default search action
Ahmad Patooghy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy:
Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication. IEEE Access 12: 13277-13289 (2024) - [j40]Olcay Kursun, Ahmad Patooghy, Peyman Poursani, Oleg V. Favorov:
CG-CNN: Self-Supervised Feature Extraction Through Contextual Guidance and Transfer Learning. IEEE Access 12: 155851-155866 (2024) - [j39]Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy:
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection. J. Supercomput. 80(10): 14295-14329 (2024) - [c51]Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy:
Fine-Grained Clustering-Based Power Identification for Multicores. IGSC 2024: 165-170 - [c50]Mahdi Hasanzadeh, Meisam Abdollahi, Amirali Baniasadi, Ahmad Patooghy:
Thermo-Attack Resiliency: Addressing a New Vulnerability in Opto-Electrical Network-on-Chips. ISQED 2024: 1-9 - [c49]Mahsa Dehghani, Mehdi Elahi, Mahdi Fazeli, Ahmad Patooghy:
Advancing IoT Security Through Run-time Monitoring & Post-Execution Verification. ISVLSI 2024: 825-829 - [c48]Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy:
TrojanForge: Generating Adversarial Hardware Trojan Examples Using Reinforcement Learning. MLCAD 2024: 21:1-21:7 - [i10]Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy:
Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication. CoRR abs/2401.06612 (2024) - [i9]Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson:
The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection. CoRR abs/2402.17918 (2024) - [i8]Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy:
TrojanForge: Adversarial Hardware Trojan Examples with Reinforcement Learning. CoRR abs/2405.15184 (2024) - [i7]Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy:
Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs. CoRR abs/2409.18921 (2024) - [i6]Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy:
Hiding in Plain Sight: Reframing Hardware Trojan Benchmarking as a Hide&Seek Modification. CoRR abs/2410.15550 (2024) - [i5]Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy:
Fine-Grained Clustering-Based Power Identification for Multicores. CoRR abs/2410.21261 (2024) - 2023
- [j38]Ahmad Patooghy, Mehdi Elahi, Maral Filvan Torkaman, Sara Sezavar Dokhtfaroughi, Ramin Rajaei:
Addressing Benign and Malicious Crosstalk in Modern System-on-Chips. IEEE Access 11: 142263-142275 (2023) - [j37]Meisam Kamarei, Ahmad Patooghy, Ahmad Alsharif, Ali Abdullah S. AlQahtani:
Securing IoT-Based Healthcare Systems Against Malicious and Benign Congestion. IEEE Internet Things J. 10(14): 12975-12984 (2023) - [j36]Ahmad Patooghy, Mahdi Hasanzadeh, Amin Sarihi, Mostafa Abdelrehim, Abdel-Hameed A. Badawy:
Securing Network-on-chips Against Fault-injection and Crypto-analysis Attacks via Stochastic Anonymous Routing. ACM J. Emerg. Technol. Comput. Syst. 19(3): 22:1-22:21 (2023) - [j35]Zahra Shirmohammadi, Yassin Allivand, Fereshte Mozafari, Ahmad Patooghy, Mona Jalal, Sanaz Kazemi Abharian:
ReNo: novel switch architecture for reliability improvement of NoCs. J. Supercomput. 79(3): 2801-2818 (2023) - [j34]Zahra Shirmohammadi, Yassin Allivand, Fereshte Mozafari, Ahmad Patooghy, Mona Jalal, Sanaz Kazemi Abharian:
Correction to: ReNo: novel switch architecture for reliability improvement of NoCs. J. Supercomput. 79(4): 4685 (2023) - [c47]Olcay Kursun, Beiimbet Sarsekeyev, Mahdi Hasanzadeh, Ahmad Patooghy, Oleg V. Favorov:
Tactile Sensing with Contextually Guided CNNs: A Semisupervised Approach for Texture Classification. IRC 2023: 25-30 - [c46]Tia Pope, Ahmad Patooghy, Abdolhossein Sarrafzadeh:
On the Trustworthiness of FHIR-Based Intemet-of-Things Digital Health Systems. MWSCAS 2023: 279-283 - [c45]Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy:
Multi-Criteria Hardware Trojan Detection: A Reinforcement Learning Approach. MWSCAS 2023: 1093-1097 - [i4]Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy:
Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach. CoRR abs/2304.13232 (2023) - [i3]Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy:
Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection. CoRR abs/2305.09592 (2023) - 2022
- [j33]Vahid Jamshidi, Ahmad Patooghy, Mahdi Fazeli:
MagCiM: A Flexible and Non-Volatile Computing-in-Memory Processor for Energy-Efficient Logic Computation. IEEE Access 10: 35445-35459 (2022) - [j32]Somayeh Kashi, Ahmad Patooghy, Dara Rahmati, Mahdi Fazeli:
A multi-application approach for synthesizing custom network-on-chips. J. Supercomput. 78(13): 15358-15380 (2022) - [j31]Meisam Kamarei, Fatemeh Tavakoli, Ahmad Patooghy:
Route Packets Uneven, Consume Energy Even: A Lifetime Expanding Routing Algorithm for WSNs. Wirel. Pers. Commun. 125(4): 3133-3151 (2022) - [c44]Emil Lobachev, Mahmoud Nabil Mahmoud, Ahmad Patooghy:
Blockchain-based Smart Supply Chain Management. DSA 2022: 203-208 - [c43]Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy:
Hardware Trojan Insertion Using Reinforcement Learning. ACM Great Lakes Symposium on VLSI 2022: 139-142 - [c42]Mostafa Abdelrehim, Ahmad Patooghy, Amin Malekmohammadi, Abdel-Hameed A. Badawy:
BIC: Blind Identification Countermeasure for Malicious Thermal Sensor Attacks in Mobile SoCs. ISQED 2022: 1-6 - [d1]Olcay Kursun, Ahmad Patooghy:
VibTac-12: Texture Dataset Collected by Tactile Sensors. IEEE DataPort, 2022 - [i2]Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy:
Hardware Trojan Insertion Using Reinforcement Learning. CoRR abs/2204.04350 (2022) - 2021
- [j30]Amin Sarihi, Ahmad Patooghy, Ahmed Khalid, Mahdi Hasanzadeh, Mostafa Said, Abdel-Hameed A. Badawy:
A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips. IEEE Access 9: 107625-107656 (2021) - [j29]Amin Sarihi, Ahmad Patooghy, Mahdi Amininasab, Mohammad Shokrolah Shirazi, Abdel-Hameed A. Badawy:
Joint security and performance improvement in multilevel shared caches. IET Inf. Secur. 15(4): 297-308 (2021) - [j28]Somayeh Kashi, Ahmad Patooghy, Dara Rahmati, Mahdi Fazeli:
An energy efficient synthesis flow for application specific SoC design. Integr. 81: 331-341 (2021) - [j27]Mostafa Said, Amin Sarihi, Ahmad Patooghy, Awny M. El-Mohandes, Abdel-Hameed A. Badawy, Fayez Gebali:
