Citations

 www.partow.net  .: Home :.   .: Contact :. 


The following are papers, patents and products that cite or use works by me.

A Comparative Code Study For Quantum Fault Tolerance
A DDS Discovery Protocol Based On Bloom Filters
A General-Purpose Counting Filter - Making Every Bit Count
A Low Cost Short Range Quantum Key Distribution System
A Modular Framework For Implementing Joint Wireless Network Coding And Scheduling Algorithms
A Multi-Body Simulation Framework For Live Motion Tracking And Analysis Within The Unity Environment
A Multi-Chemistry Modelling Framework To Enable Flexible And Reproducible Water Quality Simulations
A Network-Coding Based Event Diffusion Protocol For Wireless Mesh Networks
A New Approach To Hash Function Construction For Textual Data
A Novel Accuracy And Similarity Search Structure Based On Parallel Bloom Filters
A Pilot Study On Locomotion Training Via Biomechanical Models And A Wearable Haptic Feedback System
A Protection Scheme For Multimedia Packet Streams In Bursty Packet Loss Networks
A Real-Time Reconfigurable Collision Avoidance System For Robot Manipulation
A Scalable Hardware And Software Control Apparatus For Experiments With Hybrid Quantum Systems
A Sequential Indexing Scheme For Flash-Based Embedded Systems
A Simple And Fast Vector Symbol Reed-Solomon Burst Error Decoding Method
A T-Decomposition Algorithm With O(N log N) Time And Space Complexity
A Performance Evaluation And Examination Of Open-Source Erasure Coding Libraries For Storage
Algorithms And Framework For Energy Efficient Parallel Stream Computing On Many-Core Architectures
All-To-All Gradecast Using Coding With Byzantine Failures
An Approach Of Secure Key Exchange Mechanism Based On Audio Data Hiding Technique In RTP
An Indel-Resistant Error-Correcting Code For Dna-Based Information Storage
An Idealistic Neuro-PPM Branch Predictor
An Improved Algorithm For Fast And Accurate Classification Of Sequences
Analysis Of The IEEE 802.15.4A Ultra Wideband Physical Layer
Anomaly-Based Fault Detection In Pervasive Computing Systems
Apache Quickstep
Approximate Encoding For Direct Access And Query Processing Over Compressed Bitmaps
Approximation Of The Value Function For Optimal Control Problems On Stratified Domains
Area And Power Analysis Of A Scalable Primitive Polynomial Computation Circuit Over The Field GF(2)
AREUS: A Software Framework For ATLAS Readout Electronics Upgrade Simulation
Argos: Princeton University's Entry In The 2009 Intelligent Ground Vehicle Competition
Automatic Design Of Noncryptographic Hash Functions Using Genetic Programming
Autonomic Computing And Communications Systems
Basho Riak: An Internet-Scale Data Store
Beschermen Van Multimedia Netwerktrafiek Tegen Transmissiefouten
Binary Polynomial Multiplier
BLESS: Bloom Filter-Based Error Correction Solution For High-Throughput Sequencing Reads
Board Bring-Up With FPGA Framework And Chimeratk On Yocto
Bucket Attack On Numeric Set Watermarking Model And Safeguards
Building High Accuracy Bloom Filters Using Partitioned Hashing
CAREDAS: A Comprehensive Architecture For A Redundant And Evolutive Data Acquisition System For JHR Reactor
Carbon Dioxide Emissions From International Air Freight
Carousel: Scalable Logging For Intrusion Prevention Systems
CasAB: Building Precise Bitmap Indices Via Cascaded Bloom Filters
Case Master USAF AFRL-RI-RS-TR-2009-103
Ceph: Scalable Distributed File System
Charge And Color Breaking Minima In Models With Extended Higgs Sectors
Climate Assessment Of Hydrogen Combustion Aircraft: Towards A Green Aviation Sector
Combining Sketch And Wavelet Models For Anomaly Detection
Comparison Of Hash Table Verses Lexical Transducer Based Implementations Of Urdu Lexicon
Compressed Representation Of Feature Vectors Using A Bloomier Filter
Computational Modelling And Simulation Of Aircraft And The Environment: Volume 1
Computational Social Networks: Mining And Visualization
Coordination-Free Deterministic Communication For Embedded System Using The BBC Encoding Scheme
Coveo Enterprise Search
Crawling Facebook For Social Network Analysis Purposes
Cross-Layer Error Control Optimization In 3G LTE
Cross-Layer Error Recovery Optimization In WiFi Networks
Cross-Layer Error Recovery In Wireless Access Networks: The ARQ Proxy Approach
Cryptanalysis Of Irregularly Clocked LFSR
Cuckoo Hashing With Selectable Hash
Curator: Efficient Indexing For Multi-Tenant Vector Databases
Cyclostationary Random Number Sequences For The Tsetlin Machine
Data Flow Analysis For Anomaly Detection And Identification Toward Resiliency In Extreme Scale Systems
Decentralized Configuration Of Neighboring Cells For Radio Access Networks
DeepBlue Epigenomic Data Server
Delphos Minelink
Dependency Discovery For Data Integration
Detecting Anomalies In Massive Traffic Streams Based On S-Transform Analysis Of Summarized Traffic Entropies
Detecting Cocircular Subsets Of A Spherical Set Of Points
Detection And Mitigation Of High-Rate Flooding Attacks
Design And Evaluation Of Network Coding In A P2P VoD System
Designing A Digital Shadow For Efficient, Low-Delay Analysis Of Production Quality Risk
Dimensional Stacking In Three Dimensions
Dispar: A Parallel Code To Simulate Observational Effects
Distributed Auto-Configuration Of Neighboring Cell Graphs In Radio Access Networks
Domoticz Home Automation System
Dr. Mario Puzzle Generation: Theory, Practice And History
Efficient And Exact Computation Of Inclusion Dependencies For Data Integration
Efficient Counting Of K-Mers In DNA Sequences Using A Bloom Filter
Efficient Signature Based Malware Detection On Mobile Devices
ElastiSim: A Batch-System Simulator For Malleable Workloads
Embedding Meta-Information In Handwriting - Reed-Solomon For Reliable Error Correction
Emergent: Neural Network Simulation System
Empirical Evaluation Of Hash Functions For Multipoint Measurements
Encyclopedia Of Computer Science And Technology
Enhanced Bitmap Indexes for Large Scale Data Management
Energy-Efficient Computing Over Streams With Massively Parallel Architectures
Environmental Impacts On Soil And Groundwater At Airports
Estimating The Spatial Distribution Of High Altitude Wind Energy Potential In Southeast Europe
Evaluation Of Intermediate Refueling Stops In Long-Haul Flight Operations
Evaluating Established B+-Tree Access Methods In A Parallel Processing Environment
Evaluating Methods To Assess The Coastal Flood Hazard On A Global Scale
Experimental Physics And Industrial Control System
Explainable Steel Quality Prediction System Based On Gradient Boosting Decision Trees
Exploring Mobile Proxies For Better Password Authentication
Exploring The Processor And ISA Design For Wireless Sensor Network Applications
Extended Precision Accumulator
Extendible Repeated Data Detection Method
Extraction And Analysis Of Facebook Friendship Relations
Factors Affecting Covid-19 Outbreaks Across The Globe: Role Of Extreme Climate Change
Fine-Grained Tracking Of Grid Infections
Flexible Robot-Based Production
FontLab
Forward Error Correction Encoding On The Multiple Input/Multiple Output Free Space Optical Communications Channel
From Measurements To Knowledge - Online Quality Monitoring And Smart Manufacturing
Functionality Pattern Matching As An Efficient Complementary Structure/Reaction Search Tool
Gaining Control Of Cellular Traffic Accounting By Spurious TCP Retransmission
GenISys BEAMER - Electron-Beam and Laser Lithography Software
Geomage - Seismic Data Processing System
G+Smo - Geometry & Simulation Modules
Global Emission Inventories In The Emission Database For Global Atmospheric Research (EDGAR)
Global Priorities For An Effective Information Basis Of Biodiversity Distributions
Google Andriod Emulator
GPU Support For Batch Oriented Workloads
GranOO - DEM Based 3D Dynamic Simulations
Harnessing Stratospheric Diffusion Barriers For Enhanced Climate Geoengineering
Hashed Indexing
Hashing Functions Performance In Packet Classification
Hashing Techniques: A Survey And Taxonomy
HashMTI: Scalable Mutation-Based Taint Inference With Hash Records
HEDGES: Error-Correcting Code For DNA Storage Corrects Indels And Allows Sequence Constraints
High-Performance Filters For GPUs
High-Performance Processing In Networked And Grid Environments
Hierarchical Color Recognition Method Of License Plates
HP Helion
Hyperspace Index
Identifying Harmful Media In End-To-End Encrypted Communication
Identifying The Provenance Of Correlated Anomalies
Illustratieve Software Voor Symmetrische Cryptografie
Implementation And Evaluation Of Certificate Revocation List Distribution For Vehicular Ad-Hoc Networks
Implementation Of A Reed-Solomon Architecture For Use In 10.7 Gbps OTN Networks
Improving Quality Of High-Throughput Sequencing Reads
Infrastructure-Dependent Wireless Multicast - Improving The Code Rate
Integrating The Five Steps Of Plotting A Plotting Tool Design
Integration Of Qualitative And Quantitative Hybrid Causal Logic Into A Simulation-Based Platform For Probabilistic Risk Assessment Of Nuclear Power Plants
Intel - Vision Algorithm Designer (VAD)
Investigation Of Optimal Data Encoding Parameters Based On User Preference For Cloud Storage
Jamais Vu: Thwarting Microarchitectural Replay Attacks
Kratos: Princeton University's Entry In The 2008 Intelligent Ground Vehicle Competition
La Steganographie Moderne : L’Art De La Communication Secrete
Large-Scale Community Structure Analysis In Facebook
LOFT: Low-Overhead Freshness Transmission In Sensor Networks
LONI ShapeTools
LABUST Mission Planner
MagnaView
Mass Production Of Unvouchered Records Fails To Represent Global Biodiversity Patterns
Matrix-Based Error Correction And Erasure Code Methods And Apparatus And Applications Thereof
Memory-Efficient Content Filtering Hardware For High-Speed Intrusion Detection Systems
Memory Reduction With Bloomier Filters For Specific Object Recognition
Methods And Apparatuses For Generating Dynamic Pairwise Master Keys
Method, Apparatus And Media For Performing GF(2) Polynomial Operations
Method Of Storing A Data Set In A Distributed Storage System
Microprocessor Instructions For Performing Polynomial Arithmetic Operations
Mobile Relay Scheduling In Partitioned Wireless Sensor Networks
Model Checking Dynamic Memory Allocation In Operating Systems
Modeling The Logistics Of Fedex International Express
Moderne Handlungsplanung
Modified Collision Packet Classification Using Counting Bloom Filter In Tuple Space
Mobile Robot Programming Toolkit
MORSE
Multipatch Discontinuous Galerkin Isogeometric Analysis
Multi-Dimensional Ellipsoidal Fitting
Multi-Level Intrusion Detection System (ML-IDS)
Multiple Description Coding And Practical Network Coding For Video Multicast
NASA Multi-Instrument Intercalibration System
NASA Multi-Instrument Intercalibration (MIIC) Framework
Natron - Cross-Platform Open-Source Compositing Software
Network Coding For Rate Adaptive Wireless Links
Neuro-PPM Branch Prediction
NifTools
Non-Linear Pseudorandom Bit Generation By Combining Blum Blum Shub And Linear Feedback Shift Register Sequences
NorduGrid ARC
Novel Accuracy And Similarity Search Structure Based On Parallel Bloom Filters
On The Detection Of Permutation Polynomials
OpenCPI
OpenWQ: A Multi-Chemistry Modelling Framework
Online Diversity Control In Symbolic Regression Via A Fast Hash-Based Tree Similarity Measure
Optimized C++ - Proven Techniques for Heightened Performance
Optimizing Network Data Transfer By Profile Aggregation
Overcoming High Nanopore Basecaller Error Rates For DNA Storage Via Basecaller-Decoder Integration And Convolutional Codes
Packet Prediction For Speculative Cut-Through Switching
Parabix
Parallelized Montgomery Exponentiation In Gf(2^K) For Diffie–Hellman Key Exchange Protocol
PartialSync: Efficient Synchronization Of A Partial Namespace In NDN
Payment With Dispute Resolution: A Protocol For Reimbursing Frauds Victims
PBFilter: Indexing Flash-Resident Data Through Partitioned Summaries
Performance Evaluation Of Sketch Schemes On Traffic Anomaly Detection Accuracy
Performance Of The Most Common Non-Cryptographic Hash Functions
Perun: Performance Version System
PolarTag: Invisible Data with Light Polarization
Predicting The Resilience Of Obfuscated Code Against Symbolic Execution Attacks Via Machine Learning
Private Set Intersection For Unequal Set Sizes With Mobile Applications
Progressive Hashing For Packet Processing Using Set Associative Memory
Protecting Against DNS Reflection Attacks With Bloom Filters
Protection Scheme For Multimedia Packet Streams In Bursty Packet Loss Networks
PSBF: P-Adic Integer Scalable Bloom Filter
QASMTrans: A QASM Quantum Transpiler Framework For NISQ Devices
Query Support For Multi-Dimensional And Dynamic Databases
Quotient Filters: Approximate Membership Queries On The GPU
RayV
Reconstruction Of Clock Sequences In Irregularly Clocked Pseudorandom Sequence Generators
Reducing Misses To External Memory Accesses In Task-Level Pipelining
Red Hat OpenShift
Retargetable Optimizing Compilers For Quantum Accelerators Via A Multilevel Intermediate Representation
Research On Network Content Audit Based On Information Fingerprint
Resource Estimation Of Upper Layer Network Traffic Analysis
Result-Pattern-Hiding Conjunctive Searchable Symmetric Encryption With Forward And Backward Privacy
Retargetable Optimizing Compilers For Quantum Accelerators Via A Multi-Level Intermediate Representation
Rethinking Erasure Codes For Cloud File Systems
RSA Hosted Adaptive Authentication
RSA SecureID
Runway Extraction And Improved Mapping From Space Imagery
Runtime Execution Tracing And Alignment With PANDA
Scaling Multi-Core Network Processors Without The Reordering Bottleneck
Searching Encrypted Data
Security Analysis Of Bloom Filter Based Multicast Forwarding
Service-Aware Performance Optimization Of Wireless Access Networks
Shape-Tools
Simplistic Hashing For Building A Better Bloom Filter On Randomized Data
Simultaneously Reducing Latency And Power Consumption In Openflow Switches
Simulation And Data Analysis For LISA
Simulation Of The Upgraded Phase-1 Trigger Readout Electronics Of The Atlas Detector At The LHC
Simulations Of Spin/Polarization-Resolved Laser–Plasma Interactions In The Nonlinear QED Regime
Single Double Cuckoo Hash
Skywin Technical Report
Sliding Window-Based Approximate Triangle Counting Over Streaming Graphs With Duplicate Edges
Space-Efficient Bloom Filters For Enforcing Integrity Of Outsourced Data In Cloud Environments
Space-Efficient Reed-Solomon Encoding to Detect and Correct Pointer Corruption
Steering Languages And Future Science Codes
Substituting Portion Of Template Instruction Parameter With Selected Virtual Instruction Parameter
Systems And Methods For Operating A Saturated Hash Table
Taboo Search Based Metaheuristic for Solving Multiple Depot VRPPD with Intermediary Depots
Tackling GPU Memory Size Limitations
Tangible Scalar Fields
The Algorithms For Preliminary Text Processing: Decomposition, Annotation, Morphological Analysis
The Application Of Artificial Intelligence
The Berlekamp-Massey Algorithm For Galois Fields And Its Application
The Design And Implementation Of Unikv For Mixed Key-Value Storage Workloads
The SKA Dish Local Monitoring And Control System
Threshold Devices: Looking Out From The Home
Token-Based Graphical Password Authentication
Towards An Automatic Design Of Non-Cryptographic Hash Function
Towards Dynamic Simulation Of A Whole Cell Model
Traceback-Based Bloomfilter IPS In Defending SYN Flooding Attacks
Tracktable: Trajectory Analysis and Rendering
Tuplex: Data Science In Python At Native Code Speed
UAA Inventory: Greenhouse Gas Emisions From Transportation
UnionFS-Fuse
USQCD ADAT
Using R-Indiscernibility Relations To Hide The Presence Of Information For The Least Significant Bit Steganography Technique
VENTOS: Vehicular Network Open Simulator with Hardware-in-the-Loop Support
Virtual Instruction Expansion Using Parameter Selectors
Volvo Telematics Service Platform
Vortex Searching
waLBerla - Massively Parallel Lattice Boltzmann Method Framework
Wireless Communications: 2007 CNIT Thyrrenian Symposium
XSiena: eXtended Scalable Internet Event Notification Architecture


© Arash Partow. All Rights Reserved.