Search For:

Displaying 1-37 out of 37 total
Performance Evaluation of Cache Memory Organizations in Embedded Systems
Found in: Information Technology: New Generations, Third International Conference on
By Mohsen Soryani, Mohsen Sharifi, Mohammad Hossein Rezvani
Issue Date:April 2007
pp. 1045-1050
The tremendous rise in microprocessor technology has offered high speed processors and has increased the processor-memory speed gap dramatically. On the other hand, real-time embedded systems often have a hard deadline to complete their instructions. Conse...
Multics and Plan 9: The Big Bangs in the Distributed Computing System Universe
Found in: Computing in Science & Engineering
By Seyedeh Leili Mirtaheri,Ehsan Mousavi Khaneghah,Amir Saman Memaripour,Lucio Grandinetti,Mohsen Sharifi,Zarrintaj Bornaee
Issue Date:September 2014
pp. 76-85
In this article, the authors investigate the development of Multiplexed Information and Computing Service (Multics) and Plan 9, and illustrate how these approaches have influenced today's computing systems. "Computing service as an electricity service...
A Dynamic Replication Mechanism to Reduce Response-Time of I/O Operations in High Performance Computing Clusters
Found in: 2013 International Conference on Social Computing (SocialCom)
By Ehsan Mousavi Khaneghah,Seyedeh Leili Mirtaheri,Lucio Grandinetti,Amir Saman Memaripour,Mohsen Sharifi
Issue Date:September 2013
pp. 738-743
Extraordinary large datasets of high performance computing applications require improvement in existing storage and retrieval mechanisms. Moreover, enlargement of the gap between data processing and I/O operations' throughput will bound the system performa...
Dynamic Multilevel Feedback-Based Searching Strategy in Unstructured Peer-to-Peer Systems
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Elahe Khatibi,Seyedeh Leili Mirtaheri,Ehsan Mousavi Khaneghah,Mohsen Sharifi
Issue Date:November 2012
pp. 124-131
One of the main challenges of unstructured peer-to-peer (P2P) systems that greatly affects performance is resource searching. The early proposed mechanisms use blind searching, but they have a lot of shortcomings. Informed search strategies have better per...
Task-Oriented Programming: A Suitable Programming Model for Multicore and Distributed Systems
Found in: Parallel and Distributed Computing, International Symposium on
By Saeed Shahrivari,Mohsen Sharifi
Issue Date:July 2011
pp. 139-144
Current distributed computing systems comprising of commodity computers like Network of Workstations (NOW) are obliged to deploy multicore processors to raise their performance. However, because multicore processors were absent when traditional standard pr...
Augmented Mobile Devices through Cyber Foraging
Found in: Parallel and Distributed Computing, International Symposium on
By Somayeh Kafaie,Omid Kashefi,Mohsen Sharifi
Issue Date:July 2011
pp. 145-152
There is increased demand to run applications on mobile devices in recent years. Although many of these alluring applications are resource-intensive, they expect to get the same performance on mobile devices as on powerful non-mobile computers. On the othe...
Formulating the real cost of DSM-inherent dependent parameters in HPC clusters
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Mohsen Sharifi,Ehsan Mousavi Khaneghah,Alfredo Tirado-Ramos,Seyedeh Leili Mirtaheri
Issue Date:April 2010
pp. 1-6
The choice of an appropriate interprocess communication (IPC) mechanism is critical to the performance of distributed systems and parallel programs. There is however a trade-off between the accrued system performance and the imposed cost of the deployed IP...
Improving Software Dependability Using System-Level Virtualization: A Survey
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Arash Rezaei, Hadi Salimi, Mohsen Sharifi
Issue Date:April 2010
pp. 195-199
This paper investigates different uses of system-level virtualization to improve dependability of software systems. Notable works are studied and presented in two categories, namely, the attributes of dependability and the means to attain those attributes....
Rejuvenating High Available Virtualized Systems
Found in: Availability, Reliability and Security, International Conference on
By Arash Rezaei, Mohsen Sharifi
Issue Date:February 2010
pp. 289-294
Virtualization technology in the form of server consolidation makes running of hot-standby replicas on one system possible, while software rejuvenation provides proactive recovery of failure. Both technologies have been used to make systems more dependable...
A New Approach to Task Allocation in Wireless Sensor Actor Networks
Found in: Computational Intelligence, Communication Systems and Networks, International Conference on
By Hossein Momeni, Mohsen Sharifi, Saeed Sedighian
Issue Date:July 2009
pp. 73-78
Since wireless sensor actor networks (WSANs) interact with critical physical environments, one of the important issues of WSANs is real-time considerations. Existing WSANs suffer from the lack of a real-time task allocation in support of real-time communic...
Load Balancing Using Consistent Hashing: A Real Challenge for Large Scale Distributed Web Crawlers
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Mitra Nasri, Mohsen Sharifi
Issue Date:May 2009
pp. 715-720
Large scale search engines nowadays use distributed Web crawlers to collect Web pages because it is impractical for a single machine to download the entire Web. Load balancing of such crawlers is an important task because of limitations in memory/resources...
SKEW: An efficient Self Key Establishment protocol for Wireless sensor networks
Found in: Collaborative Technologies and Systems, International Symposium on
By Mohsen Sharifi, Saeid Pourroostaei Ardakani, Saeed Sedighian Kashi
Issue Date:May 2009
pp. 250-257
Since wireless sensor networks continue to grow in usage and many sensor-based systems reside in adversarial environments, security consideration is really vital for these systems. But one of the main challenges for the efficient distribution of security k...
LAP: A Lightweight Authentication Protocol for smart dust wireless sensor networks
Found in: Collaborative Technologies and Systems, International Symposium on
By Mohsen Sharifi, Saeed Sedighian Kashi, Saeed Pourroostaei Ardakani
Issue Date:May 2009
pp. 258-265
With the advent of unbounded small-scale dust sensors being deployed in wireless sensor networks, existing authentication protocols for ordinary wireless sensor networks are becoming less efficient for dust sensors. Resource constrained dust nodes must do ...
Self Actor-Actor Connectivity Restoration in Wireless Sensor and Actor Networks
Found in: Intelligent Information and Database Systems, Asian Conference on
By Azadeh Zamanifar, Mohsen Sharifi, Omid Kashefi
Issue Date:April 2009
pp. 442-447
Wireless sensor and actor networks (WSANs) are a set of coexistence sensors and actors connected wirelessly to perform cooperatively sensing and interaction to physical environment. Nowadays, WSANs are used in many important application areas. Main concern...
Component-Based Self-Healing via Cellular Adaptation
Found in: Autonomic and Autonomous Systems, International Conference on
By Maryam Bisadi, Mohsen Sharifi
Issue Date:April 2009
pp. 75-81
Self-healing is a way for tackling the ever increasing complexities to manage and fix manually computer software. This paper proposes a cellular adaptation inspired mechanism to make a component based distributed system self heal. In this mechanism compone...
A Hybrid Approach to Actor-Actor Connectivity Restoration in Wireless Sensor and Actor Networks
Found in: International Conference on Networking
By Azadeh Zamanifar, Mohsen Sharifi, Omid Kashefi
Issue Date:March 2009
pp. 76-81
Wireless sensor and actor networks (WSANs) consist of powerful actors and resource constraint sensors, which are linked together in wireless networks. In some applications, actors must communicate with each other to make appropriate decisions and perform c...
Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi
Issue Date:December 2008
pp. 366-372
Scientific applications like weather forecasting require high performance and fast response time. But this ideal requirement has always been constrained by peculiarities of underlying platforms specially distributed platforms. One such constraint is the ef...
An Efficient Algorithm to Detect Faulty Reading in Wireless Sensor Network Using the Concept of Reputation
Found in: Computational Intelligence for Modelling, Control and Automation, International Conference on
By Zahra Taghikhaki, Mohsen Sharifi
Issue Date:December 2008
pp. 969-974
This paper presents a novel approach for detecting faulty sensors as well as identifying the type of faults with a high degree of confidence using reputation concepts and introducing special nodes as beacon nodes to the network and with very low false alar...
An Enhanced Routing Protocol for Wireless Sensor Networks
Found in: Future Generation Communication and Networking
By Mansoureh Ghiasabadi, Mohsen Sharifi, Nafiseh Osati, Sareh Beheshti, Mona Sharifnejad
Issue Date:December 2008
pp. 313-316
Sensor networks consist of a large number of sensor nodes performing distributed sensing and event detection. As sensor nodes are energy-constrained, energy-efficient routing is essential for increasing the lifetime of sensor networks. This paper proposes ...
The Influence of Efficient Message Passing Mechanisms on High Performance Distributed Scientific Computing
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Seyedeh Leili Mirtaheri, Ehsan Mousavi Khaneghah, Mohsen Sharifi, Mohammad Abdollahi Azgomi
Issue Date:December 2008
pp. 663-668
Parallel programming and distributed programming are two solutions for scientific applications to provide high performance and fast response time in parallel systems and distributed systems. Parallel and distributed systems must provide inter process commu...
A Biologically-Inspired Preventive Mechanism for Self-Healing of Distributed Software Components
Found in: Advanced Engineering Computing and Applications in Sciences, International Conference on
By Maryam Bisadi, Mohsen Sharifi
Issue Date:October 2008
pp. 152-157
Autonomous computing is a term with biological connection. Its ultimate aim is to create computer systems capable of self-management. Given the importance of self healing in self management, a number of researches have tried to prevent the failures of soft...
Availability and Accuracy of Distributed Web Crawlers: A Model-Based Evaluation
Found in: Computer Modeling and Simulation, UKSIM European Symposium on
By Mitra Nasri, Saeed Shariati, Mohsen Sharifi
Issue Date:September 2008
pp. 453-458
Distributed Web crawlers are extensively used for Web mining nowadays, but their accuracy, dependability and other operational measures have not been fully studied. Distributed Web crawlers are costly and require careful selection of configuration paramete...
A Self-Training Algorithm for Load Balancing in Cluster Computing
Found in: Networked Computing and Advanced Information Management, International Conference on
By Parimah Mohammadpour, Mohsen Sharifi, Ali Paikan
Issue Date:September 2008
pp. 104-109
This paper proposes a self-training algorithm for load balancing in cluster computing. It uses load information including CPU load, memory usage and network traffic to decide the load of each node and combines this information with properties of each job, ...
Failure Prediction Mechanisms in Cluster Systems
Found in: International Conference on Biocomputation, Bioinformatics, and Biomedical Technologies
By Mohsen Sharifi, Seyed Ali Hamedi
Issue Date:July 2008
pp. 23-28
Clustering is an important technique for improving the performance and availability of computer systems. The use of cluster systems is also continuously growing because they present excellent features like scalability, high availability and high performanc...
A phishing sites blacklist generator
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Mohsen Sharifi, Seyed Hossein Siadati
Issue Date:April 2008
pp. 840-843
Phishing is an increasing web attack both in volume and techniques sophistication. Blacklists are used to resist this type of attack, but fail to make their lists up-to-date. This paper proposes a new technique and architecture for a blacklist generator th...
OTSX: An extended transaction service in support of FT-CORBA standard
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Hadi Salimi, Mohsen Sharifi
Issue Date:April 2008
pp. 430-435
The FT-CORBA standard that has been adopted by OMG in recent years introduces mechanisms in support of increasing the availability of systems. This standard provides an infrastructure to detect faults and replicate distributed objects. In this paper we are...
A Survey of System Software for Wireless Sensor Networks
Found in: Future Generation Communication and Networking
By Majid Alkaee Taleghan, Amirhosein Taherkordi, Mohsen Sharifi, Tai-Hoon Kim
Issue Date:December 2007
pp. 402-407
Wireless Sensor Networks (WSNs) are increasingly used as an enabling technology in a variety of domains. They operate unattended in an autonomous way, are inherently error prone and have limited resources like energy and bandwidth. Due to these special fea...
