam Sodagari - Alireza Nasiri Avanaki - Hossein Ahmadi-Noubari |
590 | Design and Implementation of an Adaptive Automobile Anti-collision System | Shahram Jafari - Mohammad Arabnejad - Ali Rashidi Moakhar |
592 | Approximation Algorithms for Edge-Covering Problem | Alireza Bagheri - Mohammad Hosseinzadeh Moghaddam |
599 | Proposing an Efficient Method to Estimate Crosstalk after Placement in VLSI Circuits | Arash Mehdizadeh - Morteza Saheb Zamani |
607 | A New Operator for Multi-Addition Calculations | Kooroush Manochehri - Saadat Pour Mozafari - Babak Sadeghian |
611 | Quantum Differential Evolution Algorithm for Variable Ordering Problem of Binary Decision Diagram | Abdesslem Layeb - Djamel-Eddine Saidouni |
614 | A Joint Source-Channel Rate-Distortion Optimization Algorithm for H.264 codec in Wireless Networks | Razieh Rasouli - Hamid R. Rabiee - Mohammad Ghanbari |
617 | Pre-synthesis optimization for asynchronous circuits using compiler techniques | sharareh ZamanZadeh - Mehrdad Najibi - Hossein Pedram |
619 | ??Absolute priority for a vehicle in VANET | Rostam Shirani - Faramarz Hendessi - Mohammad Ali Montazeri |
623 | An Optimal Parallel Algorithm for Computing the Visibility Complex | Mojtaba Nouri Bygi - Amir Hedayatu - Mohammad Ghodsi |
626 | Searching with Local Information in Complex Networks | Cheng Bailiang - Zeng Guosun - Jie Anquan - Yuan Lulai |
629 | An Ontology Based Routing Index in Unstructured Peer-to-Peer Networks | Hoda Mashayekhi - Fatemeh Saremi - Jafar Habibi - Habib Rostami - Hassan AbolHassani |
636 | Embedding Architectural Practices into Extreme Programming | Amir Azim Sharifloo - Amir Saffarian - Fereidoun Shams |
661 | Haplotype Reconstruction with Minimum Error Correction Using Parallel Clustering Approach | M-Hossein Moeinzadeh - Ehsan Asgarian - Jafar Habibi |
663 | Error Concealment Using United Data Hiding and JPEG Compression Applied to Wireless Visual Communications | Alireza Kenarsari Anhari - Saamaan Pourtavakoli - Alireza Nasiri Avanaki |
670 | Adaptive Target Detection in Sensor Networks | Ghasem Mirjalily |
686 | Temporal Logic and Constraint Automata | Sara Navidpour - Mohammad Izadi |
710 | Event Detection from News Articles | Alireza Sahraei - Hassan Sayyadi - Hassan Abolhassani |
713 | Architectural Styles as a Guide for Software Architecture Reconstruction | Kamyar Khodamoradi - Jafar Habibi - Ali Kamandi |
717 | Utility-Optimized Flow Control for Best Effort Traffic in Network-on-Chip | Mohammad S. Talebi - Fahimeh Jafari - Ahmad Khonsari - Mohammad Hossein Yaghmaee |
720 | Application of Imperialistic Competition Algorithm in Recommender Systems | Hoda Sepehri Rad - Caro Lucas |
727 | Prevention of Tunneling Attack in endairA | Mohammad Fanaei - Ali Fanian - Mehdi Berenjkoub |
732 | Digital Social Network Mining for Topic Discovery | Pooya Moradian Zadeh - Maryam Mohi - Mohsen Sadighi Moshkenani |