default search action
Mahmood Ahmadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j47]Saadat Izadi, Mahmood Ahmadi:
New fusion loss function based on knowledge generation using Gumbel-SoftMax for federated learning. J. Supercomput. 81(1): 33 (2025) - 2024
- [j46]Bahar Ghasemi, Mahmood Ahmadi, Hamed Alimohammadi:
A neural gas network-based scheme for SDN many-field packet classification. J. Supercomput. 80(2): 2601-2632 (2024) - [j45]Payam Abdisarabshali, Minghui Liwang, Amir Rajabzadeh, Mahmood Ahmadi, Seyyedali Hosseinalipour:
Decomposition Theory Meets Reliability Analysis: Processing of Computation-Intensive Dependent Tasks Over Vehicular Clouds With Dynamic Resources. IEEE/ACM Trans. Netw. 32(1): 475-490 (2024) - [j44]Mohammed Hassan Husain, Mahmood Ahmadi, Farhad Mardukhi:
Vehicular Fog Computing: A Survey of Architectures, Resource Management, Challenges and Emerging Trends. Wirel. Pers. Commun. 136(4): 2243-2273 (2024) - [i9]Amirhossein Shahrokhi, Mahmood Ahmadi:
Power Evaluation of IOT Application Layer Protocols. CoRR abs/2405.07326 (2024) - [i8]Mohammad Parsa Toopchinezhad, Mahmood Ahmadi:
Machine Learning Approaches for Active Queue Management: A Survey, Taxonomy, and Future Directions. CoRR abs/2410.02563 (2024) - [i7]Mohammad Parsa Toopchinezhad, Mahmood Ahmadi:
Deep Reinforcement Learning for Delay-Optimized Task Offloading in Vehicular Fog Computing. CoRR abs/2410.03472 (2024) - 2023
- [j43]Abdullah Naseri, Mahmood Ahmadi, Latif Pourkarimi:
Placement of SDN controllers based on network setup cost and latency of control packets. Comput. Commun. 208: 15-28 (2023) - [j42]Fatemeh Abdi, Mahmood Ahmadi, Montajab Ghanem:
AM-IF: Adaptive Multi-Path Interest Forwarding in named data networking. Future Gener. Comput. Syst. 148: 564-583 (2023) - [j41]Milad Ahmadian, Sajad Ahmadian, Mahmood Ahmadi:
RDERL: Reliable deep ensemble reinforcement learning-based recommender system. Knowl. Based Syst. 263: 110289 (2023) - [j40]AhmadShahab Arkan, Mahmood Ahmadi:
An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks. J. Supercomput. 79(11): 11844-11870 (2023) - [i6]Arman Mahmoudi, Mahmood Ahmadi:
DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table. CoRR abs/2308.02801 (2023) - 2022
- [j39]Saadat Izadi, Mahmood Ahmadi, Rojia Nikbazm:
Network traffic classification using convolutional neural network and ant-lion optimization. Comput. Electr. Eng. 101: 108024 (2022) - [j38]Milad Ahmadian, Mahmood Ahmadi, Sajad Ahmadian:
A reliable deep representation learning to improve trust-aware recommendation systems. Expert Syst. Appl. 197: 116697 (2022) - [j37]Fatemeh Abdi, Mahmood Ahmadi, Montajab Ghanem:
LA-MDPF: A forwarding strategy based on learning automata and Markov decision process in named data networking. Future Gener. Comput. Syst. 134: 22-39 (2022) - [j36]Mahsa Moradi, Mahmood Ahmadi, Rojia Nikbazm:
Comparison of Machine Learning Techniques for VNF Resource Requirements Prediction in NFV. J. Netw. Syst. Manag. 30(1): 17 (2022) - [j35]Saadat Izadi, Mahmood Ahmadi, Amir Rajabzadeh:
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion. J. Netw. Syst. Manag. 30(2): 25 (2022) - [j34]Arman Mahmoudi, Mahmood Ahmadi:
2DNCF-PIT: Two-Dimensional Neighbor-Based Cuckoo Filter for Pending Interest Table Lookup in Named Data Networking. J. Netw. Syst. Manag. 30(3): 48 (2022) - [j33]Rojia Nikbazm, Mahmood Ahmadi:
KSN: Modeling and simulation of knowledge using machine learning in NFV/SDN-based networks. Simul. Model. Pract. Theory 121: 102632 (2022) - [j32]Ahmadreza Ahmadian, Mahmood Ahmadi:
DC-CAMP: Dynamic Controller Creation, Allocation and Management Protocol in SDN. Wirel. Pers. Commun. 125(1): 531-558 (2022) - [c15]Saadat Izadi, Mahmood Ahmadi, Rojia Nikbazm:
Analysis of Feature Selection Methods for Network Traffic Classification. AISI 2022: 65-77 - [i5]Ameneh Zarei, Shahla Safari, Mahmood Ahmadi, Farhad Mardukhi:
Past, Present and Future of Hadoop: A Survey. CoRR abs/2202.13293 (2022) - [i4]Mazdak Fatahi, Masoud Soursouri, Pooya Pourmohammad, Mahmood Ahmadi:
Open Source Routers: A Survey. CoRR abs/2203.01701 (2022) - [i3]Payam Abdisarabshali, Seyyedali Hosseinalipour, Minghui Liwang, Amir Rajabzadeh, Mahmood Ahmadi:
Decomposition Theory Meets Reliability Analysis: Processing of Computation-Intensive Dependent Tasks over Vehicular Clouds with Dynamic Resources. CoRR abs/2210.07337 (2022) - [i2]Ramin Atefinia, Mahmood Ahmadi:
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset. CoRR abs/2212.05269 (2022) - 2021
- [j31]Abdullah Naseri, Mahmood Ahmadi, Latif Pourkarimi:
Reduction of energy consumption and delay of control packets in Software-Defined Networking. Sustain. Comput. Informatics Syst. 31: 100574 (2021) - [j30]Ramin Atefinia, Mahmood Ahmadi:
Network intrusion detection using multi-architectural modular deep neural network. J. Supercomput. 77(4): 3571-3593 (2021) - [j29]Ahmad Shahab Arkan, Mahmood Ahmadi:
Entropy-Based Anomaly Detection Using Observation Points Relations in Wireless Sensor Networks. Wirel. Pers. Commun. 119(2): 1783-1798 (2021) - [c14]Milad Ahmadian, Mahmood Ahmadi, Sajad Ahmadian, Seyed Mohammad Jafar Jalali, Abbas Khosravi, Saeid Nahavandi:
Integration of Deep Sparse Autoencoder and Particle Swarm Optimization to Develop a Recommender System. SMC 2021: 2524-2530 - 2020
- [j28]Hamed Alimohammadi, Mahmood Ahmadi:
Common non-wildcard portion-based partitioning approach to SDN many-field packet classification. Comput. Networks 181: 107534 (2020) - [j27]Aladdin A. Abdulhassan, Mahmood Ahmadi:
Many-field packet classification using CR-tree. J. High Speed Networks 26(2): 125-140 (2020) - [j26]Mohammad Alhisnawi, Mahmood Ahmadi:
Detecting and Mitigating DDoS Attack in Named Data Networking. J. Netw. Syst. Manag. 28(4): 1343-1365 (2020)
2010 – 2019
- 2019
- [j25]Mohammad Najafimehr, Mahmood Ahmadi:
SLCF: Single-hash lookup cuckoo filter. J. High Speed Networks 25(4): 413-424 (2019) - [j24]Hamed Alimohammadi, Mahmood Ahmadi:
Clustering-based many-field packet classification in Software-Defined Networking. J. Netw. Comput. Appl. 147 (2019) - [j23]Roaa Shubbar, Mahmood Ahmadi:
A Filter-Based Design of Pending Interest Table in Named Data Networking. J. Netw. Syst. Manag. 27(4): 998-1019 (2019) - [j22]Roaa Shubbar, Mahmood Ahmadi:
Efficient name matching based on a fast two-dimensional filter in named data networking. Int. J. Parallel Emergent Distributed Syst. 34(2): 203-221 (2019) - [j21]Aladdin A. Abdulhassan, Mahmood Ahmadi:
Cuckoo filter-based many-field packet classification using X-tree. J. Supercomput. 75(9): 5667-5687 (2019) - 2018
- [j20]Abbas Arghavani, Mahdi Arghavani, Mahmood Ahmadi, Paul Crane:
Attacker-Manager Game Tree (AMGT): A new framework for visualizing and analysing the interactions between attacker and network security manager. Comput. Networks 133: 42-58 (2018) - [j19]Ahmad Karamollahi, Abdolah Chalechale, Mahmood Ahmadi:
Energy consumption improvement and cost saving by cloud broker in cloud datacenters. Int. Arab J. Inf. Technol. 15(3): 405-411 (2018) - [j18]Mohammad Al-Hisnawi, Mahmood Ahmadi:
QCF for deep packet inspection. IET Networks 7(5): 346-352 (2018) - [j17]Reza Falamarzi, Bahram Bahrambeigy, Mahmood Ahmadi, Amir Rajabzadeh:
High-performance multi/many-core architectures with shared and private queues: Network processing approaches. J. High Speed Networks 24(2): 89-106 (2018) - [j16]Aladdin A. Abdulhassan, Mahmood Ahmadi:
Many-field packet classification using AMQ-R-tree. J. High Speed Networks 24(3): 219-241 (2018) - [j15]Somayeh Abdi, Latif Pourkarimi, Mahmood Ahmadi, Farzad Zargari:
Cost minimization for bag-of-tasks workflows in a federation of clouds. J. Supercomput. 74(6): 2801-2822 (2018) - 2017
- [j14]Somayeh Abdi, Latif Pourkarimi, Mahmood Ahmadi, Farzad Zargari:
Cost minimization for deadline-constrained bag-of-tasks applications in federated hybrid clouds. Future Gener. Comput. Syst. 71: 113-128 (2017) - [j13]Roaa Shubbar, Mahmood Ahmadi:
Fast 2D filter with low false positive for network packet inspection. IET Networks 6(6): 224-231 (2017) - [j12]Masoud Soursouri, Mahmood Ahmadi:
Adaptive resource allocation for software defined networking controllers. J. High Speed Networks 23(3): 237-253 (2017) - [j11]Nasim Abdolmaleki, Mahmood Ahmadi, Hadi Tabatabaee Malazi, Sebastiano Milardo:
Fuzzy topology discovery protocol for SDN-based wireless sensor networks. Simul. Model. Pract. Theory 79: 54-68 (2017) - 2016
- [j10]Mohammad Al-Hisnawi, Mahmood Ahmadi:
Deep Packet Inspection Using Quotient Filter. IEEE Commun. Lett. 20(11): 2217-2220 (2016) - [j9]Mahmood Ahmadi, Ehsan Zadkhosh:
A customized and reconfigurable VLIW-based packet classifier on ρ-VEX. J. High Speed Networks 22(3): 177-192 (2016) - [j8]Parisa Goudarzi, Hadi Tabatabaee Malazi, Mahmood Ahmadi:
Khorramshahr: A scalable peer to peer architecture for port warehouse management system. J. Netw. Comput. Appl. 76: 49-59 (2016) - [j7]Seyedeh Mahboubeh Sajjadian Amiri, Hadi Tabatabaee Malazi, Mahmood Ahmadi:
Memory Efficient Routing Using Bloom Filters in Large Scale Sensor Networks. Wirel. Pers. Commun. 86(3): 1221-1240 (2016) - [i1]Mazdak Fatahi, Mahmood Ahmadi, Mahyar Shahsavari, Arash Ahmadi, Philippe Devienne:
evt_MNIST: A spike based version of traditional MNIST. CoRR abs/1604.06751 (2016) - 2015
- [j6]Mahmood Ahmadi, Sara Mehdizadeh Khalifani:
A new look at hybrid Aloha: an analytical approach. Comput. Networks 91: 689-699 (2015) - [j5]Mahmood Ahmadi, Reza Pourian:
A Bloom Filter with the Integrated Hash Table Using an Additional Hashing Function. Netw. Protoc. Algorithms 7(1): 24-41 (2015) - 2014
- [j4]Shahabeddin Geravand, Mahmood Ahmadi:
An efficient and scalable plagiarism checking system using Bloom filters. Comput. Electr. Eng. 40(6): 1789-1800 (2014) - 2013
- [j3]Shahabeddin Geravand, Mahmood Ahmadi:
Bloom filter applications in network security: A state-of-the-art survey. Comput. Networks 57(18): 4047-4064 (2013) - [c13]Soheil Anousha, Mahmood Ahmadi:
An Improved Min-Min Task Scheduling Algorithm in Grid Computing. GPC 2013: 103-113 - 2012
- [c12]Ehsan Zadkhosh, Sepide Fatahi, Mahmood Ahmadi:
Performance Analysis of Reconfigurable Processors Using MVA Analysis. ARC 2012: 342-349 - [c11]Paria Ghanbari, Mahmood Ahmadi, Arash Ahmadi:
Error management and detection in computer networks using Bloom filters. ICACCI 2012: 551-556 - 2011
- [j2]Mahmood Ahmadi, Asadollah Shahbahrami, Stephan Wong:
Collaboration of reconfigurable processors in grid computing: Theory and application. Future Gener. Comput. Syst. 27(6): 850-859 (2011) - [j1]Mahmood Ahmadi, Stephan Wong:
A Cache Architecture for Counting Bloom Filters: Theory and Application. J. Electr. Comput. Eng. 2011: 475865:1-475865:10 (2011) - [c10]Shahabeddin Geravand, Mahmood Ahmadi:
A Novel Adjustable Matrix Bloom Filter-Based Copy Detection System for Digital Libraries. CIT 2011: 518-525 - 2010
- [b1]Mahmood Ahmadi:
High-performance Processing in Networked and Grid Environments. Delft University of Technology, Netherlands, 2010 - [c9]Mahmood Ahmadi, Asadollah Shahbahrami, Stephan Wong:
Collaboration of Reconfigurable Processors in Grid Computing for Multimedia Kernels. GPC 2010: 5-14 - [c8]Faisal Nadeem, Mahmood Ahmadi, Muhammad Faisal Nadeem, Stephan Wong:
Modeling and Simulation of Reconfigurable Processors in Grid Networks. ReConFig 2010: 226-231
2000 – 2009
- 2009
- [c7]Mahmood Ahmadi, Stephan Wong:
K-Stage Pipelined Bloom Filter for Packet Classification. CSE (2) 2009: 64-70 - [c6]Asadollah Shahbahrami, Mahmood Ahmadi, Stephan Wong, Koen Bertels:
A New Approach to Implement Discrete Wavelet Transform Using Collaboration of Reconfigurable Elements. ReConFig 2009: 344-349 - 2008
- [c5]Mahmood Ahmadi, Stephan Wong:
An Approach for Optimal Bandwidth Allocation in Packet Processing Systems. CNSR 2008: 208-214 - [c4]Mahmood Ahmadi, Stephan Wong:
A Memory-Optimized Bloom Filter Using an Additional Hashing Function. GLOBECOM 2008: 2479-2483 - [c3]Mahmood Ahmadi, Stephan Wong:
A Paradigm for Reconfigurable Processing on Grid. GridNets 2008: 259-262 - 2007
- [c2]Mahmood Ahmadi, Stephan Wong:
A Cache Architecture for Counting Bloom Filters. ICON 2007: 218-223 - [c1]Mahmood Ahmadi, Stephan Wong:
Modified collision packet classification using counting bloom filter in tuple space. Parallel and Distributed Computing and Networks 2007: 295-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint