Papers of School of Mathematics

  • Papers in Journals:
  • List of Papers
  • Papers Published
  • Papers to Appear
  • Refereed Papers in:
  • Proceedings
  • Handbooks
  • Books (Collected Articles)
  • Search for Papers
  • List of all Papers

  • Pages: 1 2 3 4

      [Search Papers] [Print this List]
    1. M. Ghari (Joint with S. Bucheli and T. Studer),
    Temporal Justification Logic,
    243 Electronic Proceedings in Theoretical Computer Science


    59-74
    (2017) 
    [abstract]   
     
    2. S. Beigi, O. Etesami and A. Gohari,
    The value of information-theoretic content of help bits for computation,
    DOI: 10.1109/IWCIT.2015.7140205 Iran Workshop on Communication and Information Theory (IWCIT)

    IEEE publisher
    1-3
    (2015) 
    [abstract]   
     
    3. S. Beigi, O. Etesami and A. Gohari,
    Deterministic randomness extraction from generalized and distributed Santha-Vazirani sources,
    ICALP 2015


    143-154
    (2015) 
    [abstract]   
     
    4. A. Mohammadian and B. Tayfeh-Rezaie,
    A note on order and eigenvalue multiplicity of strongly regular graphs,
    Algebraic Design Theory and Hadamard Matrices
    Charles Colbourn

    209-212
    (2015) 
    [abstract]   
     
    5. R. Rezaeian Farashahi (Joint with B. rashidi and S. M. Sayedi),
    High-speed and pipelined finite field bit-parallel multiplier over GF(2m) for elliptic curve cryptosystems,
    ISCISC, 2014



    (2014) 
    [abstract]   
     
    6. Sh. Heidarkhani,
    Three solutions for systems of n fourth order partial differential equations,
    DOI 10.1007/978-1-4614-7333-6 35 Proceeding of International Conference on Differential & Difference Equations and Applications
    S. Pinelas
    Springer
    411-419
    (2013) 
    [abstract]   
     
    7. S. Salehipourmehr ,
    Computation in Logic and Logic in Computation,
    Proceedings of the Third International Conference on Contemporary Issues in Computer and Information Sciences


    580-583
    (2012) 
    [abstract]   
     
    8. M. S. Fallah (Joint with B. Sattarzadeh),
    Is cryptic able to detect insider attacks?,
    LNCS


    230-244
    (2011) 
    [abstract]   
     
    9. M. S. Fallah (Joint with A. Afshar),
    Reconstructing security types for automated policy enforcement in FABLE,
    International Conference on Network and System Security
    IEEE Computer Society Press

    358-363
    (2011) 
    [abstract]   
     
    10. S. Azam (Joint with H. Yamane and M. Yousofzadeh),
    Exposition on affine and elliptic root systems and elliptic Lie algebras,
    The Proceedings of New developments in group representation theory and noncommutative harmonic analysis



    (2011) 
    [abstract]   
     

    back to top

    Pages : 1 2 3 4  

    footer
     

    webmaster | ipmic@ipm.ir   Copyright © 2012, All rights reserved.