Hadi Shahriar Shahhoseini

Learn More
Reconfiguration overhead is an important obstacle that limits the performance of on-line scheduling algorithms in reconfigurable computing systems and increases the overall execution time. Configuration reusing (task reusing) can decrease reconfiguration overhead considerably, particularly in periodic applications. In this paper, we present a new approach(More)
Password Authenticated Key Exchange (PAKE) protocols enable two entities to agree on a common session key based on a pre-shared human memorable password. The main security goal of these protocols is providing security against password guessing attacks. In 2003, Hitchcock et al.'s protocol is presented. In 2005, Abdalla and Pointcheval proposed SPAKE1 and(More)
In this paper, Size Based Adaptive backoff algorithm (SBA backoff algorithm) for IEEE 802.11 DCF has been developed to provide Quality of Service (QoS) requirements. SBA backoff algorithm assigns different priority levels based on packet size. Also, SBA backoff algorithm was utilized in the Mobile Ad-hoc Network (MANET), which is a collection of mobile(More)
Tracking moving objects with Wireless Sensor Networks (WSNs) has received much concern because of its practical applications in nowadays world. Tracking accuracy is deeply dependant upon tracking time interval of the tracking network. This paper proposes a new adaptive power optimization scheme for target tracking sensor networks. This scheme includes a(More)
Scheduling a parallel application on a set of processors is a well-known NP-Complete problem. The problem becomes more complex when the base system is composed of heterogeneous processors. In this paper, we present a low-complexity task scheduling algorithm for heterogeneous computing systems, which we call the Multiple Critical Path Dominator (MCPD)(More)
The phishing as an online identity theft is one of the fastest growing crimes in the Internet. Several counter-measures are proposed through the years, one of them is the Anti-phishing Authentication (APA) protocol that is based on SPEKE which is a Password Authenticated Key Exchange (PAKE) protocol. In this paper, it is shown that the APA protocol is(More)
Reconfigurable computing systems can be reconfigured at runtime and support partial reconfigurability which makes us able to execute tasks in a true multitasking manner. To manage such systems at runtime, a reconfigurable operating system is needed. The main part of this operating system is resource management unit which performs on-line scheduling and(More)
In this paper a new structure is proposed for the massive parallel processing systems. This structure is expandable in vertical and horizontal manner and cover many of the previous computer designs. The queuing theory and Jackson queuing network is applied for constructing an analytical model for the proposed structure. This model gives a closed-form(More)
Information, image and media encryption is a method for preventing misuse of adversaries. Because encryption and decryption normally need too complex computation. Visual cryptography is a method in witch decryption is performed with used via human visual system. In the traditional scheme; one secret image is divided between two shares so that by stacking(More)
PAKE protocols which stands for Password Authenticated Key Exchange are of great importance for providing secure communications over the Internet. They permit two entities to share a session key in an authentic manner based on a human-memorable password. In 2006, Kolesnikov and Rackoff proposed an improvement to the Halevi and Krawczyk's PAKE protocols. In(More)