Mostafa Esmaeili

Orcid: 0000-0001-6918-3210

According to our database1, Mostafa Esmaeili authored at least 23 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Enterprise Social Networking Platform and Employees' Job Mobility.
Proceedings of the 43rd International Conference on Information Systems, 2022

Instant Messaging and Employee's Performance: A Text Mining Approach.
Proceedings of the 43rd International Conference on Information Systems, 2022

2017
Application of Dual-Polarimetry SAR Images in Multitemporal InSAR Processing.
IEEE Geosci. Remote. Sens. Lett., 2017

Code-based security with random interleaving.
IET Commun., 2017

2016
A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors.
IEEE Commun. Lett., 2016

2012
Maximum-Girth Cylinder-Type Block-Circulant LDPC Codes.
IEEE Trans. Commun., 2012

2011
Multi-domain restoration with crankback in IP/MPLS networks.
Opt. Switch. Netw., 2011

High rate fibonacci polynomial codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Service overlays for Ethernet LAN over SONET/SDH.
Opt. Switch. Netw., 2010

Enhanced crankback for lightpath setup in multi-domain optical networks.
IEEE Commun. Lett., 2010

Enhanced crankback signaling for multi-domain IP/MPLS networks.
Comput. Commun., 2010

A Fibonacci-polynomial based coding method with error detection and correction.
Comput. Math. Appl., 2010

Enhanced Crankback Signaling for Multi-Domain Traffic Engineering.
Proceedings of IEEE International Conference on Communications, 2010

Advanced crankback provisioning for multi-domain networks.
Proceedings of the 11th IEEE International Conference on High Performance Switching and Routing, 2010

2009
Geometrically-structured maximum-girth LDPC block and convolutional codes.
IEEE J. Sel. Areas Commun., 2009

Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic.
Int. J. Electron. Secur. Digit. Forensics, 2009

2008
Maximum-girth slope-based quasi-cyclic (2, k ≥ 5) low-density parity-check codes.
IET Commun., 2008

Applying Variable Competition Range for Prolonging the Lifetime of WSN.
Proceedings of the 16th International Symposium on Modeling, 2008

The Modeling of Pulsatile Blood Flow as Cross-Williamson and Carreau Fluids in an Artery with a Partial Occlusion.
Proceedings of the EMS 2008, 2008

O2DSS: A Framework for Ontology-Based Decision Support Systems in Pervasive Computing Environment.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
DACA: Dynamic Advanced Clustering Algorithm for Sensor Networks.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Challenge in QoS Supporting via Integrating Differentiated Service and Multipath Routing on Mobile Ad Hoc Network.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007


  Loading...