default search action
Hossein Bahramgiri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j8]Ehsan Zadkhosh, Hossein Bahramgiri, Masoud Sabaei:
Middlebox selection optimization via an intelligent framework in software-defined networking. Trans. Emerg. Telecommun. Technol. 32(4) (2021) - [j7]Rashid Hatami, Hossein Bahramgiri:
KDB: a fast update and high speed packet classifier in SDN. J. Supercomput. 77(8): 8911-8926 (2021) - 2020
- [j6]Rashid Hatami, Hossein Bahramgiri:
Fast SDN updates using tree-based architecture. Int. J. Commun. Networks Distributed Syst. 25(3): 333-346 (2020) - 2019
- [j5]Rashid Hatami, Hossein Bahramgiri:
High-performance architecture for flow-table lookup in SDN on FPGA. J. Supercomput. 75(1): 384-399 (2019) - 2017
- [j4]Rahim Entezari, Hossein Bahramgiri, Mahnaz Tajamolian:
RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud. Comput. Commun. 98: 97-105 (2017) - 2016
- [j3]Hossein Jadidoleslamy, Mohammad Reza Aref, Hossein Bahramgiri:
A statistical distributed multipath routing protocol in wireless sensor networks. Int. J. Internet Protoc. Technol. 9(4): 161-173 (2016) - [j2]Akram Khalesi, Hossein Bahramgiri, Davod Mansuri:
A new method for accelerating impossible differential cryptanalysis and its application on LBlock. ISC Int. J. Inf. Secur. 8(1): 73-84 (2016) - 2010
- [j1]Hossein Bahramgiri, Farshad Lahouti:
Robust network coding against path failures. IET Commun. 4(3): 272-284 (2010)
Conference and Workshop Papers
- 2016
- [c8]Seyed Javid Haghighat Hosseini, Hossein Bahramgiri:
Number of frequency slots in low collision Reed Solomon based frequency hopping sequences. IWCIT 2016: 1-6 - 2014
- [c7]Rahim Entezari, Hossein Bahramgiri, Mahnaz Tajamolian:
A mafia and distance fraud high-resistance RFID distance bounding protocol. ISCISC 2014: 67-72 - [c6]Akram Khalesi, Hossein Bahramgiri, Davod Mansuri:
Impossible differential cryptanalysis of LBlock through breaking down the key space. ISCISC 2014: 79-83 - 2012
- [c5]Mohsen Farhang, Hossein Bahramgiri, Hamid Dehghani:
Automatic modulation classification using an 8PSK demodulator for variants of QPSK. IST 2012: 317-321 - 2011
- [c4]Mohsen Farhang, Hamid Dehghani, Hossein Bahramgiri:
Multi-receiver modulation classification for satellite communications signals. ICSIPA 2011: 569-573 - 2008
- [c3]Hossein Bahramgiri, Farshad Lahouti:
Block network error control codes and syndrome-based maximum likelihood decoding. ISIT 2008: 807-811 - 2007
- [c2]Hossein Bahramgiri, Mohammad Jabbari, Farshad Lahouti:
Robust Network Coding in the Presence of Link Failure Using a Multicast Rate-Diversity Trade off. ITW 2007: 5- - 2002
- [c1]Hossein Bahramgiri, Jawad A. Salehi:
Multiple-shift acquisition algorithm in ultra-wide bandwidth frame time-hopping wireless CDMA systems. PIMRC 2002: 1824-1828
Informal and Other Publications
- 2024
- [i3]Hanieh Rashidpour, Hossein Bahramgiri:
MAC protocol classification in the ISM band using machine learning methods. CoRR abs/2408.12059 (2024) - 2018
- [i2]Rashid Hatami, Hossein Bahramgiri, Ahmad Khonsari:
High Performance Architecture for Flow-Table Lookup in SDN on FPGA. CoRR abs/1801.00840 (2018) - 2008
- [i1]Hossein Bahramgiri, Farshad Lahouti:
Block Network Error Control Codes and Syndrome-based Complete Maximum Likelihood Decoding. CoRR abs/0809.4149 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint