Abstract is missing.
- Data forwarding scheme to minimize end-to-end delay in Opportunistic NetworksNarges Arastouie, Masoud Sabaei. 1-5 [doi]
- A game theoretic approach to joint resource management in wireless ad hoc networksMoein Aliaskari, Ali Shahzadi. 6-11 [doi]
- A low-power smart temperature sensor for passive UHF RFID tags and Sensor netsMohammadreza Ghaderi Karkani, Mahmoud Kamarei, Ali Fotowat Ahmady. 12-17 [doi]
- Distributed area coverage in mobile directional sensor networksMarzieh Varposhti, Peyman Saleh, Shahryar Afzal, Mehdi Dehghan 0001. 18-23 [doi]
- Best fit (BF): A new Spectrum Allocation mechanism in Elastic Optical Networks (EONs)Forough Shirin Abkenar, Akbar Ghaffarpour Rahbar, Amin Ebrahimzadeh. 24-29 [doi]
- BER performance of OFDM-based wireless services over radio-on-FSO links in the presence of turbulence and pointing errorsMohammad Taghi Dabiri, Mohammad Javad Saber, Seyed Mohammad Sajad Sadough. 30-33 [doi]
- Improved Routing and Spectrum Assignment formulations for optical OFDM networksMohammad Hadi, Mohammad Reza Pakravan. 34-39 [doi]
- Efficient Integration of Switching Mechanisms in all-optical networksLida Ghaemi Dizaji, Akbar Ghaffarpour Rahbar. 40-44 [doi]
- Spectrum-usage-aware resource allocation and multicast routing in elastic optical networksMehrdad Moharrami, Hamzeh Beyranvand, Ahmad Fallahpour, Jawad A. Salehi. 45-50 [doi]
- Reputation-based Likelihood Ratio Test with anchor nodes assistanceAbbas Ali Sharifi, Morteza Sharifi, Javad Musevi Niya. 51-56 [doi]
- Efficient collaborative wideband soft detection for confronting primary user emulation attackMohammad Javad Saber, Seyed Mohammad Sajad Sadough. 57-61 [doi]
- Rate optimization in NOMA cognitive radio networksNegar Zabetian, Mina Baghani, Abbas Mohammadi 0001. 62-65 [doi]
- Secure multiple antennas spectrum sensing under continuous attacking trafficAli Karimi, Abbas Taherpour, Zahra Pourgharehkhan. 66-71 [doi]
- Sum throughput maximization for downlink MIMO-OFDMA based cognitive radio networks in spectrum overlay modelMahla Mohammadi, Seyed Mehdi Hosseini Andargoli. 72-77 [doi]
- A multi sender attribute-based broadcast authentication schemeSaeed Aghapour, Mohammad Hassan Ameri, Javad Mohajeri. 78-83 [doi]
- Deniable Encryption based on Standard RSA with OAEPHabib Allah Yajam, Younes Karimi Ahmadabadi, Mohammad Ali Akhaee. 84-88 [doi]
- A conceptual trust model for the Internet of Things interactionsAbouzar Arabsorkhi, Mohammad Sayad Haghighi, Roghayeh Ghorbanloo. 89-93 [doi]
- A secure and area-efficient FPGA-based SR-Latch PUFAmir Ardakani, Shahriar Baradaran Shokouhi. 94-99 [doi]
- Proposed new features to improve Android malware detectionMahdi Vajdi, Atefeh Torkaman, Marjan Bahrololum, M. H. Tadayon, Afshin Salajegheh. 100-104 [doi]
- Security considerations and requirements for Cloud computingFariba Ghaffari, Hossein Gharaee, Mohammad Reza Forouzandehdoust. 105-110 [doi]
- Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standardBehzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, Mohammad Reza Aref. 111-116 [doi]
- A novel network based privacy frameworkMina Yadegari, Hossein Gharaee. 117-123 [doi]
- A secure attribute based keyword search scheme against keyword guessing attackVahid Yousefipoor, Mohammad Hassan Ameri, Javad Mohajeri, Taraneh Eghlidos. 124-128 [doi]
- Provide a solution for user validation and expertise degree dynamic in collaborative systemsAhmad Agha Kardan, Roghaye Ahmadi. 129-133 [doi]
- Secure communications in OFDMA decode and forward relay assisted networks in presence of multiple eavesdroppersMohammad R. Javan, Saeed Sheikhzadeh, Nader Mokari. 134-138 [doi]
- A new feature selection IDS based on genetic algorithm and SVMHossein Gharaee, Hamid Hosseinvand. 139-144 [doi]
- Automated analysis method for forensic investigation of cloud applications on AndroidFarid Daryabar, Mohammad Hesam Tadayon, Ashkan Parsi, Hadi Sadjadi. 145-150 [doi]
- Malware detection using opcodes statistical featuresSaeid Rezaei, Ali Afraz, Fereidoon Rezaei, Mohammad Reza Shamani. 151-155 [doi]
- Welcome to Binder: A kernel level attack model for the Binder in Android operating systemMajid Salehi, Farid Daryabar, Mohammad Hesam Tadayon. 156-161 [doi]
- Lightweight, anonymous and mutual authentication in IoT infrastructureShadi Janbabaei, Hossein Gharaee, Naser MohammadZadeh. 162-166 [doi]
- LDPC decoder implementation using FPGAMahdie Kiaee, Hossein Gharaee, Naser MohammadZadeh. 167-173 [doi]
- Quantum Secret Sharing using single statesRazieh Mohajer, Ziba Eslami. 174-177 [doi]
- An efficient implementation of Fuzzy C-Means and watershed algorithms for MRI segmentationFarnaz Hoseini, Asadollah Shahbahrami. 178-184 [doi]
- A new density estimator based on nearest and farthest neighborAzadeh Faroughi, Reza Javidan, Mohsen Emami. 185-190 [doi]
- Comparison of several sparse recovery methods for low rank matrices with random samplesAshkan Esmaeili, Farokh Marvasti. 191-195 [doi]
- A modified hybrid Fuzzy clustering method for big dataAmir Khoshkbarchi, Ali Kamali, Mehdi Amjadi, Maryam Amir Haeri. 196-201 [doi]
- Big data: A Coevolutionary strategic roadmapDavood Maleki, Ehsan Arianyan, Mohammad Reza Ahmadi. 202-207 [doi]
- On singularity extraction of time-domain Green's functions of layered mediaSaeed Souri, Mohsen Ghaffari-Miab. 208-211 [doi]
- A cooperative spectrum leasing scheme with guaranteed secrecy rate for primary linkS. Vatanpour, M. Javan. 212-217 [doi]
- A low-complexity near-optimal algorithm for blind estimation of pseudo-noise sequences in DSSS communication systemsSaeed Mehboodi, Ali Jamshidi 0001, Mahmoud Farhang. 218-221 [doi]
- On the uplink spectral efficiency of full-duplex cooperative OFDMA systemsJafar Banar, S. Mohammad Razavizadeh. 222-226 [doi]
- Spatial interference alignment in relay-assisted multi-cell multi-user networksAli Golestani, Ali H. Bastami, Kamal Mohamed-Pour. 227-232 [doi]
- A novel relay selection scheme for SSK modulation in cooperative communicationMohammad Esmaeili, Abbas Mohammadi 0002. 233-238 [doi]
- A realistic receiver model for neuro-spike communicationReyhaneh Bigharaz, Ali Jamshidi, Alireza Keshavarz-Haddad. 239-244 [doi]
- On distributed transmission of remote correlated Gaussian sources over an orthogonal Gaussian multiple-access channelMehdi Setayesh, Hamid Behroozi, Babak H. Khalaj. 245-250 [doi]
- A new bargaining approach on the N-user Gaussian interference channelAtena Ebrahim Khani, Babak Seyfe. 251-255 [doi]
- How to select an optimum set of modes for a link adaptive transmissionMehrdad Taki, Reza Mahin Zaeem. 256-260 [doi]
- Reduce impact of false detection of adversary states on the secure cooperative networkMoslem Forouzesh, Paeiz Azmi, Nader Mokari. 261-265 [doi]
- MUSIC-based approaches for hybrid millimeter-wave channel estimationMajid Shakhsi Dastgahian, Hossein Khoshbin Ghomash. 266-271 [doi]
- Minimizing the expected distortion of two-hop networks using multi-layer source codingSayed Ali Khodam Hoseini, Soroush Akhlaghi, Mina Baghani. 272-276 [doi]
- A new channel code for decreasing inter-symbol-interference in diffusion based molecular communicationsParvin Akhkandi, Alireza Keshavarz-Haddad, Ali Jamshidi. 277-281 [doi]
- A selective physical layer network coding for wireless two-way relayingAla Mahdavi, Ali Jamshidi, Alireza Keshavarz-Haddad. 282-287 [doi]
- Performance enhancement of the Golden code by utilizing the ORIOL antennaVahid AmiriKooshki, Mohammadali Sadat Hosseini, Ali Lotfi-Rezaabad, Siamak Talebi. 288-292 [doi]
- Robust resource allocation in Cloud-RAN network based on COMP technologyAtefeh Rezaei, Paeiz Azmi, Nader Mokari. 293-298 [doi]
- QoS improvement in IEEE802.11e using Smart NodesAli Vaezi, Mohammad Yousef Darmani. 299-303 [doi]
- Closed-form error probability of blind detection for free space optical systemsMohammad Taghi Dabiri, Seyed Mohammad Sajad Sadough, Hossein Safi. 304-308 [doi]
- Price-based device-to-device communication underlying cellular networksSara Sharifi, Mohammad Fathi. 309-313 [doi]
- Power control for D2D underlay cellular communication: Game theory approachMohammadamin Baniasadi, Behrouz Maham, Harried Kebriaei. 314-319 [doi]
- Performance analysis of the clustered caching wireless networks considering stochastic geometry approachLeila Enamipour, Zolfa Zeinalpour-Yazdi, Babak Hossein Khalaj. 320-324 [doi]
- Analysis of Energy Efficiency and Area Spectral Efficiency in small cell networks with multi-antenna Base StationsFahimeSadat Mirhosseini, AliAkbar Tadaion. 325-330 [doi]
- Performance analysis of a multi-user diversity in a SIMO spectrum sharing systemBehnam Aghazadeh, Mohammad Torabi. 331-336 [doi]
- Transmit precoding aided spatial modulation for multi-user correlated large-scale MIMO channelsMarjan Maleki, Kamal Mohamed-Pour. 337-342 [doi]
- Joint CFO and channel estimation in OFDM-based massive MIMO systemsHamed Hojatian, Mohammad Javad Omidi, Hamid Saeedi Sourck, Arman Farhang. 343-348 [doi]
- A small dual band antenna with simple structure for WLAN/WIMAX applicationKioumars Pedram, Javad Nourinia, Changiz Ghobadi. 349-352 [doi]
- Outage probability for underlaying Device to Device communicationsHossein Ghavami, Shahriar Shirvani Moghaddam. 353-358 [doi]
- A ray tracing model for beam footprint boundary in cognitive satellite communication applicationsHamed Montazeri-Shatouri, Amir R. Forouzan, Kamal Shahtalebi. 359-363 [doi]
- Non-stationary sparse system identification over adaptive sensor networks with cyclic cooperationAmir Bazdar, Afsaneh Akhbari, Ehsan Mostafapour, Changiz Ghobadi. 364-367 [doi]
- Computing diversity-multiplexing trade-off of static QMF communication strategy in half-duplex diamond relay channelsHediyeh Soltanizadeh, Farzad Parvaresh, S. Mohammad Saberali. 368-373 [doi]
- A genetic approach in relay-jammer selection and power allocation for physical layer securityNiloofar Okati, Mohammad Reza Mosavi, Hamid Behroozi. 374-379 [doi]
- Performance analysis of cooperative wireless body area networks over Gamma fading channelsMaryam Abbaspour-Asadollah, Ehsan Soleimani-Nasab. 380-385 [doi]
- Gain and lower cut-off frequency improvement of antipodal Vivaldi antennaMajid Amiri, Ali Ghafoorzadeh-Yazdi, Abbas-Ali Heidari. 386-390 [doi]
- Gravitational Search Algorithm used to synthesis a planar array antenna for nulling control and side lobe level reductionAtaollah Ebrahimzade, Hajar Abedi, Maryam Hesari. 391-395 [doi]
- Object locating in anisotropic dielectric background using MUSIC algorithmFaezeh Shirmehenji, Abolghasem Zeidaabadi Nezhad, Zaker Hossein Firouzeh. 396-400 [doi]
- Propagation and scattering analysis in a 2D rectangular room using closed-form Green's FunctionMohammad Hossein Sadrearhami, Amir Ahmad Shishegar. 401-404 [doi]
- Analytical approach to design the metasurface based infrared cloakingMohammad Danaeifar, Nosrat Granpayeh. 405-408 [doi]
- Ultra wideband electromagnetic DORT time-reversal localization of single-defect in pipeJavad Ebrahimi-Zadeh, Mojtaba Dehmollaian, Karim Mohammadpour-Aghdam. 409-414 [doi]
- Composite right/left-handed transmission-line based wideband antenna for WLAN, WiMAX and WiFi applicationsMohammad Alibakhshi Kenari, Mohammad Naser-Moghadasi, Ramazan Ali Sadeghzadeh, Bal Singh Virdee, Ernesto Limiti. 415-418 [doi]
- Metallic grating on a periodic anisotropic substrate as a planar Artificial Magnetic ConductorMahmood Rafaei-Booket, Zahra Atlasbaf, Mahmoud Shahabadi. 419-423 [doi]
- Electromagnetic scattering from a PEC target buried beneath a rough surface using KA-PO methodMahdi Behdani, Ahad Tavakoli, Parisa Dehkhoda, Mohammad Zoofaghari. 424-427 [doi]
- Novel band-pass Frequency Selective Surface with stable responseMahdi Taghizadeh, Mohsen Maddahali, Reza Abed. 428-431 [doi]
- Competition over resources algorithm and its application for planar array pattern synthesisHajar Abedi, Reza Gholami, Bijan Zakeri, Sina Mohseni. 432-436 [doi]
- Electromagnetic DORT time reversal dielectric spectroscopyJavad Ebrahimi-Zadeh, Hadi Balegh, Rajab Fallahi. 437-441 [doi]
- A very small broadband CPW-fed circular polarized antenna with two semicircles etched on ground planeMohsen Karamirad, Fereshteh Samadi, Changiz Ghobadi, Javad Nourinia. 442-446 [doi]
- A dual band circularly polarized antenna with parasitic element for gain enhancementFereshteh Samadi, Mohsen Karamirad, Changiz Ghobadi, Javad Nourinia, Rahim Barzeghari. 447-451 [doi]
- Development of a wideband and inclined polarized cavity backed slot antenna using SIW structureAbbas Soltan, Mohammad H. Neshati. 452-455 [doi]
- Hyperspectral images classification by spectral-spatial processingMaryam Imani, Hassan Ghassemian. 456-461 [doi]
- Feature level and decision level fusion in kernel Sparse Representation based ClassifiersTahereh Zare, Mohammad Taghi Sadeghi. 462-467 [doi]
- A new pansharpening method based on cartoon+texture decompositionMeysam Lotfi, Hassan Ghassemian. 468-471 [doi]
- Multimodal image fusion via sparse representation and clustering-based dictionary learning algorithm in NonSubsampled Contourlet domainFahim Shabanzade, Hassan Ghassemian. 472-477 [doi]
- Inter-Symbol Interference analysis in neuro-synaptic communicationsAbolfazl Amiri, Behrouz Maham. 478-483 [doi]
- Automatic Modulation Classification using combination of Wavelet Transform and GARCH modelSara Mihandoost, Mehdi Chehel Amirani. 484-488 [doi]
- Study of speech features robustness for speaker verification application in noisy environmentsMohsen Mohammadi, Hamid Reza Sadegh Mohammadi. 489-493 [doi]
- Supervised speech enhancement using online Group-Sparse Convolutive NMFMidia Yousefi, Mohammad Hassan Savoji. 494-499 [doi]
- Clipping noise estimation in uniform tone reservation scenario using OMP algorithmMohammad Javad Azizipour, Kamal Mohamed-Pour. 500-505 [doi]
- Saliency-guided wireless transmission of still images using SoftCastHadi Hadizadeh. 506-509 [doi]
- Mapping Mel sub-band energies using Deep belief network for robust speech recognitionMojtaba Gholamipour, Babak Nasersharif. 510-514 [doi]
- Game theory modeling of MIMO radar and ARM missile engagementN. Henareh, Y. Norouzi. 515-520 [doi]
- Detecting malicious packet drops and misroutings using Header Space AnalysisAmir Ahmad Mohammadi, Peyman Kazemian, Mohammad Reza Pakravan. 521-526 [doi]
