Ali Movaghar-Rahimabadi

Orcid: 0000-0002-6803-6750

Affiliations:
  • Sharif University of Technology, Tehran, Iran


According to our database1, Ali Movaghar-Rahimabadi authored at least 236 papers between 1985 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support.
Clust. Comput., July, 2024

Yuz: Improving Performance of Cluster-Based Services by Near-L4 Session-Persistent Load Balancing.
IEEE Trans. Netw. Serv. Manag., April, 2024

EdgeLinker: Practical Blockchain-based Framework for Healthcare Fog Applications to Enhance Security in Edge-IoT Data Communications.
CoRR, 2024

Energy-aware QoS-based dynamic virtual machine consolidation approach based on RL and ANN.
Clust. Comput., 2024

2023
Fault-tolerant scheduling of graph-based loads on fog/cloud environments with multi-level queues and LSTM-based workload prediction.
Comput. Networks, November, 2023

On the Performance Analysis of Epidemic Routing in Non-Sparse Delay Tolerant Networks.
IEEE Trans. Mob. Comput., July, 2023

Cost-Aware Resource Recommendation for DAG-Based Big Data Workflows: An Apache Spark Case Study.
IEEE Trans. Serv. Comput., 2023

Fixed-Point Iteration Approach to Spark Scalable Performance Modeling and Evaluation.
IEEE Trans. Cloud Comput., 2023

Where Quantum Complexity Helps Classical Complexity.
CoRR, 2023

QOCO: A QoE-Oriented Computation Offloading Algorithm based on Deep Reinforcement Learning for Mobile Edge Computing.
CoRR, 2023

Hadoop-Oriented SVM-LRU (H-SVM-LRU): An Intelligent Cache Replacement Algorithm to Improve MapReduce Performance.
CoRR, 2023

ROGI: Partial Computation Offloading and Resource Allocation in the Fog-Based IoT Network Towards Optimizing Latency and Power Consumption.
Clust. Comput., 2023

Multiplexing eMBB and mMTC Services over Aerial Visible Light Communications.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Lifetime Improvement Based on Event Occurrence Patterns for Wireless Sensor Networks Using Multi-Objective Optimization.
Wirel. Pers. Commun., 2022

Magnifier: A Compositional Analysis Approach for Autonomous Traffic Control.
IEEE Trans. Software Eng., 2022

A Matrix Factorization Model for Hellinger-Based Trust Management in Social Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2022

Modeling and evaluation of dispatching policies in IaaS cloud data centers using SANs.
Sustain. Comput. Informatics Syst., 2022

Privacy protection scheme for mobile social network.
J. King Saud Univ. Comput. Inf. Sci., 2022

CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learning.
J. Cloud Comput., 2022

An adaptive and deadline-constrained workflow scheduling algorithm in infrastructure as a service clouds.
Iran J. Comput. Sci., 2022

A new reliability-based task scheduling algorithm in cloud computing.
Int. J. Commun. Syst., 2022

A novel approach for clustering and routing in WSN using genetic algorithm and equilibrium optimizer.
Int. J. Commun. Syst., 2022

2021
Modeling Epidemic Routing: Capturing Frequently Visited Locations While Preserving Scalability.
IEEE Trans. Veh. Technol., 2021

Processor Sharing Queues With Impatient Customers and State-Dependent Rates.
IEEE/ACM Trans. Netw., 2021

Modeling and Evaluation of Multi-Hop Wireless Networks Using SRNs.
IEEE Trans. Netw. Sci. Eng., 2021

Network and Application-Aware Cloud Service Selection in Peer-Assisted Environments.
IEEE Trans. Cloud Comput., 2021

Availability modeling in redundant OpenStack private clouds.
Softw. Pract. Exp., 2021

Robust fuzzy rough set based dimensionality reduction for big multimedia data hashing and unsupervised generative learning.
Multim. Tools Appl., 2021

A Framework for Protecting Privacy on Mobile Social Networks.
Mob. Networks Appl., 2021

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review.
J. Netw. Comput. Appl., 2021

A two-layer attack-robust protocol for IoT healthcare security.
IET Commun., 2021

Web service quality of service prediction via regional reputation-based matrix factorization.
Concurr. Comput. Pract. Exp., 2021

Dynamic VNF placement, resource allocation and traffic routing in 5G.
Comput. Networks, 2021

Optimal VM-to-user mapping in cloud environment based on sustainable strategy space theory.
Clust. Comput., 2021

A classification of hadoop job schedulers based on performance optimization approaches.
Clust. Comput., 2021

Partial Order Reduction for Timed Actors.
Proceedings of the Software Verification - 13th International Conference, 2021

2020
Modeling and Evaluation of Service Composition in Commercial Multiclouds Using Timed Colored Petri Nets.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Minimizing Data Access Latencies for Virtual Machine Assignment in Cloud Systems.
IEEE Trans. Serv. Comput., 2020

Designing a MapReduce performance model in distributed heterogeneous platforms based on benchmarking approach.
J. Supercomput., 2020

VeriVANca framework: verification of VANETs by property-based message passing of actors in Rebeca with inheritance.
Int. J. Softw. Tools Technol. Transf., 2020

On the effectiveness of the PIT in reducing upstream demand in an NDN router.
Perform. Evaluation, 2020

Cache Subsidies for an Optimal Memory for Bandwidth Tradeoff in the Access Network.
IEEE J. Sel. Areas Commun., 2020

Task scheduling mechanisms in cloud computing: A systematic review.
Int. J. Commun. Syst., 2020

Linear Temporal Public Announcement Logic: a new perspective for reasoning the knowledge of multi-classifiers.
CoRR, 2020

MASKS: A Multi-Artificial Neural Networks System's verification approach.
CoRR, 2020

Performance Modeling of Epidemic Routing in Mobile Social Networks with Emphasis on Scalability.
CoRR, 2020

An area-scalable human-based mobility model.
Comput. Networks, 2020

Lightweight Formal Method for Robust Routing in Track-based Traffic Control Systems.
Proceedings of the 18th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2020

2019
Performance Evaluation of Epidemic Content Retrieval in DTNs With Restricted Mobility.
IEEE Trans. Netw. Serv. Manag., 2019

Secure Overlay Routing for Large Scale Networks.
IEEE Trans. Netw. Sci. Eng., 2019

Dandelion: A Unified Code Offloading System for Wearable Computing.
IEEE Trans. Mob. Comput., 2019

A uniformization-based algorithm for continuous-time stochastic games model checking.
Theor. Comput. Sci., 2019

Hierarchical Stochastic Models for Performance, Availability, and Power Consumption Analysis of IaaS Clouds.
IEEE Trans. Cloud Comput., 2019

Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks.
Peer-to-Peer Netw. Appl., 2019

A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks.
Peer-to-Peer Netw. Appl., 2019

A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds.
Peer-to-Peer Netw. Appl., 2019

Analytical composite performance models for Big Data applications.
J. Netw. Comput. Appl., 2019

EATSDCD: A green energy-aware scheduling algorithm for parallel task-based application using clustering, duplication and DVFS technique in cloud datacenters.
J. Intell. Fuzzy Syst., 2019

HybSMRP: a hybrid scheduling algorithm in Hadoop MapReduce framework.
J. Big Data, 2019

Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing.
Future Gener. Comput. Syst., 2019

A Matrix Factorization Model for Hellinger-based Trust Management in Social IoT.
CoRR, 2019

A Compositional Approach for Reliable Adaptation of Track-based Traffic Control Systems at Runtime.
CoRR, 2019

Impact of Traffic Characteristics on Request Aggregation in an NDN Router.
CoRR, 2019

Symbolic checking of Fuzzy CTL on Fuzzy Program Graph.
Acta Informatica, 2019

VeriVANca: An Actor-Based Framework for Formal Verification of Warning Message Dissemination Schemes in VANETs.
Proceedings of the Model Checking Software - 26th International Symposium, 2019

Poster: Impact of traffic characteristics on request aggregation in an NDN router.
Proceedings of the 2019 IFIP Networking Conference, 2019

Scalable Performance Analysis of Epidemic Routing Considering Skewed Location Visiting Preferences.
Proceedings of the 27th IEEE International Symposium on Modeling, 2019

2018
TSRN: A Tabu Search-Based Routing Protocol for Named Data Networking.
Wirel. Pers. Commun., 2018

A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks.
Wirel. Pers. Commun., 2018

Time-Cost Efficient Scheduling Algorithms for Executing Workflow in Infrastructure as a Service Clouds.
Wirel. Pers. Commun., 2018

Throughput Analysis of IEEE 802.11 Multi-Hop Wireless Networks With Routing Consideration: A General Framework.
IEEE Trans. Commun., 2018

Identifying central nodes for information flow in social networks using compressive sensing.
Soc. Netw. Anal. Min., 2018

Coordinated actor model of self-adaptive track-based traffic control systems.
J. Syst. Softw., 2018

Semantic Data Gathering of Physical Entities in Semantic Sensor Networks Using Software Agents.
Inf. Technol. Control., 2018

IDS modelling and evaluation in WANETs against black/grey-hole attacks using stochastic models.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Power-aware performance analysis of self-adaptive resource management in IaaS clouds.
Future Gener. Comput. Syst., 2018

Performability-Based Workflow Scheduling in Grids.
Comput. J., 2018

Cost-Efficient Scheduling for Deadline Constrained Grid Workflows.
Comput. Informatics, 2018

SLoPCloud: An Efficient Solution for Locality Problem in Peer-to-Peer Cloud Systems.
Algorithms, 2018

Modeling and Evaluation of Power-Aware Software Rejuvenation in Cloud Systems.
Algorithms, 2018

Reliable and Energy-Efficient Routing for Green Software Defined Networking.
Proceedings of the 9th International Symposium on Telecommunications, 2018

Compressed Sensing in Cyber Physical Social Systems.
Proceedings of the Principles of Modeling, 2018

2017
Multi-objective Node Placement Considering Non-uniform Event Pattern.
Wirel. Pers. Commun., 2017

A learning automata and clustering-based routing protocol for named data networking.
Telecommun. Syst., 2017

HellRank: a Hellinger-based centrality measure for bipartite social networks.
Soc. Netw. Anal. Min., 2017

Runtime compositional analysis of track-based traffic control systems.
SIGBED Rev., 2017

Performance and power modeling and evaluation of virtualized servers in IaaS clouds.
Inf. Sci., 2017

Performance aware scheduling considering resource availability in grid computing.
Eng. Comput., 2017

Fully distributed ECC-based key management for mobile ad hoc networks.
Comput. Networks, 2017

A Hitchhiker's Guide to Computation Offloading: Opinions from Practitioners.
IEEE Commun. Mag., 2017

Extracting Implicit Social Relation for Social Recommendation Techniques in User Rating Prediction.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

2016
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach.
IEEE Trans. Mob. Comput., 2016

CGC: centralized genetic-based clustering protocol for wireless sensor networks using onion approach.
Telecommun. Syst., 2016

RDTP: reliable data transport protocol in wireless sensor networks.
Telecommun. Syst., 2016

HellRank: A Hellinger-based Centrality Measure for Bipartite Social Networks.
CoRR, 2016

Extracting Implicit Social Relation for Social Recommendation Techniques in User Rating Prediction.
CoRR, 2016

A Combined Analytical Modeling Machine Learning Approach for Performance Prediction of MapReduce Jobs in Cloud Environment.
Proceedings of the 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2016

A multi-dimensional fairness combinatorial double-sided auction model in cloud environment.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Coordinated Actors for Reliable Self-adaptive Systems.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016

2015
EACHP: Energy Aware Clustering Hierarchy Protocol for Large Scale Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

Fast Aggregation Scheduling in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2015

Minimizing latency in geo-distributed clouds.
J. Supercomput., 2015

Performability Evaluation of Grid Environments Using Stochastic Reward Nets.
IEEE Trans. Dependable Secur. Comput., 2015

PDC: Prediction-based data-aware clustering in wireless sensor networks.
J. Parallel Distributed Comput., 2015

Improved Region-Based TCTL Model Checking of Time Petri Nets.
J. Comput. Sci. Eng., 2015

Abstraction and approximation in fuzzy temporal logics and models.
Formal Aspects Comput., 2015

Feature Extraction from Degree Distribution for Comparison and Analysis of Complex Networks.
Comput. J., 2015

A Low-Cost Sparse Recovery Framework for Weighted Networks under Compressive Sensing.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Decentralized Social Networking Using Named-Data.
Proceedings of the Computer Networks - 22nd International Conference, 2015

CS-ComDet: A Compressive Sensing Approach for Inter-Community Detection in Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Formal process algebraic modeling, verification, and analysis of an abstract Fuzzy Inference Cloud Service.
J. Supercomput., 2014

Combined performance and availability analysis of distributed resources in grid computing.
J. Supercomput., 2014

Bi-level fuzzy based advanced reservation of Cloud workflow applications on distributed Grid resources.
J. Supercomput., 2014

Analytical Leakage-Aware Thermal Modeling of a Real-Time System.
IEEE Trans. Computers, 2014

A new fuzzy negotiation protocol for grid resource allocation.
J. Netw. Comput. Appl., 2014

A two-phase wormhole attack detection scheme in MANETs.
ISC Int. J. Inf. Secur., 2014

Energy Efficient and High Speed Error Control Scheme for Real Time Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Optimal Capacity Allocation for Executing MapReduce Jobs in Cloud Systems.
Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2014

A novel human mobility model for MANETs based on real data.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
Negotiation strategies considering market, time and behavior functions for resource allocation in computational grid.
J. Supercomput., 2013

Market_based grid resource allocation using new negotiation model.
J. Netw. Comput. Appl., 2013

Learning an Integrated Distance Metric for Comparing Structure of Complex Networks.
CoRR, 2013

Quantification and Comparison of Network Degree Distributions.
CoRR, 2013

MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks.
Comput. Networks, 2013

Fully Distributed Self Certified Key Management for Large-Scale MANETs.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Expert key selection impact on the MANETs' performance using probabilistic key management algorithm.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Availability Modeling and Evaluation of Cloud Virtual Data Centers.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

A Rank-Based Hybrid Algorithm for Scheduling Data- and Computation-Intensive Jobs in Grid Environments.
Proceedings of the Intelligent Computing, 2013

Model Checking MANETs with Arbitrary Mobility.
Proceedings of the Fundamentals of Software Engineering - 5th International Conference, 2013

A Novel Probabilistic Key Management Algorithm for Large-Scale MANETs.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A probabilistic task scheduling method for grid environments.
Future Gener. Comput. Syst., 2012

Structure-free real-time data aggregation in wireless sensor networks.
Comput. Commun., 2012

A Büchi automata based model checking framework for reo connectors.
Proceedings of the ACM Symposium on Applied Computing, 2012

Analytical leakage/temperature-aware power modeling and optimization for a variable speed real-time system.
Proceedings of the 20th International Conference on Real-Time and Network Systems, 2012

S-NC: structure-free network coding-aware routing in wireless sensor networks.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Distributed QoS routing algorithm in large scale Wireless Sensor Networks.
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012

FOMA: Flexible overlay multi-path data aggregation in wireless sensor networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Biogeography-based optimization of makespan and reliability in grid computing systems.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

Interference-Aware Multipath Routing for Video Delivery in Wireless Multimedia Sensor Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

DACA: Data-Aware Clustering and Aggregation in Query-Driven Wireless Sensor Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Verification of mobile ad hoc networks: An algebraic approach.
Theor. Comput. Sci., 2011

Performance Optimization Based on Analytical Modeling in a Real-Time System with Constrained Time/Utility Functions.
IEEE Trans. Computers, 2011

Analysis of a dynamic assignment of impatient customers to parallel queues.
Queueing Syst. Theory Appl., 2011

On pancyclicity properties of OTIS-mesh.
Inf. Process. Lett., 2011

Pancyclicity of OTIS (swapped) networks based on properties of the factor graph.
Inf. Process. Lett., 2011

An Efficient Method Based on Genetic Algorithms to Solve Sensor Network Optimization Problem
CoRR, 2011

Long lifetime real-time routing in unreliable Wireless Sensor Networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

Availability modeling of grid computing environments using SANs.
Proceedings of the 19th International Conference on Software, 2011

RDAG: A Structure-Free Real-Time Data Aggregation Protocol for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2011

Long lifetime routing in unreliable wireless sensor networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2011

A Fault Tolerant Scheduling Algorithm for DAG Applications in Cluster Environments.
Proceedings of the Digital Information Processing and Communications, 2011

A Bee Colony Task Scheduling Algorithm in Computational Grids.
Proceedings of the Digital Information Processing and Communications, 2011

IMAC: An Interference-Aware Duty-Cycle MAC Protocol for Wireless Sensor Networks Employing Multipath Routing.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

Stochastic Restricted Broadcast Process Theory.
Proceedings of the Computer Performance Engineering, 2011

