Farshid Farhat

Orcid: 0000-0001-7581-1412

According to our database1, Farshid Farhat authored at least 21 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
CAPTAIN: Comprehensive Composition Assistance for Photo Taking.
ACM Trans. Multim. Comput. Commun. Appl., 2022

2018
Discovering Triangles in Portraits for Supporting Photographic Creation.
IEEE Trans. Multim., 2018

Stochastic Modeling and Optimization of Stragglers.
IEEE Trans. Cloud Comput., 2018

Skeleton matching with applications in severe weather detection.
Appl. Soft Comput., 2018

2017
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval.
IEEE Trans. Multim., 2017

CARMA: Contention-aware Auction-based Resource Management in Architecture.
CoRR, 2017

Intelligent Portrait Composition Assistance: Integrating Deep-learned Models and Photography Idea Retrieval.
Proceedings of the on Thematic Workshops of ACM Multimedia 2017, Mountain View, CA, USA, October 23, 2017

CAGE: A Contention-Aware Game-Theoretic Model for Heterogeneous Resource Assignment.
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017

2016
Detecting Vanishing Points in Natural Scenes with Application in Photo Composition Analysis.
CoRR, 2016

Optimal Placement of Cores, Caches and Memory Controllers in NoC.
CoRR, 2016

Towards Optimizing Data Computing Flow in the Cloud.
CoRR, 2016

Shape matching using skeleton context for automated bow echo detection.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Towards blind detection of low-rate spatial embedding in image steganalysis.
IET Image Process., 2015

Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost.
Proceedings of the 2015 IEEE International Symposium on Workload Characterization, 2015

2012
Eigenvalues-based LSB steganalysis.
ISC Int. J. Inf. Secur., 2012

2011
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup.
IACR Cryptol. ePrint Arch., 2011

Multi-dimensional correlation steganalysis.
Proceedings of the IEEE 13th International Workshop on Multimedia Signal Processing (MMSP 2011), 2011

Risk of attack coefficient effect on availability of Ad-hoc networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes.
Proceedings of the Information Security, 2010

2009
An Extended Authentication and Key Agreement Protocol of UMTS.
Proceedings of the Information Security Practice and Experience, 2009


  Loading...