tag:blogger.com,1999:blog-41189851446287682162024-02-02T11:05:20.992+03:30Absolute SecurityInformation Systems and Security Lab (ISSL), Electrical Engineering Department, Sharif University of technology.
Cryptology, Cryptography, Network Security, Information Theory, Steganalysis, Cryptanalysis, etc Sessions.CoolTeenhttp://www.blogger.com/profile/12994213757758024834noreply@blogger.comBlogger11125tag:blogger.com,1999:blog-4118985144628768216.post-32924392722650506302020-04-11T12:39:00.000+04:302020-04-11T12:39:13.928+04:30A Public Key Encryption Algorithm for Network Security
Enhanced Public Key Encryption Algorithm for Security of Network
Abstract -- Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet,
security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet
structure itself allowed for many Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-31618612473578755802020-04-11T12:38:00.000+04:302020-04-11T12:38:58.705+04:30Security Weaknesses in PGP
Academic Endeavors at Pennsylvania State University
Leveraging big visual data to predict severe weather conditions
Discovering Triangles in Portraits for Supporting Photographic Creation
Skeleton Matching with Applications in Severe Weather Detection
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval
Shape matching using skeleton Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-37382440962922541112020-03-25T22:22:00.000+04:302020-03-25T22:22:31.697+04:30System and methods for UICC-based secure communication
ABSTRACT
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-62310903705492654112018-11-21T21:37:00.001+03:302018-11-21T21:37:46.489+03:30MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESMODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESAuthor: Zad Tootaghaj, Diman Graduate Program: Computer Science and Engineering Degree: Doctor of Philosophy Document Type: Dissertation Date of Defense: May 23, 2018 Committee Members: Thomas F Laporta, Dissertation AdvisorThomas F Laporta, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-84444946276240105132017-10-10T23:16:00.001+03:302017-10-10T23:16:58.495+03:30Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentCAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentTraditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-18525046714165598672017-09-30T21:19:00.001+03:302017-09-30T21:19:40.579+03:30Modeling and Optimization of MapReduceABSTRACTMapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-3541571605202808372017-09-22T18:21:00.001+03:302017-09-22T18:21:35.053+03:30PIAKAPAuthentication and Key Agreement Protocol in 4GPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup, Farshid Farhat, Somayeh Salimi, Ahmad Salahi.AbstractIdentification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-18384590862517313182017-08-11T02:00:00.001+04:302017-08-11T02:00:01.560+04:30Professional Photography using Deep LearningABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, where there is a high interest among amateurs and enthusiasts to take astonishing photos at anytime and in any location. Existing research captures some aesthetic techniques such as the rule of thirds, triangle, and perspective-ness, and retrieves useful feedbacks based on one Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-28577751386297962622017-07-15T20:51:00.001+04:302017-07-15T20:51:19.682+04:30Mirzakhani, MaryamMaryam Mirzakhani was first women to win Fields Medal in math also professor at Stanford university.RIP #MaryamMirzakhaniin Farshid Farhat 's Twitter Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-35195450824755302642017-07-10T21:39:00.001+04:302017-07-10T21:39:03.645+04:30Deep Learning at Pennsylvania State UniversityIntegrating Deep-learned Models and Photography Idea RetrievalIntelligent Portrait Composition Assistance (IPCA) – Integrating Deep-learned Models and Photography Idea Retrieval, Farshid Farhat, Mohammad Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4118985144628768216.post-10671167930978124792017-05-09T08:47:00.001+04:302017-05-09T08:47:20.739+04:30FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
ABSTRACT
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of servers increases, the map phase can take much longer than expected. This thesis analytically shows that the stochastic Unknownnoreply@blogger.com0