- QRTP: QoS-aware resource reallocation based on traffic prediction in software defined cloud networksMohammad Mahdi Tajiki, Behzad Akbari, Nader Mokari. 527-532 [doi]
- QRVE: QoS-aware routing and energy-efficient VM Placement for Software-Defined DataCenter NetworksPooyan Habibi, Masoud Mokhtari, Masoud Sabaei. 533-539 [doi]
- On the modularity improvement for community detection in overlapping social networksSamaneh Ghaderi, Alireza Abdollahpouri, Parham Moradi. 540-546 [doi]
- An agent based positional model for opinion formation in social networksSajjad Salehi, Fattaneh Taghiyareh. 547-552 [doi]
- Opinion influence network identification, using convex programmingMahmood Nematollahzadeh, Sajad Ozgoli, Mahdi Soioodi. 553-558 [doi]
- A comprehensive analysis of tweet content and its impact on popularityMohammad Mahdavi, Masoud Asadpour, Seyed Morteza Ghavami. 559-564 [doi]
- Centrality measures analysis in overlapped communities: An empirical studyZahra Ebadi Abouzar, Leila Esmaeili, Alireza Hashemi Golpayegani. 565-570 [doi]
- Design of a TEM cell using both multi-step and piecewise linear taperingMasoud Arezoomand, Mohsen Kalantari Meybodi, Narges Noori. 571-574 [doi]
- Design of a wideband low noise amplifier using modified cascode structure for 45GHz band applicationsMehran Nazari, Reza Rezaei Siahrood, Javad Yavand Hassani, Alireza Farahani. 575-580 [doi]
- A compact 0.18-µm CMOS 5-s MMIC for X-band applicationMina Amiri, Mohammad Moghaddam Tabrizi, Nasser Masoumi. 581-585 [doi]
- Development of a forward-wave directional coupler loaded with a periodic shunt structureZahra S. Tabatabaeian, Mohammad H. Neshati. 586-590 [doi]
- Travelling-wave Ka-band Frequency Scanning Antennas for millimeter-wave imaging applicationsMohammadreza Ranjbar Naeini, Mohammad Fakharzadeh, Forouhar Farzaneh. 591-595 [doi]
- A low power UWB CMOS low noise amplifier for 3.1-10.6 GHz in receiversAmir Mahdavi, Fatemeh Geran. 596-600 [doi]
- A hybrid intrusion detection architecture for Internet of thingsMansour Sheikhan, Hamid Bostani. 601-606 [doi]
- Domain specific ontology enrichment using public knowledge resourcesMaedeh Mosharraf, Fattaneh Taghiyareh. 607-611 [doi]
- Analyzing the effect of game-elements in e-learning environments through MBTI-based personalizationNegar Shabihi, Fattaneh Taghiyareh, Mohammad Hossein Abdoli. 612-618 [doi]
- An optimized bandwidth allocation in broadband digital economyLeila Mansourifar, Nasser Mozayani, Mohsen Pazari. 619-625 [doi]
- A new approach to designing a Roadmap: A case study for e-services with respect to rural and less developed regions in IranMolood Arman, Mahmood Kharrat. 626-631 [doi]
- Designing e-services in rural and least developed areas using technology road mappingNasrin Dastranj, Tahereh Mirsaeed Ghazi, Masoomeh Sadeghi, Kolsoom Abbasi, Sogol Babazadeh Khamaneh, Molood Arman, Maryam Gharaee, Mahmood Kharrat. 632-636 [doi]
- Personalization of gamification-elements in an e-learning environment based on learners' motivationFatemeh Roosta, Fattaneh Taghiyareh, Maedeh Mosharraf. 637-642 [doi]
- Similarity based Automatic Web Search Engine EvaluationFarzaneh Shoeleh, Masoumeh Azimzadeh, Akbar Mirzaei, Mojgan Farhoodi. 643-648 [doi]
- Assignment look-ahead HEFT for scheduling workflows of communicating tasksElham Dolkhani, Hamid Abrishami, Amin Rezaeian, Mahmoud Naghibzadeh. 649-653 [doi]
- Multi objective consolidation of virtual machines for green computing in Cloud data centersEhsan Arianyan. 654-659 [doi]
