Farshid Farhat
Farshid Farhat
Dexterity.ai
Verifierad e-postadress på dexterity.ai - Startsida
TitelCiteras avÅr
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
F Farhat, S Salimi, A Salahi
IACR Cryptology ePrint Archive 2011, 45, 2011
222011
Stochastic Modeling and Optimization of Stragglers
F Farhat, D Zad Tootaghaj, Y He, A Sivasubramaniam, M Kandemir, ...
IEEE Transaction on Cloud Computing, 14, 2017
212017
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
D Zad Tootaghaj, F Farhat, MR Pakravan, MR Aref
Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 163-165, 2011
192011
An extended authentication and key agreement protocol of UMTS
F Farhat, S Salimi, A Salahi
International Conference on Information Security Practice and Experience …, 2009
172009
Detecting dominant vanishing points In natural scenes with application to composition-sensitive image retrieval
Z Zhou, F Farhat, JZ Wang
IEEE Transactions on Multimedia 19 (12), 2651-2665, 2018
162018
Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost
D Zad Tootaghaj, F Farhat, M Arjomand, P Faraboschi, MT Kandemir, ...
Workload characterization (IISWC), 2015 IEEE international symposium on, 203-212, 2015
152015
Towards blind detection of low-rate spatial embedding in image steganalysis
F Farhat, S Ghaemmaghami
IET Image Processing 9 (1), 31-42, 2015
112015
Stochastic modeling and optimization of stragglers in mapreduce framework
F Farhat
82015
Modeling and optimization of straggling mappers
F Farhat, DZ Tootaghaj, A Sivasubramaniam, MT Kandemir, CR Das
Technical report, Technical Report CSE-14-006, Pennsylvania State University, 2014
82014
Skeleton Matching with Applications in Severe Weather Detection
MM Kamani, F Farhat, S Wistar, JZ Wang
Elsevier Journal of Applied Soft Computing, 2018
72018
Shape matching using skeleton context for automated bow echo detection
MM Kamani, F Farhat, S Wistar, JZ Wang
2016 IEEE International Conference on Big Data (Big Data), 901-908, 2016
72016
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes
F Farhat, MR Pakravan, M Salmasizadeh, MR Aref
International Conference on Information Security Practice and Experience …, 2010
72010
Discovering Triangles in Portraits for Supporting Photographic Creation
S He, Z Zhou, F Farhat, JZ Wang
IEEE Transactions on Multimedia, 2018
62018
Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families
A Diyanat, F Farhat, S Ghaemmaghami
TENCON 2011-2011 IEEE Region 10 Conference, 1266-1270, 2011
62011
Risk of attack coefficient effect on availability of ad-hoc networks
DZ Tootaghaj, F Farhat, MR Pakravan, MR Aref
2011 IEEE Consumer Communications and Networking Conference (CCNC), 166-168, 2011
62011
Risk of attack coefficient effect on availability of Ad-hoc networks
D Zad Tootaghaj, F Farhat, MR Pakravan, MR Aref
Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 166-168, 2011
6*2011
Towards Stochastically Optimizing Data Computing Flows
F Farhat, D Zad Tootaghaj, M Arjomand
arXiv preprint arXiv:1607.04334, 2016
52016
Intelligent Portrait Composition Assistance - Integrating Deep-learned Models and Photography Idea Retrieval
F Farhat, MM Kamani, S Mishra, JZ Wang
ACM Multimedia, 25th Annual Conference, Mountain View, CA, USA., 2017
42017
Optimal Placement of Cores, Caches and Memory Controllers in Network On-Chip
D Zad Tootaghaj, F Farhat
arXiv preprint arXiv:1607.04298, 2016
32016
Multi-dimensional correlation steganalysis
F Farhat, A Diyanat, S Ghaemmaghami, MR Aref
2011 IEEE 13th International Workshop on Multimedia Signal Processing, 1-6, 2011
32011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20