MCI.ir

همراه اول - هیچ کس تنها نیست

Friday, April 22, 2011

شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف

شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
Posted by blogger at 11:29 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (16)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (1)
  • ►  2016 (6)
    • ►  August (3)
    • ►  June (2)
    • ►  February (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (8)
    • ►  November (2)
    • ►  September (1)
    • ►  July (1)
    • ►  May (1)
    • ►  February (3)
  • ▼  2011 (42)
    • ►  November (1)
    • ►  October (1)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (3)
    • ►  May (21)
    • ▼  April (5)
      • Information Systems and Security Lab
      • شاخه دانشجویی انجمن رمز ایران
      • شاخه دانشجویی انجمن رمز ایران
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Cryptography and Information Theoretic Security Wo...
    • ►  March (1)
    • ►  January (1)
  • ►  2010 (5)
    • ►  December (4)
    • ►  August (1)

My Blog List

  • Android.ir
    Eigenvalues-based Steganalysis - Behavioral Analog Topology Synthesizerhttps://sites.google.com/site/netlist2scheme/ Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/ Diman Zad-T...
    5 years ago
  • Forgotten Dream
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • 300 THE MOVIE (Three Hundred)
    MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES - MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES Author: Zad Tootaghaj, Diman Graduate Program: Computer Science ...
    6 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • frash83
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Persian Boy
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • شاخه دانشجویی انجمن رمز ایران
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • IRANCELL.ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • THE DAWN OF THE DARKNESS
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • frash
    List done by 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • MCI.ir
    Sites.Google.Com - - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايين https://sites.google.com/site/ne...
    7 years ago
  • mp3 music playlist
    SITES.PSU.EDU - Behavioral Analog Topology SynthesizerOptical CDMA Network Simulator (OCNS)Persian Boy NamesPersian Girl NamesExtended Authentication and Key Agreement Pro...
    7 years ago
  • Cool Things
    Bella Hadid Shows Off Hot Tennis Outfit, Big Racket -
    8 years ago
  • Apply Abroad
    Bad children and a box of beverage bottles! - Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children chan...
    10 years ago
  • شاخه دانشجویی انجمن رمز ایران

Farshid Farhat

  • Auction-based Resource Management in Computer Architecture
  • Contact ME!
  • Semantic Scholar Information is not Stable!
  • CAGE: Contention-Aware Game-theoretic modEl
  • Travel Grant from CSE Department

Deep Learning

  • Photography Assistance by Deep Learning
  • Deep learning [from Nature]

BIG DATA Computation

  • Modeling and developing conflict-aware scheduling on large-scale data centers
  • How to install pip locally
  • Load Balancing for Skewed Streams on Heterogeneous Cluster
  • FTPS to BOX @ PSU
  • ML-NA: A Machine Learning based Node Performance Analyzer Utilizing Straggler Statistics

Computer Vision and Pattern Recognition

  • Enhanced Signal Recovery via Sparsity Inducing Image Priors
  • Learning to Compose with Professional Photographs on the Web
  • OpenCV2 no longer support on MAC OS X
  • Professional Photography using Deep Learning
  • Computer Vision: A Modern Approach (2nd Edition)
Simple theme. Theme images by luoman. Powered by Blogger.