MCI.ir

همراه اول - هیچ کس تنها نیست

Friday, April 22, 2011

شاخه دانشجویی انجمن رمز ایران

شاخه دانشجوئی انجمن رمز ایران
Posted by blogger at 11:34 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: شاخه دانشجوئی انجمن رمز ایران

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (16)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (1)
  • ►  2016 (6)
    • ►  August (3)
    • ►  June (2)
    • ►  February (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (8)
    • ►  November (2)
    • ►  September (1)
    • ►  July (1)
    • ►  May (1)
    • ►  February (3)
  • ▼  2011 (42)
    • ►  November (1)
    • ►  October (1)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (3)
    • ►  May (21)
    • ▼  April (5)
      • Information Systems and Security Lab
      • شاخه دانشجویی انجمن رمز ایران
      • شاخه دانشجویی انجمن رمز ایران
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Cryptography and Information Theoretic Security Wo...
    • ►  March (1)
    • ►  January (1)
  • ►  2010 (5)
    • ►  December (4)
    • ►  August (1)

My Blog List

  • Android.ir
    Eigenvalues-based Steganalysis - Behavioral Analog Topology Synthesizerhttps://sites.google.com/site/netlist2scheme/ Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/ Diman Zad-T...
    5 years ago
  • Forgotten Dream
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • 300 THE MOVIE (Three Hundred)
    MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES - MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES Author: Zad Tootaghaj, Diman Graduate Program: Computer Science ...
    6 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • frash83
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Persian Boy
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • شاخه دانشجویی انجمن رمز ایران
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • IRANCELL.ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • THE DAWN OF THE DARKNESS
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • frash
    List done by 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • MCI.ir
    Sites.Google.Com - - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايين https://sites.google.com/site/ne...
    7 years ago
  • mp3 music playlist
    SITES.PSU.EDU - Behavioral Analog Topology SynthesizerOptical CDMA Network Simulator (OCNS)Persian Boy NamesPersian Girl NamesExtended Authentication and Key Agreement Pro...
    7 years ago
  • Cool Things
    Bella Hadid Shows Off Hot Tennis Outfit, Big Racket -
    8 years ago
  • Apply Abroad
    Bad children and a box of beverage bottles! - Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children chan...
    10 years ago
  • شاخه دانشجویی انجمن رمز ایران

Farshid Farhat

  • Auction-based Resource Management in Computer Architecture
  • Contact ME!
  • Semantic Scholar Information is not Stable!
  • CAGE: Contention-Aware Game-theoretic modEl
  • Travel Grant from CSE Department

Deep Learning

  • Photography Assistance by Deep Learning
  • Deep learning [from Nature]

BIG DATA Computation

  • Modeling and developing conflict-aware scheduling on large-scale data centers
  • How to install pip locally
  • Load Balancing for Skewed Streams on Heterogeneous Cluster
  • FTPS to BOX @ PSU
  • ML-NA: A Machine Learning based Node Performance Analyzer Utilizing Straggler Statistics

Computer Vision and Pattern Recognition

  • Enhanced Signal Recovery via Sparsity Inducing Image Priors
  • Learning to Compose with Professional Photographs on the Web
  • OpenCV2 no longer support on MAC OS X
  • Professional Photography using Deep Learning
  • Computer Vision: A Modern Approach (2nd Edition)
Simple theme. Theme images by luoman. Powered by Blogger.