Hosein Shafiei

Orcid: 0000-0002-4125-3595

According to our database1, Hosein Shafiei authored at least 25 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EneX: An Energy-Aware Execution Scheduler for Serverless Computing.
IEEE Trans. Ind. Informatics, February, 2024

2022
Serverless Computing: A Survey of Opportunities, Challenges, and Applications.
ACM Comput. Surv., January, 2022

Energy-Efficient Resource Allocation and Antenna Selection for IRS-Assisted Multicell Downlink Networks.
IEEE Wirel. Commun. Lett., 2022

Detection of fickle trolls in large-scale online social networks.
J. Big Data, 2022

Reinforcement-Learning-Based Resource Allocation for Energy-Harvesting-Aided D2D Communications in IoT Networks.
IEEE Internet Things J., 2022

Resource allocation for IRS-assisted MC MISO-NOMA system.
IET Commun., 2022

2020
The Tongue Can Paint: Understanding Popularity in Podcasting Societies.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

2019
Serverless Computing: Opportunities and Challenges.
CoRR, 2019

2018
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018

2017
Securing Underwater Sensor Networks Against Routing Attacks.
Wirel. Pers. Commun., 2017

Preservation of temporal privacy in body sensor networks.
J. Netw. Comput. Appl., 2017

2015
Cooling aware job migration for reducing cost in cloud environment.
J. Supercomput., 2015

An effective countermeasure against traffic analysis attacks in wide area measurement systems.
Inf. Syst., 2015

On the Feasibility of Wireless Interconnects for High-throughput Data Centers.
CoRR, 2015

2014
Detection and mitigation of sinkhole attacks in wireless sensor networks.
J. Comput. Syst. Sci., 2014

2013
Rate-Privacy in Wireless Sensor Networks
CoRR, 2013

2012
A key-distribution mechanism for wireless sensor networks using Zig-Zag product.
Int. J. Ad Hoc Ubiquitous Comput., 2012

2011
Reuse-Attack Mitigation in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

2009
Utility Proportional Optimization Flow Control for Overlay Multicast.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

PeerStar: An attractive alternative to existing peer-to-peer topologies.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A graph theoretic approach in achieving robust peer-to-peer networking paradigm.
Proceedings of the LCN 2008, 2008

An Efficient Method to Estimate Crosstalk after Placement Incorporating a Reduction Scheme.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2008

A Combinatorial Approach for Key-Distribution in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
On Quantifying Fault Patterns of the Mesh Interconnect Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007


  Loading...