Author of the publication

Optimal Placement of Frequently Accessed IPs in Mesh NoCs.

, , and . Asia-Pacific Computer Systems Architecture Conference, volume 4697 of Lecture Notes in Computer Science, page 126-138. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Abbaspour, Maghsoud
add a person with the name Abbaspour, Maghsoud
 

Other publications of authors with the same name

RAAS: a reliable analyzer and archiver for snort intrusion detection system., , , , , and . SAC, page 259-263. ACM, (2007)IFRP: an intrusion/fault tolerant routing protocol for increasing resiliency and reliability in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 14 (1): 52-69 (2013)An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets., , , and . CoRR, (2018)APDL: A Processor Description Language For Design Space Exploration of Embedded Processors., , , and . FDL, page 50-55. ECSI, (2007)Dual-Path Peer-to-Peer Anonymous Approach., and . ICPADS, page 835-838. IEEE Computer Society, (2010)A Centralized Approach for Secure Location Verification in Wireless Sensor Networks., , and . S-CUBE, volume 57 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 151-163. Springer, (2010)SEFF: A scalable and efficient distributed file sharing technique in Vehicular Ad Hoc Networks., , and . APCC, page 456-460. IEEE, (2011)A heuristic routing mechanism using a new addressing scheme., , , and . BIONETICS, page 37. ACM, (2006)Optimal Placement of Frequently Accessed IPs in Mesh NoCs., , and . Asia-Pacific Computer Systems Architecture Conference, volume 4697 of Lecture Notes in Computer Science, page 126-138. Springer, (2007)Securing BitTorrent using a new reputation-based trust management system., and . Peer-to-Peer Netw. Appl., 6 (1): 86-100 (2013)