- Mobile Cloud Computing: A multisite computation offloadingMohammad Goudarzi, Zeinab Movahedi, Masoud Nazari. 660-665 [doi]
- SDN-based scheduling strategy on load balancing of virtual sensor resources in sensor-cloudFatemeh Banaie, Mohammad Hossein Yaghmaee, Seyed-Amin Hosseini-Seno. 666-671 [doi]
- A multi-dimensional fairness combinatorial double-sided auction model in cloud environmentReihaneh Hassanzadeh, Ali Movaghar, Hamid Reza Hassanzadeh. 672-677 [doi]
- XY-axis and distance based NoC mapping (XY-ADB)Elnaz Alikhah-Asl, Midia Reshadi. 678-683 [doi]
- The conceptual model to solve the problem of interoperability in health information systemsNahid Zeinali, Abbas Asosheh, Sougand Setareh. 684-689 [doi]
- Predicting election outcomes based on voters' weighted networksMohammad Khansari, Mojtaba Sadeghian, Farid Dehgan. 690-693 [doi]
- Aspect and distance based NoC mapping (ADB)Elnaz Alikhah-Asl, Midia Reshadi. 694-699 [doi]
- Location-based scheduling: An approach to address challenges of Big Data and Mobile Cloud ComputingMohammad Reza Bagheri, Reza Gholami, Sohrab Mortazavi Ghalati, Mehdi Sedighi. 700-706 [doi]
- A multimarket approach to peak-shaving in Smart Grid using time-of-use pricesHamid Manoochehri, Alireza Fereidunian. 707-712 [doi]
- An anomaly based VoIP DoS attack detection and prevention method using fuzzy logicMahsa Hosseinpour, Seyed-Amin Hosseini-Seno, Mohammad Hossein Yaghmaee Moghaddam, Hossein Khosravi Roshkhari. 713-718 [doi]
- SRAM hardware TrojanRoghayeh Saeidi, Hossein Gharaee Garakani. 719-722 [doi]
- An attack graph based procedure for risk estimation of zero-day attacksMarjan Keramati. 723-728 [doi]
- Optimal response to computer network threatsFarzaneh Abazari, Afsaneh Madani, Hossein Gharaee. 729-734 [doi]
- A Multi-Level reputation-based pollution attacks detection and prevention in P2P streamingHassan Kooshkaki, Behzad Akbari, Abdollah Ghaffari Sheshjavani. 735-740 [doi]
- RFID light weight server-less search protocol based on NLFSRsAbolfazl Falahati, Hamid Azizi, Robert M. Edwards 0001. 741-745 [doi]
- New Vulnerability Scoring System for dynamic security evaluationMarjan Keramati. 746-751 [doi]
- On the security of YRL, an anonymous broadcast encryption schemeReyhaneh Rabaninejad, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri. 752-755 [doi]
- Secure hardware key based on Physically Unclonable Functions and artificial Neural NetworkNima Alimohammadi, Shahriar B. Shokouhi. 756-760 [doi]
- Probability of infectious nodes in backward timeTala Tafazzoli, Babak Sadeghiyan. 761-765 [doi]
- Security operation center implementation on OpenStackTala Tafazzoli, Hossein Gharaee Garakani. 766-770 [doi]
- A free-riding resiliency incentive mechanism for VoD streaming over hybrid CDN-P2P networksAbdollah Ghaffari Sheshjavani, Behzad Akbari, Hamid Reza Ghaeini. 771-776 [doi]
- Head pose estimation based on fuzzy systems using facial geometric featuresArezoo Sadeghzadeh, Hossein Ebrahimnezhad. 777-782 [doi]
- CMPVoD: A cluster mesh-based architecture for VoD streaming over hybrid CDN-P2P networksAbdollah Ghaffari Sheshjavani, Behzad Akbari, Hamid Reza Ghaeini. 783-788 [doi]
- Adaptive CSK modulation guaranteeing HEVC video quality over Visible Light Communication networkHamed Alizadeh Ghazijahani, Milad Abdollahzadeh, Hadi Seyedarabi, Mir Javad Musevi Niya. 789-794 [doi]
- A new incentive scheduling mechanism for live video streaming in mesh-based P2P networksSajjad Momeny, Mehdi Dehghan 0001. 795-800 [doi]
- A temporal feature vector which is robust against aspect ratio variationsFarzad Zargari, Farzaneh Rahmani. 801-804 [doi]