Abstract is missing.
- A Novel Piecewise Linear Clustering Technique Based on Hyper Plane AdjustmentMohammad Taheri, Elham Chitsaz, Seraj D. Katebi, Mansoor Zolghadri Jahromi. 1-8 [doi]
- Ant Colony Optimization with a Genetic Restart Approach toward Global OptimizationHossein Hajimirsadeghi, Mahdy Nabaee, Babak Nadjar Araabi. 9-16 [doi]
- Automatic Extraction of IS-A Relations in Taxonomy LearningMahmood Neshati, Hassan Abolhassani, Hassan Fatemi. 17-24 [doi]
- A Bayesian Network Based Approach for Data Classification Using Structural LearningA. R. Khanteymoori, M. M. Homayounpour, M. B. Menhaj. 25-32 [doi]
- A Clustering Method Based on Soft Learning of Model (Prototype) and Dissimilarity MetricsArash Arami, Babak Nadjar Araabi. 33-40 [doi]
- k -Level Uncapacitated Facility Location Problem with PenaltiesMohsen Asadi, Ali Niknafs, Mohammad Ghodsi. 41-49 [doi]
- Optimizing Fixpoint Evaluation of Logic Programs with UncertaintyNematollaah Shiri, Zhi Hong Zheng. 50-60 [doi]
- Approximating Component Selection with General CostsMostafa Nouri, Jafar Habibi. 61-68 [doi]
- Online Suffix Tree Construction for Streaming SequencesGiyasettin Ozcan, Adil Alpkocak. 69-81 [doi]
- Fuzzy Voronoi DiagramMohammadreza Jooyandeh, Ali Mohades Khorasani. 82-89 [doi]
- A Novel Partitioned Encoding Scheme for Reducing Total Power Consumption of Parallel BusMehdi Kamal, Somayyeh Koohi, Shaahin Hessabi. 90-97 [doi]
- Efficient Parallel Buffer Structure and Its Management Scheme for a Robust Network-on-Chip (NoC) ArchitectureJun Ho Bahn, Nader Bagherzadeh. 98-105 [doi]
- Integration of System-Level IP Cores in Object-Oriented Design MethodologiesShoaleh Hashemi Namin, Shaahin Hessabi. 106-114 [doi]
- Polymorphism-Aware Common Bus in an Object-Oriented ASIPNima Karimpour Darav, Shaahin Hessabi. 115-122 [doi]
- Efficient VLSI Layout of WK-Recursive and WK-Pyramid Interconnection NetworksSaeedeh Bakhshi, Hamid Sarbazi-Azad. 123-129 [doi]
- Energy Adaptive Cluster-Head Selection for Wireless Sensor Networks Using Center of Energy MassEhsan Akhtarkavan, Mohammad Taghi Manzuri Shalmani. 130-137 [doi]
- SHRP: A New Routing Protocol to Wireless Sensor NetworksCláudia J. Barenco Abbas, Nelson Cardenas, Giácomo Lobalsamo, Néstor Davila. 138-146 [doi]
- Improvement of MAC Performance for Wireless Sensor NetworksM. H. Fotouhi Ghazvini, M. Vahabi, Mohd Fadlee A. Rasid, Raja Syamsul Azmir Raja Abdullah. 147-152 [doi]
- Route Optimization Security in Mobile IPv6 Wireless Networks: A Test-Bed ExperienceAbbas Mehdizadeh, Sabira Khatun, Borhanuddin Mohd Ali, Raja Syamsul Azmir Raja Abdullah, Gopakumar Kurup. 153-159 [doi]
- Adaptive End-to-End QoS for Multimedia over Heterogeneous Wireless NetworksOuldooz Baghban Karimi, Mahmood Fathy, Saleh Yousefi. 160-167 [doi]
- A Blocking Reduction Scheme for Multiple Slot Cell Scheduling in Multicast Switching SystemsFong-Cheng Lee, Wen-Fong Wang, Jung-Bin Shih. 168-175 [doi]
- Object-Based Video Coding for Distance Learning Using Stereo CamerasAmir Hossein Khalili, Mojtaba Bagheri, Shohreh Kasaei. 176-185 [doi]
- Seabed Image Texture Segmentation and Classification Based on Nonsubsampled Contourlet TransformReza Javidan, Mohammad Ali Masnadi-Shirazi, Zohreh Azimifar. 186-193 [doi]
- Unequal Error Protection for the Scalable Extension of H.264/AVC Using Genetic AlgorithmAmir Naghdinezhad, Mahmoud Reza Hashemi, Omid Fatemi. 194-202 [doi]
- An Adaptive Method for Moving Object Blending in Dynamic MosaicingMojtaba Bagheri, Tayebeh Lotfi, Shohreh Kasaei. 203-210 [doi]
- Inferring a Bayesian Network for Content-Based Image ClassificationShahriar Shariat, Hamid R. Rabiee, Mohammad Khansari. 211-218 [doi]
- High Performance Mathematical Quarter-Pixel Motion Estimation with Novel Rate Distortion Metric for H.264/AVCSomayeh Sardashti, Hamid Reza Ghasemi, Mehdi Semsarzadeh, Mahmoud Reza Hashemi. 219-226 [doi]
- A Versatile Reconfigurable Bit-Serial Multiplier Architecture in Finite Fields GF(2m)Morteza Nikooghadam, Ehsan Malekian, Ali Zakerolhosseini. 227-234 [doi]
- A Nonspeculative Maximally Redundant Signed Digit AdderGhassem Jaberipur, Saeid Gorgin. 235-242 [doi]
- System-Level Assertion-Based Performance Verification for Embedded SystemsHassan Hatefi-Ardakani, Amir Masoud Gharehbaghi, Shaahin Hessabi. 243-250 [doi]
- The Effect of Core Number and Core Diversity on Power and Performance in Multicore ProcessorsA. Zolfaghari Jooya, M. Soryani. 251-258 [doi]
- Reducing the Computational Complexity of an RLS-Based Adaptive Controller in ANVC ApplicationsAllahyar Montazeri, Javad Poshtan. 259-266 [doi]
- An Efficient and Extendable Modeling Approach for VLIW DSP ProcessorsNaser Sedaghati-Mokhtari, Mahdi Nazm Bojnordi, Abbas Hormati, Sied Mehdi Fakhraie. 267-274 [doi]
- An Exact Algorithm for the Multiple-Choice Multidimensional Knapsack Based on the CoreMohammad Reza Razzazi, Taha Ghasemi. 275-282 [doi]
- Kinetic Polar DiagramMojtaba Nouri Bygi, Fatemeh Chitforoush, Maryam Yazdandoost, Mohammad Ghodsi. 283-290 [doi]
- A Graph Transformation-Based Approach to Formal Modeling and Verification of WorkflowsVahid Rafe, Adel Torkaman Rahmani. 291-298 [doi]
- Efficient Parallel Routing Algorithms for Cartesian and Composition NetworksMarzieh Bakhshi, Saeedeh Bakhshi, Hamid Sarbazi-Azad. 299-307 [doi]
- A Naïve Bayes Classifier with Distance Weighting for Hand-Gesture RecognitionPujan Ziaie, Thomas Müller 0001, Mary Ellen Foster, Alois C. Knoll. 308-315 [doi]
- SBUQA Question Answering SystemMahsa Arab Yarmohammadi, Mehrnoush Shamsfard, Mahshid A. Yarmohammadi, Masoud Rouhizadeh. 316-323 [doi]
- A New Feedback ANC System ApproachPooya Davari, Hamid Hassanpour. 324-331 [doi]
- Benefiting White Noise in Developing Feedforward Active Noise Control SystemsPooya Davari, Hamid Hassanpour. 332-339 [doi]
- Comparison of Linear and Nonlinear Models for Estimating Brain Deformation Using Finite Element MethodHajar Hamidian, Hamid Soltanian-Zadeh, Alireza Akhondi Asl, Reza Faraji-Dana. 340-347 [doi]
- Context-Dependent Segmentation of Retinal Blood Vessels Using Hidden Markov ModelsAmir Pourmorteza, Seyed Hamid Rezatofighi, Alireza Roodaki, Ashkan Yazdani, Hamid Soltanian-Zadeh. 348-355 [doi]
- Retinal Vessel Extraction Using Gabor Filters and Support Vector MachinesAlireza Osareh, Bita Shadgar. 356-363 [doi]
- A New Segmentation Method for Iris Recognition Using the Complex Inversion Map and Best-Fitting CurveSepehr Attarchi, Karim Faez, Mir Hashem Mousavi. 364-371 [doi]
- A New Algorithm for Combating Free-Riders in Structured P2P NetworksMohammad R. Raeesi N., Jafar Habibi, Pariya Raoufi, Habib Rostami. 372-379 [doi]
- Clustering Search Engine Log for Query RecommendationMehdi Hosseini, Hassan Abolhassani. 380-387 [doi]
- Reliability Evaluation in Grid EnvironmentSaeed Parsa, Fereshteh-Azadi Parand. 388-395 [doi]
- Formulating Priority Coefficients for Information Quality Criteria on the BlogMohammad Javad Kargar, Abdul Rahman Ramli, H. Ibrahim, Fatemeh Azimzadeh. 396-403 [doi]
- A Distributed Proxy System for High Speed ClientsMartin Krohn, Helena Unger, Djamshid Tavangarian. 404-411 [doi]
- New Routing Strategies for RSP Problems with Concave CostMarjan Momtazpour, Pejman Khadivi. 412-418 [doi]
- Modeling Routing Protocols in Adhoc NetworksFatemeh Ghassemi, Ali Movaghar. 419-426 [doi]
- CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETsFatemeh Saremi, Hoda Mashayekhi, Ali Movaghar, Rasool Jalili. 427-434 [doi]
- A Secure Cross-Layer Design of Clustering-Based Routing Protocol for MANETArash Dana, Marzieh Hajhosseini. 435-442 [doi]
- An Approach for Semantic Web Query Approximation Based on Domain Knowledge and User PreferencesZeinab Iranmanesh, Razieh Piri, Hassan Abolhassani. 443-452 [doi]
- Semantic Web Services for Handling Data Heterogeneity in an E-Business FrameworkSeyyed Ali Rokni Dezfouli, Jafar Habibi, Soheil Hassas Yeganeh. 453-460 [doi]
- Challenges in Using Peer-to-Peer Structures in Order to Design a Large-Scale Web Search EngineHamid Mousavi, Ali Movaghar. 461-468 [doi]
- Sparse Sinusoidal Signal Representation for Speech and Music SignalsPejman Mowlaee, Amirhossein Froghani, Abolghasem Sayadiyan. 469-476 [doi]
- Variant Combination of Multiple Classifiers Methods for Classifying the EEG Signals in Brain-Computer InterfaceZahra Shoaie Shirehjini, Saeed Bagheri Shouraki, Maryam Esmailee. 477-484 [doi]
- Nevisa, a Persian Continuous Speech Recognition SystemHossein Sameti, Hadi Veisi, Mohammad Bahrani, Bagher BabaAli, Khosro Hosseinzadeh. 485-492 [doi]
- Effects of Feature Domain Normalizations on Text Independent Speaker Verification Using Sorted Adapted Gaussian Mixture ModelsRahim Saeidi, Hamid Reza Sadegh Mohammadi, Todor Ganchev, Robert D. Rodman. 493-500 [doi]
- A Centrally Managed Dynamic Spectrum Management Algorithm for Digital Subscriber Line SystemsAdnan Rashdi, Noor Muhammad Sheikh, Asrar Ul-Haq Sheikh. 501-508 [doi]
- Methods for Analyzing Information Contained in an Enterprise Email DatabaseMohsen Sadeghi, Khaled Hadj-Hamou, Mickaël Gardoni. 509-517 [doi]
- Early Bug Detection in Deployed Software Using Support Vector MachineSaeed Parsa, Somaye Arabi Naree, Mojtaba Vahidi-Asl. 518-525 [doi]
- A New Architecture for Heterogeneous Context Based RoutingEnrico Dressler, Raphael Zender, Ulrike Lucke, Djamshid Tavangarian. 526-534 [doi]
- Performance Modeling of a Distributed Web Crawler Using Stochastic Activity NetworksMitra Nasri, Saeed Shariati, Mohammad Abdollahi Azgomi. 535-542 [doi]
- n -cube Variants in Optical NetworksAhmad Kianrad, Aresh Dadlani, Ali Rajabi, Mohammadreza Aghajani, Ahmad Khonsari, Seyed Hasan Seyed Razi. 543-550 [doi]
- A Robust and Efficient SIP Authentication SchemeAlireza Mohammadi-Nodooshan, Yousef Darmani, Rasool Jalili, Mehrdad Nourani. 551-558 [doi]
- A Temporal Semantic-Based Access Control ModelAli Noorollahi Ravari, Morteza Amini, Rasool Jalili. 559-568 [doi]
- A Review on Concepts, Algorithms and Recognition Based Applications of Artificial Immune SystemShahram Golzari, Shyamala Doraisamy, Md. Nasir bin Sulaiman, Nur Izura Udzir. 569-576 [doi]
- Incremental Hybrid Intrusion Detection Using Ensemble of Weak ClassifiersAmin Rasoulifard, Abbas Ghaemi Bafghi, Mohsen Kahani. 577-584 [doi]
- A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc NetworksMohammad Sheikh Zefreh, Ali Fanian, Sayyed Mahdi Sajadieh, Pejman Khadivi, Mehdi Berenjkoub. 585-592 [doi]
- Time Series Analysis for ARP Anomaly Detection: A Combinatorial Network-Based Approach Using Multivariate and Mean-Variance AlgorithmsYasser Yasami, Saadat Pourmozaffari, Siavash Khorsandi. 593-600 [doi]
- Polyhedral GPU Accelerated Shape from SilhouetteAlireza Haghshenas, Mahmoud Fathy, Maryam Mokhtari. 601-608 [doi]
- Discrimination of Bony Structures in Cephalograms for Automatic Landmark DetectionRahele Kafieh, Saeed Sadri, Alireza Mehri, Hamid Raji. 609-620 [doi]
- Grid Based Registration of Diffusion Tensor Images Using Least Square Support Vector MachinesEsmaeil Davoodi-Bojd, Hamid Soltanian-Zadeh. 621-628 [doi]
- Detection of Outer Layer of the Vessel Wall and Characterization of Calcified Plaques in IVUS ImagesAlireza Roodaki, Zahra Najafi, Armin Soltanzadi, Arash Taki, Seyed Kamaledin Setarehdan, Nassir Navab. 629-636 [doi]
- Object Modeling for Multicamera Correspondence Using Fuzzy Region Color Adjacency GraphsAmir Hossein Khalili, Shohreh Kasaei. 637-644 [doi]
- Secure Digital Image Watermarking Based on SVD-DCTAzadeh Mansouri, Ahmad Mahmoudi Aznaveh, Farah Torkamani-Azar. 645-652 [doi]
- A Novel Delay Fault Testing Methodology for Resistive Faults in Deep Sub-micron TechnologiesM. Reza Javaheri, Reza Sedaghat. 653-660 [doi]
- On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant DevicesAmir Moradi 0001, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani. 661-670 [doi]
- Performance Enhancement of Asynchronous CircuitsSomaye Raoufifard, Behnam Ghavami, Mehrdad Najibi, Hossein Pedram. 671-678 [doi]
- A Low Power SRAM Based on Five Transistors CellArash Azizi Mazreah, Mohammad Taghi Manzuri Shalmani. 679-688 [doi]
- Evaluating the Metro-on-Chip Methodology to Improve the Congestion and RoutabilityAli Jahanian 0001, Morteza Saheb Zamani, Mostafa Rezvani, Mehrdad Najibi. 689-696 [doi]
- Sequential Equivalence Checking Using a Hybrid Boolean-Word Level Decision DiagramBijan Alizadeh, Masahiro Fujita. 697-704 [doi]
- A Circuit Model for Fault Tolerance in the Reliable Assembly of Nano-systemsMasoud Hashempour, Zahra Mashreghian Arani, Fabrizio Lombardi. 705-713 [doi]
- An Operator for Removal of Subsumed ClausesMohammad Ghasemzadeh 0001, Christoph Meinel. 714-717 [doi]
- Low Power and Storage Efficient Parallel Lookup Engine Architecture for IP PacketsAlireza Mahini, Reza Berangi, Hossein Mohtashami, Hamidreza Mahini. 718-722 [doi]
- Assignment of OVSF Codes in Wideband CDMAMehdi Askari, Reza Saadat, Mansour Nakhkash. 723-727 [doi]
- Toward Descriptive Performance Model for OpenMosix ClusterBestoun S. Ahmed, Khairulmizam Samsudin, Abdul Rahman Ramli, ShahNor Basri. 728-731 [doi]
- Analysis of the Growth Process of Neural Cells in Culture Environment Using Image Processing TechniquesAtefeh S. Mirsafianf, Shirin N. Isfahani, Shohreh Kasaei, Hamid Mobasheri. 732-736 [doi]
- Bandwidth-Delay Constrained Least Cost Multicast Routing for Multimedia CommunicationMehrdad Mahdavi, Rana Forsati, Ali Movaghar. 737-740 [doi]
- Cellular Probabilistic Evolutionary Algorithms for Real-Coded Function OptimizationM.-R. Akbarzadeh-T., M. Tayarani N.. 741-744 [doi]
- A New Approach for Scoring Relevant Documents by Applying a Farsi Stemming Method in Persian Web Search EnginesHamed Shahbazi, Alireza Mokhtaripour, Mohammad Dalvi Esfahani, Behrouz Tork Ladani. 745-748 [doi]
- FRGA Matching Algorithm in High-Speed Packet SwitchesMohammad Javad Rostami, Ali Asghar Khodaparast. 749-753 [doi]
- A New Class of Data Dissemination Algorithms for Multicast ProtocolsMohammad Javad Rostami, Ali Asghar Khodaparast. 754-757 [doi]
- Dynamic Point Coverage in Wireless Sensor Networks: A Learning Automata ApproachMehdi Esnaashari, Mohammad Reza Meybodi. 758-762 [doi]
- A Novel Approach in Adaptive Traffic Prediction in Self-sizing Networks Using WaveletsHamed Banizaman, Hamid Soltanian-Zadeh. 763-768 [doi]
- Simulative Study of Two Fusion Methods for Target Tracking in Wireless Sensor NetworksSaeid Pashazadeh, Mohsen Sharifi. 769-772 [doi]
- The Advantage of Implementing Martin's Noise Reduction Algorithm in Critical Bands Using Wavelet Packet Decomposition and Hilbert TransformMilad Omidi, Nima Derakhshan, Mohammad Hassan Savoji. 773-776 [doi]
- Real-Time Analysis Process PatternsNaeem Esfahani, Seyed-Hassan Mirian-Hosseinabadi, Kamyar Rafati. 777-781 [doi]
- Selecting Informative Genes from Microarray Dataset Using Fuzzy Relational ClusteringSoudeh Kasiri Bidhendi, Saeed Shiry Ghidary. 782-785 [doi]
- GMTM: A Grid Transaction Management ModelAli A. Safaei, Mostafa S. Haghjoo, Mohammad Ghalambor Dezfuli. 786-789 [doi]
- Design of a Custom Packet Switching Engine for Network ApplicationsMostafa E. Salehi, Sied Mehdi Fakhraie, Abbas Banaiyan, Abbas Hormati. 790-794 [doi]
- Multiple Robots Tasks Allocation: An Auction-Based Approach Using Dynamic-Domain RRTAli Nasri Nazif, Ehsan Iranmanesh, Ali Mohades. 795-798 [doi]
- Efficient Computation of N-S Equation with Free Surface Flow Around an ACV on ShirazUCFD GridSeyyed Mehdi Sheikhalishahi, Davood Alizadehrad, Gholamhossein Dastghaibyfard, Mohammad Mehdi Alishahi, Amir Hossein Nikseresht. 799-802 [doi]
- Enhancing Accuracy of Source Localization in High Reverberation Environment with Microphone ArrayNima Yousefian, Mohsen Rahmani, Ahmad Akbari. 803-806 [doi]
- Class Dependent LDA Optimization Using Genetic Algorithm for Robust MFCC ExtractionHouman Abbasian, Babak Nasersharif, Ahmad Akbari. 807-810 [doi]
- TACtic- A Multi Behavioral Agent for Trading Agent CompetitionHassan Khosravi, Mohammad E. Shiri, Hamid Khosravi, Ehsan Iranmanesh, Alireza Davoodi. 811-815 [doi]
- Software Reliability Prediction Based on a Formal Requirements SpecificationHooshmand Alipour, Ayaz Isazadeh. 816-820 [doi]
- ID-Based Blind Signature and Proxy Blind Signature without Trusted PKGYihua Yu, Shihui Zheng, Yixian Yang. 821-824 [doi]
- The Combination of CMS with PMC for Improving Robustness of Speech Recognition SystemsHadi Veisi, Hossein Sameti. 825-829 [doi]
- A Dynamic Multi Agent-Based Approach to Parallelizing Genetic AlgorithmMohsen Momeni, Kamran Zamanifar. 830-833 [doi]
- Fuzzy Neighborhood Allocation (FNA): A Fuzzy Approach to Improve Near Neighborhood Allocation in DDBReza Basseda, Maseud Rahgozar, Caro Lucas. 834-837 [doi]
- OPWUMP: An Architecture for Online Predicting in WUM-Based Personalization SystemMehrdad Jalali, Norwati Mustapha, Md Nasir Sulaiman, Ali Mamat. 838-841 [doi]
- Artificial Intelligent Controller for a DC MotorHadi Delavari, Abolzafl Ranjbar Noiey, Sara Minagar. 842-846 [doi]
- A Multi-Gb/s Parallel String Matching Engine for Intrusion Detection SystemsVahid Rahmanzadeh, Mohammad Bagher Ghaznavi Ghoushchi. 847-851 [doi]
- A Modified Version of Sugeno-Yasukawa ModelerAmir Hossein Hadad, Tom Gedeon, Saeed Shabazi, Saeed Bahrami. 852-856 [doi]
- Directing the Search in the Fast Forward PlanningSeyed Ali Akramifar, Gholamreza Ghassem-Sani. 857-861 [doi]
- A Dynamic Mandatory Access Control ModelJafar Haadi Jafarian, Morteza Amini, Rasool Jalili. 862-866 [doi]
- Inferring Trust Using Relation Extraction in Heterogeneous Social NetworksNima Haghpanah, Masoud Akhoondi, Hassan Abolhassani. 867-870 [doi]
- Sorting on OTIS-NetworksEhsan Akhgari, Alireza Ziaie, Mohammad Ghodsi. 871-875 [doi]
- A Novel Semi-supervised Clustering Algorithm for Finding Clusters of Arbitrary ShapesMahdieh Soleymani Baghshah, Saeed Bagheri Shouraki. 876-879 [doi]
- Improving Quality of Voice Conversion SystemsM. Farhid, M. A. Tinati. 880-883 [doi]
- Feature Selection SDA Method in Ensemble Nearest Neighbor ClassifierFatemeh Alimardani, Reza Boostani, Ebrahim Ansari. 884-887 [doi]
- A Novel Hybrid Structure for ClusteringMahdi Yazdian Dehkordi, Reza Boostani, Mohammad Tahmasebi. 888-891 [doi]
- 6R Robots; How to Guide and Test Them by Vision?Azamossadat Nourbakhsh, Moharram Habibnezhad Korayem. 892-896 [doi]
- Hierarchical Diagnosis of Vocal Fold DisordersMansour Nikkhah Bahrami, Hossein Ahmadi Noubari, Babak Seyed Aghazadeh, Hossein Khadivi Heris. 897-900 [doi]
- A Voronoi-Based Reactive Approach for Mobile Robot NavigationShahin Mohammadi, Nima Hazar. 901-904 [doi]
- Evaluation of PersianCAT Agent's Accepting Policy in Continuous Double Auction, Participant in CAT 2007 CompetitionSina Honari, Amin Fos-hati, Mojtaba Ebadi, Maziar Gomrokchi. 905-908 [doi]
- A Framework for Implementing Virtual Collaborative Networks - Case Study on Automobile Components Production IndustryElham Parvinnia, Raouf Khayami, Koorush Ziarati. 909-912 [doi]
- Virtual Collaboration Readiness Measurement a Case Study in the Automobile IndustryKoorush Ziarati, Raouf Khayami, Elham Parvinnia, Ghazal Afroozi Milani. 913-916 [doi]
- Facilitating XML Query Processing Via Execution PlanSayyed Kamyar Izadi, Vahid Garakani, Mostafa S. Haghjoo. 917-920 [doi]
- The Impact of Hidden Terminal on WMNet PerformanceKourosh Hassanli, Ali Khayatzadeh Mahani, Majid Naderi. 921-925 [doi]
- Design and Implementation of a Fuzzy Accident DetectorShahram Jafari, Mohammad Arabnejad, Ali Rashidi Moakhar. 926-929 [doi]
- Approximation Algorithms for Edge-Covering ProblemMohammad Hosseinzadeh Moghaddam, Alireza Bagheri. 930-933 [doi]
- A Novel Crosstalk Estimator after PlacementArash Mehdizadeh, Morteza Saheb Zamani. 934-937 [doi]
- A New Operator for Multi-addition CalculationsKooroush Manochehri, Saadat Pourmozaffari, Babak Sadeghian. 938-941 [doi]
- Quantum Differential Evolution Algorithm for Variable Ordering Problem of Binary Decision DiagramAbdesslem Layeb, Djamel-Eddine Saïdouni. 942-945 [doi]
- A Joint Source-Channel Rate-Distortion Optimization Algorithm for H.264 Codec in Wireless NetworksRazieh Rasouli, Hamid R. Rabiee, Mohammad Ghanbari 0001. 946-950 [doi]
- Pre-synthesis Optimization for Asynchronous Circuits Using Compiler TechniquesSharareh Zamanzadeh, Mehrdad Najibi, Hossein Pedram. 951-954 [doi]
- Absolute Priority for a Vehicle in VANETRostam Shirani, Faramarz Hendessi, Mohammad Ali Montazeri, Mohammad Sheikh Zefreh. 955-959 [doi]
- An Ontology Based Routing Index in Unstructured Peer-to-Peer NetworksHoda Mashayekhi, Fatemeh Saremi, Jafar Habibi, Habib Rostami, Hassan Abolhassani. 960-963 [doi]
- Two Architectural Practices for Extreme ProgrammingAmir Azim Sharifloo, Amir S. Saffarian, Fereidoon Shams. 964-967 [doi]
- Adaptive Target Detection in Sensor NetworksGhasem Mirjalily. 968-971 [doi]
- Linear Temporal Logic of Constraint AutomataSara NavidPour, Mohammad Izadi. 972-975 [doi]
- Using Social Annotations for Search Results ClusteringSadegh Aliakbary, Mahdy Khayyamian, Hassan Abolhassani. 976-980 [doi]
- Event Detection from News ArticlesHassan Sayyadi, Alireza Sahraei, Hassan Abolhassani. 981-984 [doi]
- Architectural Styles as a Guide for Software Architecture ReconstructionKamyar Khodamoradi, Jafar Habibi, Ali Kamandi. 985-989 [doi]
- Best Effort Flow Control in Network-on-ChipMohammad S. Talebi, Fahimeh Jafari, Ahmad Khonsari, Mohammad Hossein Yaghmaee. 990-993 [doi]
- Prevention of Tunneling Attack in endairAMohammad Fanaei, Ali Fanian, Mehdi Berenjkoub. 994-999 [doi]
- Digital Social Network Mining for Topic DiscoveryPooya Moradian Zadeh, Maryam Mohi, Mohsen Sadighi Moshkenani. 1000-1003 [doi]
- Towards Dynamic Assignment of Rights and Responsibilities to Agents (Short Version)Farnaz Derakhshan, Peter McBurney, Trevor J. M. Bench-Capon. 1004-1008 [doi]
- Finding Correlation between Protein Protein Interaction Modules Using Semantic Web TechniquesMehdi Kargar, Shahrouz Moaven, Hassan Abolhassani. 1009-1012 [doi]