Mohammad Mahdi Tajiki

Orcid: 0000-0002-7614-9528

According to our database1, Mohammad Mahdi Tajiki authored at least 15 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Correction to: Joint Reliability-Aware and Cost Efficient Path Allocation and VNF Placement using Sharing Scheme.
J. Netw. Syst. Manag., 2022

Joint Reliability-Aware and Cost Efficient Path AllocationFig and VNF Placement using Sharing Scheme.
J. Netw. Syst. Manag., 2022

2021
Optimal Estimation of Link Delays Based on End-to-End Active Measurements.
IEEE Trans. Netw. Serv. Manag., 2021

Online Admission Control and Resource Allocation in Network Slicing under Demand Uncertainties.
CoRR, 2021

2019
Joint Energy Efficient and QoS-Aware Path Allocation and VNF Placement for Service Function Chaining.
IEEE Trans. Netw. Serv. Manag., 2019

Joint Reliability-aware and Cost Efficient Path Allocation and VNF Placement using Sharing Scheme.
CoRR, 2019

Software defined service function chaining with failure consideration for fog computing.
Concurr. Comput. Pract. Exp., 2019

SDN-based resource allocation in MPLS networks: A hybrid approach.
Concurr. Comput. Pract. Exp., 2019

Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN.
Comput. Networks, 2019

2018
SDN Architecture and Southbound APIs for IPv6 Segment Routing Enabled Wide Area Networks.
IEEE Trans. Netw. Serv. Manag., 2018

CECT: computationally efficient congestion-avoidance and traffic engineering in software-defined cloud data centers.
Clust. Comput., 2018

Energy-efficient path allocation heuristic for service function chaining.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

2017
Optimal Qos-aware network reconfiguration in software defined cloud data centers.
Comput. Networks, 2017

2016
QRTP: QoS-aware resource reallocation based on traffic prediction in software defined cloud networks.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2014
Secure and privacy preserving keyword searching cryptography.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...