An Optimised Algorithm to Detect Faulty Readings along the Substrate Access Wireless Long-Thin Sensor Networks.
Proceedings of the UKSim 5th European Symposium on Computer Modeling and Simulation, 2011

2010
Utility Accrual Dynamic Routing in Real-Time Parallel Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Failure-based equivalence of constraint automata.
Int. J. Comput. Math., 2010

Equational Reasoning on Mobile Ad Hoc Networks.
Fundam. Informaticae, 2010

Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca.
Comput. Electr. Eng., 2010

Dynamic routing of real-time jobs among parallel EDF queues: A performance study.
Comput. Electr. Eng., 2010

Symmetry and partial order reduction techniques in model checking Rebeca.
Acta Informatica, 2010

Characteristics of Secure Routing in Vehicular Ad Hoc Network (VANET).
Proceedings of the 2010 International Conference on Wireless Networks, 2010

A Genetic-Based Scheduling Algorithm to Minimize the Makespan of the Grid Applications.
Proceedings of the Grid and Distributed Computing, Control and Automation, 2010

An Identity-Based Network Access Control Scheme for Single Authority MANETs.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

Towards Performance Evaluation of Mobile Ad Hoc Network Protocols.
Proceedings of the 10th International Conference on Application of Concurrency to System Design, 2010

2009
Mobility Aware Distributed Topology Control in Mobile Ad-Hoc Networks Using Mobility Pattern Matching.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

Joint distributed source and network coding for multiple wireless unicast sessions.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Weighted start-time fair queuing: a new start-time fair queuing for elastic traffic.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

A New Analysis of RC4 - A Data Mining Approach (J48).
Proceedings of the SECRYPT 2009, 2009

Utilizing Network Coding for File Dissemination in Peer-to-Peer Systems.
Proceedings of the NTMS 2009, 2009

Intelligent Clustering in Wireless Sensor Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

Recovery of Sensors in Wireless Sensor Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

SEAODV: secure efficient AODV routing protocol for MANETs networks.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A New Approach to Improve Quality of Service in SPEED Routing Protocol in Wireless Sensor Network through Data Aggregation.
Proceedings of the 2009 Second International Conference on Environmental and Computer Science, 2009

Equational Reasoning on Ad Hoc Networks.
Proceedings of the Fundamentals of Software Engineering, 2009

A New Method for Coverage in Wireless Sensor Networks.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Energy-Efficient SPEED Routing Protocol for Wireless Sensor Networks.
Proceedings of the Fifth Advanced International Conference on Telecommunications, 2009

A Method for Dynamic Software Updating in Real-Time Systems.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

Maximizing the Accrued Utility of an Isochronal Soft Real-Time System Using Genetic Algorithms.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Stochastic DVS-based dynamic power management for soft real-time systems.
Microprocess. Microsystems, 2008

Design and Performance Evaluation of a Fuzzy-Based Traffic Conditioner for Mobile <i>Ad Hoc</i> Networks.
J. Circuits Syst. Comput., 2008

Anonymous authentication protocol for GSM networks.
Int. J. Secur. Networks, 2008

Model Checking of Component Based Software Using Compositional Reductions.
Int. J. Softw. Eng. Knowl. Eng., 2008

Restricted Broadcast Process Theory.
Proceedings of the Sixth IEEE International Conference on Software Engineering and Formal Methods, 2008

MEHR: Multi-Hop Energy-Aware Hierarchical Routing for Wireless Sensor Networks.
Proceedings of the NTMS 2008, 2008

Intrusion Detection: A Survey.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Performance Modeling of Fault Tolerant Fully Adaptive Wormhole Switching 2-D Meshes in Presence of Virtual Channels.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Finding the sensors location and the number of sensors in sensor networks with a genetic algorithm.
Proceedings of the 16th International Conference on Networks, 2008

A study on routing method in P2P networks.
Proceedings of the 16th International Conference on Networks, 2008

ID-NAC: Identity-based network access control for MANETs.
Proceedings of the 16th International Conference on Networks, 2008

CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs.
Proceedings of the Advances in Computer Science and Engineering, 2008

Challenges in Using Peer-to-Peer Structures in Order to Design a Large-Scale Web Search Engine.
Proceedings of the Advances in Computer Science and Engineering, 2008

Bandwidth-Delay Constrained Least Cost Multicast Routing for Multimedia Communication.
Proceedings of the Advances in Computer Science and Engineering, 2008

Modeling Routing Protocols in Adhoc Networks.
Proceedings of the Advances in Computer Science and Engineering, 2008

Live and Fair Constraint Automata and Their Linear Temporal Logic of Steps.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

A Novel Method for Modeling and Evaluation of Uncertain Information Systems.
Proceedings of the 2008 International Conference on Information Technology, 2008

Performance Analysis of SLTC - A Stable Path, Low Overhead, Truthful and Cost Efficient Routing Protocol in MANETs with Selfish Nodes.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

3MOKAN: A Novel Mobility Management Mechanism Based on Keeping Alternative Nodes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Compositional Failure-based Equivalence of Constraint Automata.
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007

Compositional failure-based semantic equivalences for Reo specifications.
Proceedings of the 2007 Conference Specification and Verification of Component-Based Systems, 2007

An improved replacement algorithm in fault-tolerant meshes.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

Trusted secure routing for ad hoc networks.
Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, 2007

A New Anti-Spam Protocol Using CAPTCHA.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

A Review on Specifying Software Architectures Using Extended Automata-Based Models.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Vulnerability Analysis in VGBPS Using Prolog.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Characterizing the Web Using a New Uniform Sampling Approach.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Model Checking of Component Connectors.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Reliable multicast routing with local recovery approach in Ad Hoc Network.
Proceedings of the 2nd International ICST Conference on Access Networks, 2007

Restricted Access to Exam Grades on the Web by HIP.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
A Method for Performance Analysis of Earliest-Deadline-First Scheduling Policy.
J. Supercomput., 2006

Modere: the model-checking engine of Rebeca.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

Efficient Evaluation of CSAN Models by State Space Analysis Methods.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

Performance Evaluation of Mobile Ad Hoc Networks In the Presence of Energy-based Selfishness.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
A modelling tool for hierarchical stochastic activity networks.
Simul. Model. Pract. Theory, 2005

Optimal control of parallel queues with impatient customers.
Perform. Evaluation, 2005

Model Checking, Automated Abstraction, and Compositional Verification of Rebeca Models.
J. Univers. Comput. Sci., 2005

Modular Verification of a Component-Based Actor Language.
J. Univers. Comput. Sci., 2005

Transformation of UML Models into Analyzable OSAN Models.
Proceedings of the First IPM International Workshop on Foundations of Software Engineering, 2005

An Equivalence Based Method for Compositional Verification of the Linear Temporal Logic of Constraint Automata.
Proceedings of the First IPM International Workshop on Foundations of Software Engineering, 2005

An Efficient Model Checking Algorithm for a Fragment of µ-Calculus.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Non-Preemptive Earliest-Deadline-First Scheduling Policy: A Performance Study.
Proceedings of the 13th International Symposium on Modeling, 2005

Efficient Symmetry Reduction for an Actor-Based Model.
Proceedings of the Distributed Computing and Internet Technology, 2005

An Artificial Intelligent CAC Scheme for Self-Similar Traffic using Fuzzy Case based Reasoning.
Proceedings of the IASTED International Conference on Communication Systems and Applications, 2005

Extended Rebeca: A Component-Based Actor Language with Synchronous Message Passing.
Proceedings of the Fifth International Conference on Application of Concurrency to System Design (ACSD 2005), 2005

2004
Modeling and Verification of Reactive Systems using Rebeca.
Fundam. Informaticae, 2004

Modeling and Evaluation with Object Stochastic Activity Networks.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

A Front-End Tool for Automated Abstraction and Modular Verification of Actor-Based Models.
Proceedings of the 4th International Conference on Application of Concurrency to System Design (ACSD 2004), 2004

2003
Model Checking in Rebeca.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

On Dynamic Assignment of Impatient Customers to Parallel Queues.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Simulation in Rebeca.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

An Introduction to New Extensions for Stochastic Activity Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

1998
On queueing with customer impatience until the beginning of service.
Queueing Syst. Theory Appl., 1998

1985
Performability Modeling with Stochastic Activity Networks.
PhD thesis, 1985

Stochastic Activity Networks: Structure, Behavior, and Application.
Proceedings of the International Workshop on Timed Petri Nets, 1985


  Loading...