Mohsen Beheshti

According to our database1, Mohsen Beheshti authored at least 26 papers between 1995 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
MIF: Optimizing Information Freshness in Intermittently Connected Sensor Networks.
Proceedings of the WUWNet'21: The 15th International Conference on Underwater Networks & Systems, Shenzhen, Guangdong, China, November 22, 2021

2019
DAO-R: integrating data aggregation and offloading in sensor networks via data replication.
Int. J. Sens. Networks, 2019

2016
A MacBook based earthquake early warning system.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Power-efficient virtual machine replication in data centers.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2012
Facilitating Agile Software Development with Lean Architecture in the DCI Paradigm.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

The Design and Implementation of an Antivirus Software Advising System.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2011
The Computing Alliance of Hispanic-Serving Institutions: Supporting Hispanics at Critical Transition Points.
ACM Trans. Comput. Educ., 2011

Software Project Scheduling Using a Multi-Agent System.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

An Event-Driven Interactive Model of Information Resource Management.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
A Knowledge-Based System Implementation of Intrusion Detection Rules.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Component Based Information Network for Computer Security.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Component-Based Software Architecture Design for Network Intrusion Detection and Prevention System.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Improving Security Through Analysis of Log Files Intersections.
Int. J. Netw. Secur., 2008

Diabetes Data Analysis and Prediction Model Discovery Using RapidMiner.
Proceedings of the International Conference on Bio-Science and Bio-Technology, 2008

2007
An Iterative Approach for Fuzzy Clustering Based on Feature Significance.
J. Adv. Comput. Intell. Intell. Informatics, 2007

Data Fusion Support for Intrusion Detection and Prevention.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Discovering Both Positive and Negative Fuzzy Association Rules in Large Transaction Databases.
J. Adv. Comput. Intell. Intell. Informatics, 2006

Analysis of Log Files Intersections for Security Enhancement.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Mining fuzzy association rules: interestingness measure and algorithm.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2005
Nonlinear Perspective Projections and Magic Lenses: 3D View Deformation.
IEEE Computer Graphics and Applications, 2005

2002
Applying Fuzzy Relation Equations to Threat Analysis.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

1998
On Interval Weighted Three-Layer Neural Networks.
Proceedings of the Proceedings 31st Annual Simulation Symposium (SS '98), 1998

1997
A Performance Evaluation for a Concurrency Control Mechanism in an ODBMS.
Proceedings of the 1997 International Conference on Object Oriented Information Systems, 1997

Instructional software for closed laboratories in CS1.
Proceedings of the 2nd Annual Conference on Integrating Technology into Computer Science Education, 1997

1996
Concurrency Control in an Object-Oriented DBMS by Exploiting Navigation.
Proceedings of the Multimedia, 1996

1995
Logical Optimization when Uncertainty is Present.
Proceedings of the 6th Int. Conf. and Workshop on Database and Expert Systems Applications, 1995


  Loading...