Novel flexible buffering architectures for 3D-NoCs. Sustain. Comput. Informatics Syst. 29(Part): 100472 (2021) - [c41]Amin Sarihi, Ahmad Patooghy, Mahdi Hasanzadeh, Mostafa Abdelrehim, Abdel-Hameed A. Badawy:
Securing on-Chip Communications: An On-The-Fly Encryption Architecture for SoCs. CSCI 2021: 741-746 - [c40]Mohammad Shokrolah Shirazi, Ahmad Patooghy:
A Vision-based Framework for Intersection Monitoring and Signal Evaluation. ISC2 2021: 1-4 - [c39]Brian Eubanks, Ahmad Patooghy, Olcay Kursun:
Reliability Assessment of Tiny Machine Learning Algorithms in the Presence of Control Flow Errors. MWSCAS 2021: 50-54 - [c38]Khalil Oumimoun, Brian Eubanks, William Kwabla, Ahmad Patooghy, Sreekanth Arikatla, Tansel Halic:
A Solo-Checkpointing Co-Recovery Mechanism for Reliability Improvement of Cyber-Physical Systems. MWSCAS 2021: 88-91 - [c37]Joshua Osborne, Ahmad Patooghy, Beiimbet Sarsekeyev, Olcay Kursun:
Eco-CMB: A Hardware-Accelerated Band-Power Feature Extractor for Tactile Embedded Systems. MWSCAS 2021: 198-203 - [c36]Amin Sarihi, Ahmad Patooghy, Mahdi Hasanzadeh, Mostafa Abdelrehim, Abdel-Hameed A. Badawy:
Securing network-on-chips via novel anonymous routing. NOCS 2021: 29-34 - 2020
- [j26]Meisam Kamarei, Ahmad Patooghy, Ahmad Alsharif, Vesal Hakami:
SiMple: A Unified Single and Multi-Path Routing Algorithm for Wireless Sensor Networks With Source Location Privacy. IEEE Access 8: 33818-33829 (2020) - [j25]Olcay Kursun, Ahmad Patooghy:
An Embedded System for Collection and Real-Time Classification of a Tactile Dataset. IEEE Access 8: 97462-97473 (2020) - [j24]Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy:
Scan-based attack tolerance with minimum testability loss: a gate-level approach. IET Inf. Secur. 14(4): 459-469 (2020) - [j23]Meisam Kamarei, Ahmad Patooghy, Zohreh Shahsavari, Mohammad Javad Salehi:
Lifetime expansion in WSNs using mobile data collector: A learning automata approach. J. King Saud Univ. Comput. Inf. Sci. 32(1): 65-72 (2020) - [j22]Ebadollah Taheri, Mihailo Isakov, Ahmad Patooghy, Michel A. Kinsy:
Addressing a New Class of Reliability Threats in 3-D Network-on-Chips. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(7): 1358-1371 (2020) - [c35]Mohammad Shokrolah Shirazi, Ahmad Patooghy, Reza Shisheie, Md Munirul Haque:
Application of Unmanned Aerial Vehicles in Smart Cities using Computer Vision Techniques. ISC2 2020: 1-7 - [c34]Farzane Rabiee, Mostafa Kajouyan, Newsha Estiri, Jordan Fluech, Mahdi Fazeli, Ahmad Patooghy:
Enduring Non-Volatile L1 Cache Using Low-Retention-Time STTRAM Cells. ISVLSI 2020: 322-327 - [c33]Tou Cheng, Falla Coulibaly, Ahmad Patooghy, Olcay Kursun:
Data-Triggered Approach for Real-Time Machine Learning in IoT Systems. MWSCAS 2020: 101-104 - [c32]Mohammad Taherifard, Hakem Beitollahi, Fateme Jamali, Amin Norollah, Ahmad Patooghy:
Mist-Scan: A Secure Scan Chain Architecture to Resist Scan-Based Attacks in Cryptographic Chips. SoCC 2020: 135-140
2010 – 2019
- 2019
- [j21]Seyed Mohammad Sebt, Ahmad Patooghy, Hakem Beitollahi:
An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size. J. Electron. Test. 35(6): 839-852 (2019) - [j20]Ebadollah Taheri, Karim Mohammadi, Ahmad Patooghy:
ON-OFF: a reactive routing algorithm for dynamic thermal management in 3D NoCs. IET Comput. Digit. Tech. 13(1): 11-19 (2019) - [c31]Ahmad Patooghy, Maral Filvan Torkaman, Mehdi Elahi:
Your hardware is all wired up!: attacking network-on-chips via crosstalk channel. NoCArc@MICRO 2019: 7:1-7:6 - [c30]Mahdi Hasanzadeh, Ebadollah Taheri, Mansour Shafaei, Ahmad Patooghy:
FasTest: A Concurrent Strategy to Test Components of 3D Network-on-Chips. MWSCAS 2019: 65-68 - [c29]Amin Norollah, Hakem Beitollahi, Ahmad Patooghy:
A New Hardware Accelerator for Data Sorting in Area & Energy Constrained Architectures. MWSCAS 2019: 985-988 - [c28]Pezhman Shojaa Sahneh, Amin Sarihi, Benjamin Warburton, Ahmad Patooghy:
RaceR: A Thread Mapping Algorithm for Race Reduction in Multi-Level Shared Caches. PDP 2019: 228-232 - [c27]Fatemeh Vahdatpanah, Mahdi Elahi, Somayeh Kashi, Ebadollah Taheri, Ahmad Patooghy:
3DEP: A Efficient Routing Algorithm to Evenly Distribute Traffic Over 3D Network-on-Chips. PDP 2019: 237-241 - 2018
- [j19]Seyed Mohammad Sebt, Ahmad Patooghy, Hakem Beitollahi, Michel A. Kinsy:
Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs. IET Comput. Digit. Tech. 12(6): 251-257 (2018) - [j18]Mohammad Taherifard, Ahmad Patooghy, Mahdi Fazeli:
Vulnerability modelling of crypto-chips against scan-based attacks. IET Inf. Secur. 12(6): 543-550 (2018) - [j17]Mina Hosseini Rad, Ahmad Patooghy, Mahdi Fazeli:
An Efficient Programming Skeleton for Clusters of Multi-Core Processors. Int. J. Parallel Program. 46(6): 1094-1109 (2018) - [c26]Somayeh Kashi, Ahmad Patooghy, Dara Rahmatiy, Mahdi Fazeli, Michel A. Kinsy:
Application Specific Networks-on-Chip Synthesis: An Energy Efficient Approach. ISVLSI 2018: 52-57 - [c25]Ahmad Patooghy, Ehsan Aerabi, Hamidreza Rezaei, Miguel Mark, Mahdi Fazeli, Michel A. Kinsy:
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method. ISVLSI 2018: 626-631 - [c24]Amin Norollah, Danesh Derafshi, Hakem Beitollahi, Ahmad Patooghy:
PAT-Noxim: A Precise Power & Thermal Cycle-Accurate NoC Simulator. SoCC 2018: 163-168 - 2017
- [j16]Bahar Asgari, Mahdi Fazeli, Ahmad Patooghy, Seyed Vahid Azhari:
Micro-architectural approach to the efficient employment of STTRAM cells in a microprocessor register file. IET Comput. Digit. Tech. 11(1): 1-7 (2017) - [j15]Ehsan Aerabi, Mahdi Kaykha, Mahdi Fazeli, Ahmad Patooghy, Ahmad Akbari:
Side channel parameter characteristics of code injection attacks. ISC Int. J. Inf. Secur. 9(1): 17-26 (2017) - [j14]Hossein Habibian, Ahmad Patooghy:
Fault-tolerant routing methodology for hypercube and cube-connected cycles interconnection networks. J. Supercomput. 73(10): 4560-4579 (2017) - [c23]Kimia Soleimani, Ahmad Patooghy, Nasim Soltani, Lake Bu, Michel A. Kinsy:
Crosstalk Free Coding Systems to Protect NoC Channels against Crosstalk Faults. ICCD 2017: 385-390 - [c22]Ebadollah Taheri, Mihailo Isakov, Ahmad Patooghy, Michel A. Kinsy:
Advertiser elevator: A fault tolerant routing algorithm for partially connected 3D Network-on-Chips. MWSCAS 2017: 136-139 - [c21]Hossein Hosseinzadeh, Mihailo Isakov, Mostafa Darabi, Ahmad Patooghy, Michel A. Kinsy:
Janus: An uncertain cache architecture to cope with side channel attacks. MWSCAS 2017: 827-830 - [c20]Hesamedin Ziaeeziabari, Ahmad Patooghy:
3D-AMAP: A Latency-Aware Task Mapping onto 3D Mesh-Based NoCs with Partially-Filled TSVs. PDP 2017: 593-597 - [i1]Hossein Hosseinzadeh, Mihailo Isakov, Mostafa Darabi, Ahmad Patooghy, Michel A. Kinsy:
Janus: An Uncertain Cache Architecture to Cope with Side Channel Attacks. CoRR abs/1710.09039 (2017) - 2016
- [j13]Sima Afsharpour, Ahmad Patooghy, Mahdi Fazeli:
Performance/energy aware task migration algorithm for many-core chips. IET Comput. Digit. Tech. 10(4): 165-173 (2016) - [j12]Marzieh Ranjbar Pirbasti, Mahdi Fazeli, Ahmad Patooghy:
Phase Change Memory lifetime enhancement via online data swapping. Integr. 54: 47-55 (2016) - [j11]Meisam Kamarei, Ahmad Patooghy, Mahdi Fazeli:
Unauthenticated event detection in wireless sensor networks using sensors co-coverage. ISC Int. J. Inf. Secur. 8(1): 61-71 (2016) - [j10]Vahidreza Moghaddas, Mahdi Fazeli, Ahmad Patooghy:
Reliability-oriented scheduling for static-priority real-time tasks in standby-sparing systems. Microprocess. Microsystems 45: 208-215 (2016) - [c19]Mohamad FallahRad, Ahmad Patooghy, Hesamedin Ziaeeziabari, Ebadollah Taheri:
CirKet: A Performance Efficient Hybrid Switching Mechanism for NoC Architectures. DSD 2016: 123-130 - [c18]Mohammad Saleh Samimi, Ehsan Aerabi, Zahra Kazemi, Mahdi Fazeli, Ahmad Patooghy:
Hardware enlightening: No where to hide your Hardware Trojans! IOLTS 2016: 251-256 - [c17]Hesamedin Ziaeeziabari, Ahmad Patooghy, Midia Reshadi:
AMAP: a new heuristic communication-aware tasks mapping onto 2D mesh NoCs. SpringSim (HPS) 2016: 14 - 2015
- [j9]Reza Sabbaghi-Nadooshan, Ahmad Patooghy:
Analytical performance modeling of de Bruijn inspired mesh-based network-on-chips. Microprocess. Microsystems 39(1): 27-36 (2015) - [j8]Meisam Kamarei, Mojtaba Hajimohammadi, Ahmad Patooghy, Mahdi Fazeli:
An Efficient Data Aggregation Method for Event-Driven WSNs: A Modeling and Evaluation Approach. Wirel. Pers. Commun. 84(1): 745-764 (2015) - 2014
- [j7]Sadegh Yazdanshenas, Marzieh Ranjbar Pirbasti, Mahdi Fazeli, Ahmad Patooghy:
Coding Last Level STT-RAM Cache for High Endurance and Low Power. IEEE Comput. Archit. Lett. 13(2): 73-76 (2014) - 2013
- [c16]Meisam Kamarei, Mojtaba Hajimohammadi, Ahmad Patooghy, Mahdi Fazeli:
OLDA: An Efficient On-Line Data Aggregation Method for Wireless Sensor Networks. BWCCA 2013: 49-53 - [c15]Seyed Mohssen Ghafari, Mahdi Fazeli, Ahmad Patooghy, Leila Rikhtechi:
Bee-MMT: A load balancing method for power consumption management in cloud computing. IC3 2013: 76-80 - 2011
- [j6]Ahmad Patooghy, Seyed Ghassem Miremadi, Hamed Tabkhi:
A reliable and power efficient flow-control method to eliminate crosstalk faults in network-on-chips. Microprocess. Microsystems 35(8): 766-778 (2011) - [c14]Mansour Shafaei, Ahmad Patooghy, Seyed Ghassem Miremadi:
Numeral-Based Crosstalk Avoidance Coding to Reliable NoC Design. DSD 2011: 55-62 - 2010
- [j5]Ahmad Patooghy, Seyed Ghassem Miremadi, Mahdi Fazeli:
A low-overhead and reliable switch architecture for Network-on-Chips. Integr. 43(3): 268-278 (2010) - [j4]Ahmad Patooghy, Seyed Ghassem Miremadi:
Complement routing: A methodology to design reliable routing algorithm for Network on Chips. Microprocess. Microsystems 34(6): 163-173 (2010) - [c13]Ahmad Patooghy, Hamed Tabkhi, Seyed Ghassem Miremadi:
An Efficient Method to Reliable Data Transmission in Network-on-Chips. DSD 2010: 467-474 - [c12]Ahmad Patooghy, Seyed Ghassem Miremadi, Mansour Shafaei:
Crosstalk modeling to predict channel delay in Network-on-Chips. ICCD 2010: 396-401 - [c11]Ahmad Patooghy, Mansour Shafaei, Seyed Ghassem Miremadi, Hajar Falahati, Somayyeh Taheri:
FiRot: An Efficient Crosstalk Mitigation Method for Network-on-Chips. PRDC 2010: 55-61
2000 – 2009
- 2009
- [j3]Mahdi Fazeli, Seyed Ghassem Miremadi, Alireza Ejlali, Ahmad Patooghy:
Low energy single event upset/single event transient-tolerant latch for deep subMicron technologies. IET Comput. Digit. Tech. 3(3): 289-303 (2009) - [c10]Ahmad Patooghy, Seyed Ghassem Miremadi:
XYX: A Power & Performance Efficient Fault-Tolerant Routing Algorithm for Network on Chip. PDP 2009: 245-251 - 2008
- [j2]Ahmad Patooghy, Hamid Sarbazi-Azad:
An accurate mathematical performance model of partially adaptive routing in binary n-cube multiprocessors. Math. Comput. Model. 48(1-2): 34-45 (2008) - 2007
- [j1]Ahmad Patooghy, Hamid Sarbazi-Azad:
Comparative analytical performance evaluation of adaptivity in wormhole-switched hypercubes. Simul. Model. Pract. Theory 15(4): 400-415 (2007) - [c9]Mahdi Fazeli, Ahmad Patooghy, Seyed Ghassem Miremadi, Alireza Ejlali:
Feedback Redundancy: A Power Efficient SEU-Tolerant Latch Design for Deep Sub-Micron Technologies. DSN 2007: 276-285 - [c8]Ahmad Patooghy, Mahdi Fazeli, Seyed Ghassem Miremadi:
Reducing Power Consumption in NoC Design with no Effect on Performance and Reliability. ICECS 2007: 886-889 - [c7]Sina Meraji, Hamid Sarbazi-Azad, Ahmad Patooghy:
Performance Modelling of Necklace Hypercubes. IPDPS 2007: 1-8 - [c6]Ahmad Patooghy, Mahdi Fazeli, Seyed Ghassem Miremadi:
A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips. PRDC 2007: 264-267 - 2006
- [c5]Ahmad Patooghy, Hamid Sarbazi-Azad:
Performance Comparison of Partially Adaptive Routing Algorithms. AINA (2) 2006: 763-767 - [c4]Hamid Sarbazi-Azad, Hamid Mahini, Ahmad Patooghy:
Analytic Modeling of Channel Traffic in n-Cubes. CSR 2006: 567-579 - [c3]Ahmad Patooghy, Seyed Ghassem Miremadi, A. Javadtalab, Mahdi Fazeli, Navid Farazmand:
A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection. DASC 2006: 171-176 - [c2]Ahmad Patooghy, Hamid Sarbazi-Azad:
Analytical Performance Comparison of Deterministic, Partially- and Fully-Adaptive Routing Algorithms in Binary n-Cubes. ICPADS (2) 2006: 21-28 - [c1]Ahmad Patooghy, Hamid Sarbazi-Azad:
Analytical performance modelling of partially adaptive routing in wormhole hypercubes. IPDPS 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint