Behrouz Zolfaghari
Behrouz Zolfaghari
Postdoctoral Fellow, Department of Computer Science and Engineering, Indian Institute of Technology
Verified email at
Cited by
Cited by
Fuzzy sliding mode control design for a class of nonlinear systems with structured and unstructured uncertainties
MR Soltanpour, B Zolfaghari, M Soltani, MH Khooban
International Journal of Innovative Computing, Information and Control 9 (7 …, 2013
Content Delivery Networks: State of the Art, Trends and Future Roadmap
B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ...
ACM Computing Surveys, 2020
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap
B Zolfaghari, RM Parizi, G Srivastava, Y Hailemariam
Software: Practice and Experience 51 (5), 851-867, 2021
A dynamic scheduling algorithm with minimum context switches for spacecraft avionics systems
B Zolfaghari
2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720) 4, 2618-2624, 2004
An Efficient and Secure Approach to Multi-User Image Steganography Using CRC-Based CDMA
H Sheidaeian, B Zolfaghari
Third International Conference on Signal Acquisition and Processing, 2011
Parallel Computation of CRC Using Special Generator Polynomials
H Sheidaeian, B Zolfaghari
International journal of Computer Networks & Communications 4 (1), 39, 2012
MCIC: automated identification of cellulases from metagenomic data and characterization based on temperature and pH dependence
MF Shahraki, S Ariaeenejad, FF Atanaki, B Zolfaghari, T Koshiba, ...
Frontiers in microbiology 11, 2020
A Systematic Approach to the Selection of CRC Generators to Detect Burst Errors in Ethernet Networks
B Zolfaghari, SP Mozaffari, H Karkhane
Proceedings of the IEEE International Conference on Intelligent Network and …, 2010
Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet Networks
B Zolfaghari, H Sheidaeian, SP Mozafari
Recent Trends in Wireless and Mobile Networks, 228-235, 2011
YALMIC: Yet Another Logic Minimization Based Image Compressor
B Zolfaghari, H Sheidaeian, SP Mozaffari
2010 2nd International Conference on Computer Engineering and Technology 2 …, 2010
Minimizing the overhead of dynamic scheduling strategies in avionics systems
B Zolfaghari
Proceedings, IEEE Aerospace Conference 5, 5-5, 2002
ZEDNOT: An Approach to Combining Cryptography and Image Steganography Using Reversible Logic Functions
B Zolfaghari, SP Mozaffari, M Zobeiri
International Conference on Intelligent Network and Computing (ICINC2010, 2010
QTOP: A topological approach to minimizing single-output logic functions
B Zolfaghari, SP Mozafari, H Karkhaneh
2009 IEEE Student Conference on Research and Development (SCOReD), 292-295, 2009
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining
B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra
CRC Press, 2021
Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash.
K Bibak, R Ritchie, B Zolfaghari
Quantum Inf. Comput. 21 (3&4), 181-202, 2021
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures
A Yazdinejad, B Zolfaghari, A Azmoodeh, A Dehghantanha, H Karimipour, ...
Applied Sciences 11 (16), 7518, 2021
An approach to exploiting proper multiples of the generator polynomial in parallel CRC computation
MR Mehrabian, SP Mozafari, B Zolfaghari
2012 IEEE International Conference on Computer Science and Automation …, 2012
SCOPES: steganography with compression using permutation search
S Boorboor, B Zolfaghari, SP Mozafari
International Conference on Graphic and Image Processing (ICGIP 2011) 8285 …, 2011
The impact of skewed associativity on the replacement traffic in coma multiprocessors
B Zolfaghari, M Sharifi
International Journal of Computer Systems Science & Engineering 21 (6), 405-411, 2006
Optimizing the ready queue structure for dynamic scheduling strategies in real-time operating systems
M Sharifi, B Zolfaghari
Comput. Syst. Sci. Eng. 18 (6), 325-330, 2003
The system can't perform the operation now. Try again later.
Articles 1–20