default search action
Hosein Shafiei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Seyed Hamed Rastegar, Hossein Shafiei, Ahmad Khonsari:
EneX: An Energy-Aware Execution Scheduler for Serverless Computing. IEEE Trans. Ind. Informatics 20(2): 2342-2353 (2024) - 2022
- [j12]Hossein Shafiei, Ahmad Khonsari, Payam Mousavi:
Serverless Computing: A Survey of Opportunities, Challenges, and Applications. ACM Comput. Surv. 54(11s): 239:1-239:32 (2022) - [j11]Sepideh Javadi, Hossein Shafiei, Maliheh Forouzanmehr, Ata Khalili, Ha H. Nguyen:
Resource allocation for IRS-assisted MC MISO-NOMA system. IET Commun. 16(13): 1617-1627 (2022) - [j10]Atefeh Omidkar, Ata Khalili, Ha H. Nguyen, Hossein Shafiei:
Reinforcement-Learning-Based Resource Allocation for Energy-Harvesting-Aided D2D Communications in IoT Networks. IEEE Internet Things J. 9(17): 16521-16531 (2022) - [j9]Hossein Shafiei, Aresh Dadlani:
Detection of fickle trolls in large-scale online social networks. J. Big Data 9(1): 22 (2022) - [j8]Atefeh Rezaei, Ata Khalili, Jalal Jalali, Hossein Shafiei, Qingqing Wu:
Energy-Efficient Resource Allocation and Antenna Selection for IRS-Assisted Multicell Downlink Networks. IEEE Wirel. Commun. Lett. 11(6): 1229-1233 (2022) - 2020
- [c9]Hossein Shafiei, Ahmad Khonsari, Sina Kashipazha, Aresh Dadlani:
The Tongue Can Paint: Understanding Popularity in Podcasting Societies. WWW (Companion Volume) 2020: 90-91
2010 – 2019
- 2019
- [i3]Hossein Shafiei, Ahmad Khonsari:
Serverless Computing: Opportunities and Challenges. CoRR abs/1911.01296 (2019) - 2018
- [j7]Tooska Dargahi, Hamid H. S. Javadi, Hosein Shafiei, Payam Mousavi:
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks. Int. J. High Perform. Comput. Netw. 11(2): 117-128 (2018) - 2017
- [j6]Abolfazl Diyanat, Ahmad Khonsari, Hosein Shafiei:
Preservation of temporal privacy in body sensor networks. J. Netw. Comput. Appl. 96: 62-71 (2017) - [j5]Tooska Dargahi, Hamid H. S. Javadi, Hosein Shafiei:
Securing Underwater Sensor Networks Against Routing Attacks. Wirel. Pers. Commun. 96(2): 2585-2602 (2017) - 2015
- [j4]Hosein Shafiei, Ahmad Khonsari, Mohamed Ould-Khaoua:
An effective countermeasure against traffic analysis attacks in wide area measurement systems. Inf. Syst. 53: 182-189 (2015) - [j3]Elahe Naserian, Seyed Mohammad Ghoreyshi, Hosein Shafiei, Payam Mousavi, Ahmad Khonsari:
Cooling aware job migration for reducing cost in cloud environment. J. Supercomput. 71(3): 1018-1037 (2015) - [i2]Ahmad Khonsari, Seyed Pooya Shariatpanahi, Abolfazl Diyanat, Hossein Shafiei:
On the Feasibility of Wireless Interconnects for High-throughput Data Centers. CoRR abs/1506.03551 (2015) - 2014
- [j2]Hosein Shafiei, Ahmad Khonsari, H. Derakhshi, Payam Mousavi:
Detection and mitigation of sinkhole attacks in wireless sensor networks. J. Comput. Syst. Sci. 80(3): 644-653 (2014) - 2013
- [i1]Hosein Shafiei, Ahmad Khonsari, H. Derakhshi, Payam Mousavi:
Rate-Privacy in Wireless Sensor Networks. CoRR abs/1302.1506 (2013) - 2012
- [j1]Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Talebi, Mohamed Ould-Khaoua:
A key-distribution mechanism for wireless sensor networks using Zig-Zag product. Int. J. Ad Hoc Ubiquitous Comput. 11(1): 1-10 (2012) - 2011
- [c8]Hosein Shafiei, Ahmad Khonsari, Baharan Mirzasoleiman, Mohamed Ould-Khaoua:
Reuse-Attack Mitigation in Wireless Sensor Networks. ICC 2011: 1-5
2000 – 2009
- 2009
- [c7]Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Talebi, Mohamed Ould-Khaoua, Nazanin Dehghani:
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks. GLOBECOM 2009: 1-6 - [c6]Hosein Shafiei, Zahra Aghazadeh, Ahmad Khonsari, Mohamed Ould-Khaoua:
PeerStar: An attractive alternative to existing peer-to-peer topologies. ISCC 2009: 128-134 - [c5]Ali Jafari, Hosein Shafiei, Baharan Mirzasoleiman, Ghodrat Sepidnam:
Utility Proportional Optimization Flow Control for Overlay Multicast. ISPA 2009: 401-407 - 2008
- [c4]Hosein Shafiei, Arash Mehdizadeh, Ahmad Khonsari, Mohamed Ould-Khaoua:
A Combinatorial Approach for Key-Distribution in Wireless Sensor Networks. GLOBECOM 2008: 138-142 - [c3]Arash Mehdizadeh, Morteza Saheb Zamani, Hosein Shafiei:
An Efficient Method to Estimate Crosstalk after Placement Incorporating a Reduction Scheme. ISVLSI 2008: 233-238 - [c2]Hosein Shafiei, F. Hoseini, Ahmad Khonsari, Mohamed Ould-Khaoua:
A graph theoretic approach in achieving robust peer-to-peer networking paradigm. LCN 2008: 538-539 - 2007
- [c1]Farshad Safaei, Mahmood Fathy, Ahmad Khonsari, Mohamed Ould-Khaoua, Hosein Shafiei, S. Khosravipour:
On Quantifying Fault Patterns of the Mesh Interconnect Networks. AINA 2007: 956-961
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-15 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint