default search action
Ehsan Elahi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j15]Anxia Wan, Qianqian Huang, Ehsan Elahi, Benhong Peng:
Evolution and simulation of drug safety regulations: construction of a game model for capture event. Kybernetes 53(5): 1763-1783 (2024) - [j14]Ehsan Elahi, Sajid Anwar, Babar Shah, Zahid Halim, Abrar Ullah, Imad Rida, Muhammad Waqas:
Knowledge Graph Enhanced Contextualized Attention-Based Network for Responsible User-Specific Recommendation. ACM Trans. Intell. Syst. Technol. 15(4): 83:1-83:24 (2024) - 2023
- [j13]Ehsan Elahi, Jorge Morato:
Graphical Contents and Health Websites Readability. IEEE Access 11: 140934-140942 (2023) - [j12]Huanyu Ma, Xuegang Sun, Ehsan Elahi, Xiaobing Zhu:
Digital Transformation and Corporate Risk-Taking: Empirical Evidence From Chinese A-Share-Listed Companies. J. Glob. Inf. Manag. 31(8): 1-31 (2023) - 2022
- [j11]Ehsan Elahi, Ana Iglesias, Jorge Morato:
Readability of Non-Text Images on the World Wide Web (WWW). IEEE Access 10: 116627-116634 (2022) - [j10]Ali Shirzadeh Chaleshtari, Ehsan Elahi, Mahdi Fathi, Marzieh Khakifirooz:
Impact of return leniency on retailers' profit and social welfare in monopoly markets. Comput. Ind. Eng. 169: 108149 (2022) - [j9]Haiyun Xu, Rui Luo, Jos Winnink, Chao Wang, Ehsan Elahi:
A methodology for identifying breakthrough topics using structural entropy. Inf. Process. Manag. 59(2): 102862 (2022) - [j8]Haiyun Xu, Zenghui Yue, Hongshen Pang, Ehsan Elahi, Jing Li, Lu Wang:
Integrative model for discovering linked topics in science and technology. J. Informetrics 16(2): 101265 (2022) - [j7]Ehsan Elahi, Zahid Halim:
Graph attention-based collaborative filtering for user-specific recommender system using knowledge graph and deep neural networks. Knowl. Inf. Syst. 64(9): 2457-2480 (2022) - [j6]Anxia Wan, Zhaoqiang Zhong, Chaoyu Zheng, Xuan Zhao, Ehsan Elahi:
Use of cloud model to evaluate corporate social responsibility of pharmaceutical companies. Kybernetes 51(2): 896-915 (2022) - 2020
- [j5]Chaoyu Zheng, Benhong Peng, XinSheng, Ehsan Elahi, Anxia Wan:
Strategies of Haze Risk Reduction Using the Tripartite Game Model. Complex. 2020: 6474363:1-6474363:11 (2020) - [j4]Benhong Peng, Yuanyuan Wang, Sardar Zahid, Guo Wei, Ehsan Elahi:
Platform ecological circle for cold chain logistics enterprises: the value co-creation analysis. Ind. Manag. Data Syst. 120(4): 675-691 (2020) - 2019
- [j3]Yusheng Wang, Ehsan Elahi, Lei Xu:
Selective Maintenance Optimization Modelling for Multi-State Deterioration Systems Considering Imperfect Maintenance. IEEE Access 7: 62759-62768 (2019) - [j2]Sunil Kr. Jha, Zhaoqing Pan, Ehsan Elahi, Nilesh V. Patel:
A comprehensive search for expert classification methods in disease diagnosis and prediction. Expert Syst. J. Knowl. Eng. 36(1) (2019) - 2007
- [j1]Saif Benjaafar, Ehsan Elahi, Karen Donohue:
Outsourcing via Service Competition. Manag. Sci. 53(2): 241-259 (2007)
Conference and Workshop Papers
- 2024
- [c9]Ali Shirzadeh Chaleshtari, Ehsan Elahi, Michel Fathi, Marzieh Khakifirooz, Maling Ebrahimpour:
The Impact of Emerging Trends and Increased Supply Chain Costs on Retail Goods Returns: An Analytical Model for Optimizing Pricing and Refund Strategies. ICCL 2024: 257-268 - 2022
- [c8]Ehsan Elahi, Ana Iglesias, Jorge Morato:
Web Images Relevance and Quality: User Evaluation. CSSE 2022: 66-69 - [c7]Ehsan Elahi, Jorge Luis Morato Lara, Ana María Iglesias Maqueda:
Image Relevance on Websites and Readability. WorldCIST (1) 2022: 286-295 - 2016
- [c6]Ehsan Elahi, Jason Barron, Micheal Crotty, Miguel Ponce de Leon, Rashid Mijumbi, Steven Davy, Dimitri Staessens, Sander Vrijders:
On Load Management in Service Oriented Networks (Short Paper). CloudNet 2016: 254-257 - [c5]Jason Barron, Micheal Crotty, Ehsan Elahi, Roberto Riggio, Diego R. López, Miguel Ponce de Leon:
Towards self-adaptive network management for a recursive network architecture. NOMS 2016: 1143-1148 - 2014
- [c4]Kishwer Abdul Khaliq, Muhammad Sajjad Akbar, Amir Qayyum, Ehsan Elahi, Amer Zaheer:
Congestion Avoidance Hybrid Wireless Mesh Protocol (CA-HWMP) for IEEE 802.11s. ANT/SEIT 2014: 229-236 - 2012
- [c3]Ehsan Elahi, Amir Qayyum, Sheneela Naz:
The effect of payload length on QoS in IEEE 802.11s Wireless Mesh Networks. ICON 2012: 70-73 - 2010
- [c2]Ehsan Elahi, Najmul Hassan, Sohail Asghar, Amir Qayyum:
Performance Modeling of Bandwidth Aggregation for TCP Connections. HPCC 2010: 689-694 - [c1]Ehsan Elahi, Muhammad Yousaf, Ambreen Sheikh, Muhammad Maaz Rehan, Muhammad Omer Chughtai, Amir Qayyum:
On the implementation of End-to-End Mobility Management Framework (EMF). WiMob 2010: 458-465
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint