default search action
Seyed Vahid Azhari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Farzad Moradi, Vesal Hakami, Seyed Vahid Azhari:
Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy. Comput. Commun. 220: 108-127 (2024) - 2023
- [j21]Farzad Moradi, Vesal Hakami, Seyed Vahid Azhari:
Resource Allocation in Cell-Free Massive MIMO Networks With Hybrid Energy Supplies. IEEE Access 11: 47448-47468 (2023) - [c17]Pranjal Chakraborty, Naser Ezzati-Jivan, Sayed Vahid Azhari, François Tetreault:
AltOOM: A Data-driven Out of Memory Root Cause Identification Strategy. IEEE Big Data 2023: 1637-1646 - 2022
- [j20]Iman Kohyarnejadfard, Daniel Aloise, Seyed Vahid Azhari, Michel R. Dagenais:
Anomaly detection in microservice environments using distributed tracing data analysis and NLP. J. Cloud Comput. 11: 25 (2022) - [j19]Majid Rezazadeh, Naser Ezzati-Jivan, Seyed Vahid Azhari, Michel R. Dagenais:
Performance evaluation of complex multi-thread applications through execution path analysis. Perform. Evaluation 155-156: 102289 (2022) - 2021
- [j18]Paul Naert, Seyed Vahid Azhari, Michel R. Dagenais:
Interactive and targeted runtime verification using a debugger-based architecture. J. Syst. Archit. 115: 102001 (2021) - [j17]Hani Nemati, Seyed Vahid Azhari, Mahsa Shakeri, Michel R. Dagenais:
Host-Based Virtual Machine Workload Characterization Using Hypervisor Trace Mining. ACM Trans. Model. Perform. Evaluation Comput. Syst. 6(1): 4:1-4:25 (2021) - [c16]Seyed Vahid Azhari, Simar Bhamra, Naser Ezzati-Jivan, François Tetreault:
Efficient heap monitoring tool for memory leak detection and root-cause analysis. IEEE BigData 2021: 3020-3030 - [c15]Madeline Janecek, Naser Ezzati-Jivan, Seyed Vahid Azhari:
Container Workload Characterization Through Host System Tracing. IC2E 2021: 9-19 - [c14]Quentin Fournier, Daniel Aloise, Seyed Vahid Azhari, François Tetreault:
On Improving Deep Learning Trace Analysis with System Call Arguments. MSR 2021: 120-130 - [i1]Quentin Fournier, Daniel Aloise, Seyed Vahid Azhari, François Tetreault:
On Improving Deep Learning Trace Analysis with System Call Arguments. CoRR abs/2103.06915 (2021) - 2020
- [j16]Seyed Vahid Azhari, Özgür Gürbüz, Özgür Erçetin, Mohammad Hassan Daei, Hadi Barghi, Mohammad Nassiri:
Delay sensitive resource allocation over high speed IEEE802.11 wireless LANs. Wirel. Networks 26(3): 1949-1968 (2020)
2010 – 2019
- 2019
- [j15]Hadi Barghi, Seyed Vahid Azhari:
A practical sleep coordination and management scheme with duty cycle control for energy sustainable IEEE 802.11s wireless mesh networks. Wirel. Networks 25(5): 2511-2536 (2019) - [j14]Hadi Barghi, Seyed Vahid Azhari:
Joint Energy Sustainability and Quality of Service Framework Providing Soft Guarantees for Energy Harvesting Wireless Mesh Networks. Wirel. Pers. Commun. 105(1): 37-60 (2019) - [c13]Hani Nemati, Seyed Vahid Azhari, Michel R. Dagenais:
Host Hypervisor Trace Mining for Virtual Machine Workload Characterization. IC2E 2019: 102-112 - 2018
- [j13]Seyed Vahid Azhari, Niloofar Afshari, Mohammad Nassiri:
Novel lifetime routing metric for IEEE 802.11 wireless mesh networks. Int. J. Ad Hoc Ubiquitous Comput. 28(1): 1-12 (2018) - 2017
- [j12]Mojataba Jahanbakhsh, Seyed Vahid Azhari, Hani Nemati:
Lyapunov stability of SIP systems and its application to overload control. Comput. Commun. 103: 1-17 (2017) - [j11]Bahar Asgari, Mahdi Fazeli, Ahmad Patooghy, Seyed Vahid Azhari:
Micro-architectural approach to the efficient employment of STTRAM cells in a microprocessor register file. IET Comput. Digit. Tech. 11(1): 1-7 (2017) - [j10]Mojataba Jahanbakhsh, Seyed Vahid Azhari, Javad Enayatizadeh, M. Baghdadi:
Local and distributed SIP overload control solution improving sustainability of SIP networks. Int. J. Commun. Syst. 30(6) (2017) - 2016
- [j9]Esmail Asyabi, Azadeh Azhdari, Mostafa Dehsangi, Michel Gokan Khan, Mohsen Sharifi, Sayed Vahid Azhari:
Kani: a QoS-aware hypervisor-level scheduler for cloud computing environments. Clust. Comput. 19(2): 567-583 (2016) - [j8]Mojtaba MalekpourShahraki, Hadi Barghi, Seyed Vahid Azhari, Saeed Asaiyan:
Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless EDCA Networks. Wirel. Pers. Commun. 90(1): 301-323 (2016) - [c12]Seyed Vahid Azhari, Özgür Gürbüz, Özgür Erçetin:
QoS based aggregation in high speed IEEE802.11 wireless networks. Med-Hoc-Net 2016: 1-7 - 2015
- [j7]Mehmet Ozerk Memis, Özgür Erçetin, Özgür Gürbüz, Seyed Vahid Azhari:
Resource allocation for statistical QoS guarantees in MIMO cellular networks. EURASIP J. Wirel. Commun. Netw. 2015: 217 (2015) - [j6]Mohammad Nassiri, Mohammad Boujari, Seyed Vahid Azhari:
Energy-aware and load-balanced parent selection in RPL routing for wireless sensor networks. Int. J. Wirel. Mob. Comput. 9(3): 231-239 (2015) - [c11]Mostafa Dehsangi, Esmail Asyabi, Mohsen Sharifi, Seyed Vahid Azhari:
cCluster: A Core Clustering Mechanism for Workload-Aware Virtual Machine Scheduling. FiCloud 2015: 248-255 - 2012
- [j5]Seyed Vahid Azhari, Maryam Homayouni, Hani Nemati, Javad Enayatizadeh, Ahmad Akbari:
Overload control in SIP networks using no explicit feedback: A window based approach. Comput. Commun. 35(12): 1472-1483 (2012) - [c10]Seyed Vahid Azhari, Hani Nemati:
Stability analysis of tandem SIP proxies. ICC 2012: 1244-1248 - 2010
- [c9]Maryam Homayouni, Hani Nemati, Seyed Vahid Azhari, Ahmad Akbari:
Controlling Overload in SIP Proxies: An Adaptive Window Based Approach Using No Explicit Feedback. GLOBECOM 2010: 1-5 - [c8]Maryam Homayouni, Mojataba Jahanbakhsh, Seyed Vahid Azhari, Ahmad Akbari:
Overload control in SIP servers: Evaluation and improvement. ICT 2010: 666-672 - [c7]Hani Nemati, Seyed Vahid Azhari, Mohammed N. Smadi, Terence D. Todd:
Trigger Node Assisted WLAN to Cellular Vertical Handover. VTC Fall 2010: 1-5
2000 – 2009
- 2009
- [j4]Mohammed N. Smadi, Seyed Vahid Azhari, Terence D. Todd, Vytas Kezys:
A Study of WLAN-to-Cellular Handover Using Measured Building-Exit Data. IEEE Trans. Veh. Technol. 58(4): 2044-2054 (2009) - [c6]Maryam Homayouni, Seyed Vahid Azhari, Mojataba Jahanbakhsh, Ahmad Akbari, Alireza Mansoori, Nahid Amani:
Configuration of a SIP Signaling Network: An Experimental Analysis. NCM 2009: 76-81 - 2008
- [j3]Ali Mohammad Zareh Bidoki, Nasser Yazdani, Sayed Vahid Azhari:
A logarithmic scheduling algorithm for high speed input-queued switches. Comput. Commun. 31(1): 5-18 (2008) - [j2]Seyed Vahid Azhari, Mohammed N. Smadi, Terence D. Todd:
Fast Client-Based Connection Recovery for Soft WLAN-to-Cellular Vertical Handoff. IEEE Trans. Veh. Technol. 57(2): 1089-1102 (2008) - [j1]Mohammed N. Smadi, Terence D. Todd, Vytas Kezys, Seyed Vahid Azhari, Dongmei Zhao:
Dynamically anchored conferencing handoff for dual-mode cellular/WLAN handsets. Wirel. Networks 14(6): 815-829 (2008) - 2007
- [c5]Seyed Vahid Azhari, Mohammed N. Smadi, Terence D. Todd:
The bandwidth deficit problem in loosely coupled WLAN-to-cellular vertical handover. IWCMC 2007: 623-628 - 2006
- [c4]Mohammed N. Smadi, Seyed Vahid Azhari, Terence D. Todd:
A Measurement-Based Study of WLAN to Cellular Handover. MASS 2006: 735-740 - 2005
- [c3]Seyed Vahid Azhari, Terence D. Todd:
Fast connection recovery in WLAN-to-cellular vertical handoff. MASS 2005 - 2003
- [c2]Sayed Vahid Azhari, Nasser Yazdani, Ali Mohammad Zareh Bidoki:
Providing Delay Guarantee in Input Queued Switches: A Comparative Analysis of Scheduling Algorithms. ICOIN 2003: 3-13 - [c1]Ali Mohammad Zareh Bidoki, Nasser Yazdani, Sayed Vahid Azhari, Siavash Samadian-Barzoki:
A High Speed ATM/IP Switch Fabric Using Distributed Scheduler. ICOIN 2003: 66-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint