Reza Ebrahimi Atani
AuthID: R-00K-PDW
101
TITLE: Stop Tracking Me: An Anti-detection Type Solution for Anonymous Data
AUTHORS: Nia, MA; Karbasi, AH; Atani, RE;
PUBLISHED: 2014, SOURCE: 2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE)
AUTHORS: Nia, MA; Karbasi, AH; Atani, RE;
PUBLISHED: 2014, SOURCE: 2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE)
INDEXED IN:
WOS
IN MY:
ORCID
102
TITLE: Cluster-based traffic information generalization in Vehicular Ad-hoc Networks
AUTHORS: Arkian, HR; Atani, RE; Pourkhalili, A; Kamali, S;
PUBLISHED: 2014, SOURCE: VEHICULAR COMMUNICATIONS, VOLUME: 1, ISSUE: 4
AUTHORS: Arkian, HR; Atani, RE; Pourkhalili, A; Kamali, S;
PUBLISHED: 2014, SOURCE: VEHICULAR COMMUNICATIONS, VOLUME: 1, ISSUE: 4
INDEXED IN:
WOS
IN MY:
ORCID
103
TITLE: FcVcA: A Fuzzy Clustering-based Vehicular Cloud Architecture
AUTHORS: Arkian, HR; Atani, RE; Kamali, S;
PUBLISHED: 2014, SOURCE: 2014 7TH INTERNATIONAL WORKSHOP ON COMMUNICATION TECHNOLOGIES FOR VEHICLES (NETS4CARS-FALL)
AUTHORS: Arkian, HR; Atani, RE; Kamali, S;
PUBLISHED: 2014, SOURCE: 2014 7TH INTERNATIONAL WORKSHOP ON COMMUNICATION TECHNOLOGIES FOR VEHICLES (NETS4CARS-FALL)
INDEXED IN:
WOS
IN MY:
ORCID
104
TITLE: Cluster-based traffic information generalization in Vehicular Ad-hoc Networks
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Atefe Pourkhalili; Saman Kamali;
PUBLISHED: 2014, SOURCE: Vehicular Communications, VOLUME: 1, ISSUE: 4
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Atefe Pourkhalili; Saman Kamali;
PUBLISHED: 2014, SOURCE: Vehicular Communications, VOLUME: 1, ISSUE: 4
105
TITLE: Cluster-based traffic information generalization in vehicular ad-hoc networks
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Saman Kamali;
PUBLISHED: 2014, SOURCE: 7'th International Symposium on Telecommunications (IST'2014)
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Saman Kamali;
PUBLISHED: 2014, SOURCE: 7'th International Symposium on Telecommunications (IST'2014)
106
TITLE: A Novel Datatype Architecture Support for Programming Languages
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani;
PUBLISHED: 2014, SOURCE: International Journal of Programming Languages and Applications, VOLUME: 4, ISSUE: 1
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani;
PUBLISHED: 2014, SOURCE: International Journal of Programming Languages and Applications, VOLUME: 4, ISSUE: 1
107
TITLE: Ubiquitous IoT structure via homogeneous data type modelling
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani; Akbar Khodaparast Haghi;
PUBLISHED: 2014, SOURCE: 7'th International Symposium on Telecommunications (IST'2014)
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani; Akbar Khodaparast Haghi;
PUBLISHED: 2014, SOURCE: 7'th International Symposium on Telecommunications (IST'2014)
108
TITLE: A Cluster-Based Vehicular Cloud Architecture with Learning-Based Resource Management
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Atefe Pourkhalili;
PUBLISHED: 2014, SOURCE: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Atefe Pourkhalili;
PUBLISHED: 2014, SOURCE: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science
109
TITLE: Stop tracking me: An anti-detection type solution for anonymous data
AUTHORS: Mehran Alidoost Nia; Amir Hasani Karbasi; Reza Ebrahimi Atani;
PUBLISHED: 2014, SOURCE: 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)
AUTHORS: Mehran Alidoost Nia; Amir Hasani Karbasi; Reza Ebrahimi Atani;
PUBLISHED: 2014, SOURCE: 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)
110
TITLE: Secure positioning for shipping containers in ports and terminals using WSN
AUTHORS: Taha Yasin Rezapour; Reza Ebrahimi Atani; Meer Soheil Abolghasemi;
PUBLISHED: 2014, SOURCE: 2014 11th International ISC Conference on Information Security and Cryptology
AUTHORS: Taha Yasin Rezapour; Reza Ebrahimi Atani; Meer Soheil Abolghasemi;
PUBLISHED: 2014, SOURCE: 2014 11th International ISC Conference on Information Security and Cryptology