MCI.ir

همراه اول - هیچ کس تنها نیست

Sunday, May 22, 2011

Mahshid Farhat (مهشید فرحت)

Mahshid Farhat (مهشید فرحت)
http://sites.google.com/site/mahshidfarhat/home
http://www.facebook.com/mahshid.farhat
http://profiles.google.com/103514416706735140357
http://picasaweb.google.com/mahshid.farhat

Posted by blogger at 11:34 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (16)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (1)
  • ►  2016 (6)
    • ►  August (3)
    • ►  June (2)
    • ►  February (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (8)
    • ►  November (2)
    • ►  September (1)
    • ►  July (1)
    • ►  May (1)
    • ►  February (3)
  • ▼  2011 (42)
    • ►  November (1)
    • ►  October (1)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (3)
    • ▼  May (21)
      • آموزشگاه موسیقی
      • Best Golf Bags For Sale
      • Mahshid Farhat (مهشید فرحت)
      • Security Improvement of Ad-hoc Networks Routing Pr...
      • Game-theoretic approach to mitigate packet droppin...
      • Risk of attack coefficient effect on availability ...
      • Game-Theoretic Approach in Network Security, Avail...
      • انجمن رمز ایران
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • S B I S C @ S U T
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • شاخه دانشجویی انجمن رمز - کارگاه دانشگاه شریف
      • Workshop on Cryptography and Information Theoretic...
      • Workshop on Integer Factorization
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • کارگاه علمی طراحی و تحلیل پروتکل های رای گیری الکت...
      • مقدمه ای بر امنیت شبکه های متحرک بی سیم اقتضایی
      • Design and Cryptanalysis of E-Voting Protocols Wor...
    • ►  April (5)
    • ►  March (1)
    • ►  January (1)
  • ►  2010 (5)
    • ►  December (4)
    • ►  August (1)

My Blog List

  • Android.ir
    Eigenvalues-based Steganalysis - Behavioral Analog Topology Synthesizerhttps://sites.google.com/site/netlist2scheme/ Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/ Diman Zad-T...
    5 years ago
  • Forgotten Dream
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • 300 THE MOVIE (Three Hundred)
    MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES - MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES Author: Zad Tootaghaj, Diman Graduate Program: Computer Science ...
    6 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • frash83
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Persian Boy
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • شاخه دانشجویی انجمن رمز ایران
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • IRANCELL.ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • THE DAWN OF THE DARKNESS
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • frash
    List done by 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • MCI.ir
    Sites.Google.Com - - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايين https://sites.google.com/site/ne...
    7 years ago
  • mp3 music playlist
    SITES.PSU.EDU - Behavioral Analog Topology SynthesizerOptical CDMA Network Simulator (OCNS)Persian Boy NamesPersian Girl NamesExtended Authentication and Key Agreement Pro...
    7 years ago
  • Cool Things
    Bella Hadid Shows Off Hot Tennis Outfit, Big Racket -
    8 years ago
  • Apply Abroad
    Bad children and a box of beverage bottles! - Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children chan...
    10 years ago
  • شاخه دانشجویی انجمن رمز ایران

Farshid Farhat

  • Auction-based Resource Management in Computer Architecture
  • Contact ME!
  • Semantic Scholar Information is not Stable!
  • CAGE: Contention-Aware Game-theoretic modEl
  • Travel Grant from CSE Department

Deep Learning

  • Photography Assistance by Deep Learning
  • Deep learning [from Nature]

BIG DATA Computation

  • Modeling and developing conflict-aware scheduling on large-scale data centers
  • How to install pip locally
  • Load Balancing for Skewed Streams on Heterogeneous Cluster
  • FTPS to BOX @ PSU
  • ML-NA: A Machine Learning based Node Performance Analyzer Utilizing Straggler Statistics

Computer Vision and Pattern Recognition

  • Enhanced Signal Recovery via Sparsity Inducing Image Priors
  • Learning to Compose with Professional Photographs on the Web
  • OpenCV2 no longer support on MAC OS X
  • Professional Photography using Deep Learning
  • Computer Vision: A Modern Approach (2nd Edition)
Simple theme. Theme images by luoman. Powered by Blogger.