The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohammad Hossain Heydari: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
    An Intrusion-Tolerant Password Authentication System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:110-118 [Conf]
  2. Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
    Towards Trusted Online Dissemination of Consumer Information. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  3. Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
    Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  4. Mason McDaniel, Mohammad Hossain Heydari
    Content Based File Type Detection Algorithms. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:332- [Conf]
  5. Linda Morales, Ivan Hal Sudborough, Mohamed Eltoweissy, Mohammad Hossain Heydari
    Combinatorial Optimization of Multicast Key Management. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:332- [Conf]
  6. Mohammad Hossain Heydari, Linda Morales, C. O. Shields Jr., Ivan Hal Sudborough
    Computing Cross Associations for Attack Graphs and Other Applications. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:270- [Conf]
  7. Mohammad Hossain Heydari, Ioannis G. Tollis, Chunliang Xia
    Improved Techniques for MCM Layer Assignment. [Citation Graph (0, 0)][DBLP]
    ICCD, 1994, pp:604-607 [Conf]
  8. Mohammad Hossain Heydari, Ivan Hal Sudborough
    On Sorting by Prefix Reversals and the Diameter of Pancake Networks. [Citation Graph (0, 0)][DBLP]
    Heinz Nixdorf Symposium, 1992, pp:218-227 [Conf]
  9. Mohammad Hossain Heydari, Ivan Hal Sudborough
    On the Diameter of the Pancake Network. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1997, v:25, n:1, pp:67-94 [Journal]
  10. Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough
    Combinatorial Optimization of Group Key Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
  11. Mohammad Hossain Heydari, Ioannis G. Tollis, Chunliang Xia
    Algorithms and bounds for layer assignment of MCM routing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 1994, v:2, n:2, pp:265-270 [Journal]

  12. Stack and Queue Layouts for Toruses and Extended Hypercubes. [Citation Graph (, )][DBLP]


Search in 0.035secs, Finished in 0.036secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002