The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ali Movaghar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marjan Sirjani, Frank S. de Boer, Ali Movaghar, Amin Shali
    Extended Rebeca: A Component-Based Actor Language with Synchronous Message Passing. [Citation Graph (0, 0)][DBLP]
    ACSD, 2005, pp:212-221 [Conf]
  2. Marjan Sirjani, Amin Shali, Mohammad Mahdi Jaghoori, Hamed Iravanchi, Ali Movaghar
    A Front-End Tool for Automated Abstraction and Modular Verification of Actor-Based Models. [Citation Graph (0, 0)][DBLP]
    ACSD, 2004, pp:145-150 [Conf]
  3. Ali Movaghar
    On Dynamic Assignment of Impatient Customers to Parallel Queues. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:751-0 [Conf]
  4. Mohammad Mahdi Jaghoori, Marjan Sirjani, Mohammad Reza Mousavi, Ali Movaghar
    Efficient Symmetry Reduction for an Actor-Based Model. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:494-507 [Conf]
  5. Mehdi Kargahi, Ali Movaghar
    Non-Preemptive Earliest-Deadline-First Scheduling Policy: A Performance Study. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2005, pp:201-210 [Conf]
  6. Mohammad Abdollahi Azgomi, Ali Movaghar
    An Introduction to New Extensions for Stochastic Activity Networks. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2002, pp:405-410 [Conf]
  7. Marjan Sirjani, Ali Movaghar
    Simulation in Rebeca. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:923-926 [Conf]
  8. Marjan Sirjani, Ali Movaghar, Hamed Iravanchi, Mohammad Mahdi Jaghoori, Amin Shali
    Model Checking in Rebeca. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2003, pp:1819-1822 [Conf]
  9. John F. Meyer, Ali Movaghar, William H. Sanders
    Stochastic Activity Networks: Structure, Behavior, and Application. [Citation Graph (0, 0)][DBLP]
    PNPM, 1985, pp:106-115 [Conf]
  10. Mohammad Mahdi Jaghoori, Ali Movaghar, Marjan Sirjani
    Modere: the model-checking engine of Rebeca. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1810-1815 [Conf]
  11. Mohammad Abdollahi Azgomi, Ali Movaghar
    Efficient Evaluation of CSAN Models by State Space Analysis Methods. [Citation Graph (0, 0)][DBLP]
    ICSEA, 2006, pp:57- [Conf]
  12. Mohammad Abdollahi Azgomi, Ali Movaghar
    Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks. [Citation Graph (0, 0)][DBLP]
    ICSEA, 2006, pp:58- [Conf]
  13. Ali Kamandi, Mohammad Abdollahi Azgomi, Ali Movaghar
    Transformation of UML Models into Analyzable OSAN Models. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:159, n:, pp:3-22 [Journal]
  14. Marjan Sirjani, Ali Movaghar, Amin Shali, Frank S. de Boer
    Modeling and Verification of Reactive Systems using Rebeca. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2004, v:63, n:4, pp:385-410 [Journal]
  15. Marjan Sirjani, Ali Movaghar, Amin Shali, Frank S. de Boer
    Model Checking, Automated Abstraction, and Compositional Verification of Rebeca Models. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:6, pp:1054-1082 [Journal]
  16. Ali Movaghar
    On queueing with customer impatience until the beginning of service. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 1998, v:29, n:2-4, pp:337-350 [Journal]
  17. Mohammad Abdollahi Azgomi, Ali Movaghar
    A modelling tool for hierarchical stochastic activity networks. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2005, v:13, n:6, pp:505-524 [Journal]
  18. Mehdi Kargahi, Ali Movaghar
    A Method for Performance Analysis of Earliest-Deadline-First Scheduling Policy. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2006, v:37, n:2, pp:197-222 [Journal]
  19. Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza, Ali Movaghar
    Restricted Access to Exam Grades on the Web by HIP. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:967-971 [Conf]
  20. Mohammad Izadi, Ali Movaghar, Farhad Arbab
    Model Checking of Component Connectors. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:673-675 [Conf]
  21. Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar, Rasool Jalili
    Vulnerability Analysis in VGBPS Using Prolog. [Citation Graph (0, 0)][DBLP]
    FSEN, 2007, pp:404-411 [Conf]
  22. Mehran Sharafi, Fereidoon Shams Aliee, Ali Movaghar
    A Review on Specifying Software Architectures Using Extended Automata-Based Models. [Citation Graph (0, 0)][DBLP]
    FSEN, 2007, pp:423-431 [Conf]

  23. 3MOKAN: A Novel Mobility Management Mechanism Based on Keeping Alternative Nodes. [Citation Graph (, )][DBLP]


  24. Performance Evaluation of Mobile Ad Hoc Networks In the Presence of Energy-based Selfishness. [Citation Graph (, )][DBLP]


  25. Live and Fair Constraint Automata and Their Linear Temporal Logic of Steps. [Citation Graph (, )][DBLP]


  26. Characterizing the Web Using a New Uniform Sampling Approach. [Citation Graph (, )][DBLP]


  27. A New Analysis of RC4 - A Data Mining Approach (J48). [Citation Graph (, )][DBLP]


  28. Restricted Broadcast Process Theory. [Citation Graph (, )][DBLP]


  29. Compositional failure-based semantic equivalences for Reo specifications. [Citation Graph (, )][DBLP]


  30. Equational Reasoning on Ad Hoc Networks. [Citation Graph (, )][DBLP]


  31. Trusted secure routing for ad hoc networks. [Citation Graph (, )][DBLP]


  32. An improved replacement algorithm in fault-tolerant meshes. [Citation Graph (, )][DBLP]


  33. Weighted start-time fair queuing: a new start-time fair queuing for elastic traffic. [Citation Graph (, )][DBLP]


  34. Mobility Aware Distributed Topology Control in Mobile Ad-Hoc Networks Using Mobility Pattern Matching. [Citation Graph (, )][DBLP]


  35. Joint distributed source and network coding for multiple wireless unicast sessions. [Citation Graph (, )][DBLP]


  36. A New Anti-Spam Protocol Using CAPTCHA. [Citation Graph (, )][DBLP]


  37. ID-NAC: Identity-based network access control for MANETs. [Citation Graph (, )][DBLP]


  38. A study on routing method in P2P networks. [Citation Graph (, )][DBLP]


  39. Finding the sensors location and the number of sensors in sensor networks with a genetic algorithm. [Citation Graph (, )][DBLP]


  40. Performance Analysis of SLTC - A Stable Path, Low Overhead, Truthful and Cost Efficient Routing Protocol in MANETs with Selfish Nodes. [Citation Graph (, )][DBLP]


  41. A New Approach to Improve Quality of Service in SPEED Routing Protocol in Wireless Sensor Network through Data Aggregation. [Citation Graph (, )][DBLP]


  42. MEHR: Multi-Hop Energy-Aware Hierarchical Routing for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  43. SEAODV: secure efficient AODV routing protocol for MANETs networks. [Citation Graph (, )][DBLP]


  44. Recovery of Sensors in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  45. Intelligent Clustering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  46. Symmetry and partial order reduction techniques in model checking Rebeca. [Citation Graph (, )][DBLP]


  47. Compositional Failure-based Equivalence of Constraint Automata. [Citation Graph (, )][DBLP]


Search in 0.071secs, Finished in 0.072secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002