Seyyed Amir Asghari

Orcid: 0000-0003-1506-3533

Affiliations:
  • Amirkabir University of Technology, Tehran, Iran


According to our database1, Seyyed Amir Asghari authored at least 19 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach.
J. Supercomput., January, 2024

2022
A power constrained approximate multiplier with a high level of configurability.
Microprocess. Microsystems, April, 2022

An Improved Process Supervision and Control Method for Malware Detection.
Int. Arab J. Inf. Technol., 2022

IBU: An In-Block Update Address Mapping Scheme for Solid-State Drives.
IEEE Access, 2022

RLBEEP: Reinforcement-Learning-Based Energy Efficient Control and Routing Protocol for Wireless Sensor Networks.
IEEE Access, 2022

2021
Configurable DSI partitioned approximate multiplier.
Future Gener. Comput. Syst., 2021

2020
CA-Dedupe: content-aware deduplication in SSDs.
J. Supercomput., 2020

A novel method for victim block selection for NAND flash-based solid state drives based on scoring.
J. Supercomput., 2020

A software implemented comprehensive soft error detection method for embedded systems.
Microprocess. Microsystems, 2020

Modeling Geographical Anycasting Routing in Vehicular Networks.
KSII Trans. Internet Inf. Syst., 2020

Anycast routing in time-expanded vehicular networks.
Comput. Electr. Eng., 2020

2019
FRCD: Fast recovery of compressible data in flash memories.
Comput. Electr. Eng., 2019

2018
Enhancing transient fault tolerance in embedded systems through an OS task level redundancy approach.
Future Gener. Comput. Syst., 2018

2015
An effective soft error detection mechanism using redundant instructions.
Int. Arab J. Inf. Technol., 2015

2014
Software-Based Control Flow Checking Against Transient Faults in Industrial Environments.
IEEE Trans. Ind. Informatics, 2014

2013
An Effective Control Flow Checking Method for Multitask Processing in harsh Environments.
J. Circuits Syst. Comput., 2013

2012
Ontology-based modeling of DDoS attacks for attack plan detection.
Proceedings of the 6th International Symposium on Telecommunications, 2012

2011
Designing a self-organised system for service substitution and placement in wireless sensor networks.
IET Wirel. Sens. Syst., 2011

2009
A Fault Injection Attitude based on Background Debug Mode in Embedded Systems.
Proceedings of the 2009 International Conference on Computer Design, 2009


  Loading...