A Preliminary Formal Specification of Virtual Organization Creation with RAISE Specification Language
Found in: Software Engineering Research, Management and Applications, ACIS International Conference on
By Mohammad Reza Nami, Mohsen Sharifi, Abbas Malekpour
Issue Date:August 2007
pp. 227-232
Recently, several flavors of Formal Methods (FMs) have been gaining industrial acceptance and production quality software tools have begun emerging. Domain Engineering (DE) has been introduced as one of outstanding ideas in software development. It serves ...
How to Counter Control Flow Tampering Attacks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi
Issue Date:May 2007
pp. 815-818
Nowadays more and more business activities are operated through web and the web plays a vital role in the interests of both businesses and their shareholders. However, the very good features of web such as its popularity, accessibility and openness, has pr...
Autonomic Computing: A New Approach
Found in: Asia International Conference on Modelling & Simulation
By Mohammad Reza Nami, Mohsen Sharifi
Issue Date:March 2007
pp. 352-357
Today, IT organizations have encountered growing challenges in the management and maintenance of large scale heterogeneous distributed computing systems because these systems have to be active and available at all hours. Therefore, it is difficult for admi...
Transparent Distributed Programming under Linux
Found in: High Performance Computing Systems and Applications, Annual International Symposium on
By Kamran Karimi, Mohsen Sharifi
Issue Date:May 2006
pp. 13
Developing parallel and distributed programs is usually considered a hard task. One has to have a good understanding of the problem domain, as well as the target hardware, and map the problem to the available hardware resources. The resulting program is of...
Achieving Availability and Reliability in Wireless Sensor Networks Applications
Found in: Availability, Reliability and Security, International Conference on
By Amirhosein Taherkordi, Majid Alkaee Taleghan, Mohsen Sharifi
Issue Date:April 2006
pp. 529-535
Recently, the use of wireless sensor networks has spread to applications areas that are not viable or cost-efficient to be run on other types of networks. The majority of these applications should be run continuously and reliably without interruption. Henc...
A Middleware Layer Mechanism for QoS Support in Wireless Sensor Networks
Found in: Mobile Communications and Learning Technologies, Conference on Networking, Conference on Systems, International Conference on
By Mohsen Sharifi, Majid Alkaee Taleghan, Amirhosein Taherkordi
Issue Date:April 2006
pp. 118
Wireless sensor networks need different satisfying Quality of Service (QoS) levels for their successful operation. Providing QoS support for wireless sensor networks at the middleware layer is a new research area. This paper proposes a real-time and faultt...
A Classified and Comparative Study of Edge Detection Algorithms
Found in: Information Technology: Coding and Computing, International Conference on
By Mohsen Sharifi, Mahmoud Fathy, Maryam Tayefeh Mahmoudi
Issue Date:April 2002
pp. 0117
Since edge detection is in the forefront of image processing for object detection, it is crucial to have a good understanding of edge detection algorithms. This paper introduces a new classification of most important and commonly used edge detection algori...
Energy-Aware Task Allocation in Wireless Sensor Actor Networks
Found in: Computer and Electrical Engineering, International Conference on
By Vahid Rafe, Hossein Momeni, Mohsen Sharifi
Issue Date:December 2009
pp. 145-148
Wireless sensor actor networks (WSANs) are emerging a new generation of real-time embedded systems. Real-timeliness is an important issue in WSANs to guarantee that tasks of an application are distributed based on limited computation and communication reso...
To Establish Enterprise Service Model from Enterprise Business Model
Found in: Services Computing, IEEE International Conference on
By Pooyan Jamshidi, Mohsen Sharifi, Saeed Mansour
Issue Date:July 2008
pp. 93-100
One of the key activities that are needed to construct a quality service-oriented solution is the identification of its architectural elements with the right granularity. The selection of an appropriate method for identification of services from business m...
Towards a system-wide and transparent security mechanism using language-level information flow control
Found in: Proceedings of the 3rd international conference on Security of information and networks (SIN '10)
By Mohammad Reza Azadmanesh, Mohsen Sharifi
Issue Date:September 2010
pp. 19-26
Operating systems try to provide secure platforms using appropriate security mechanisms like DAC and MAC. In spite of this, information confidentiality is not totally provided when information flows in the program memory space. Programming language level s...