Fatemeh Ghassemi
Title
Cited by
Cited by
Year
Restricted broadcast process theory
F Ghassemi, W Fokkink, A Movaghar
2008 Sixth IEEE International Conference on Software Engineering and Formal …, 2008
542008
Equational reasoning on ad hoc networks
F Ghassemi, W Fokkink, A Movaghar
International Conference on Fundamentals of Software Engineering, 113-128, 2009
292009
Equational reasoning on mobile ad hoc networks
F Ghassemi, W Fokkink, A Movaghar
Fundamenta Informaticae 105 (4), 375-415, 2010
272010
Verification of mobile ad hoc networks: An algebraic approach
F Ghassemi, W Fokkink, A Movaghar
Theoretical Computer Science 412 (28), 3262-3282, 2011
222011
Stochastic restricted broadcast process theory
F Ghassemi, M Talebi, A Movaghar, W Fokkink
European Performance Engineering Workshop, 72-86, 2011
142011
Modeling and efficient verification of wireless ad hoc networks
B Yousefi, F Ghassemi, R Khosravi
Formal Aspects of Computing 29 (6), 1051-1086, 2017
132017
An adaptive sinkhole aware algorithm in wireless sensor networks
G Jahandoust, F Ghassemi
Ad Hoc Networks 59, 24-34, 2017
112017
Model checking MANETs with arbitrary mobility
F Ghassemi, S Ahmadi, W Fokkink, A Movaghar
International Conference on Fundamentals of Software Engineering, 217-232, 2013
102013
Automated mapping of Reo circuits to constraint automata
F Ghassemi, S Tasharofi, M Sirjani
Electronic Notes in Theoretical Computer Science 159, 99-115, 2006
102006
Modeling and efficient verification of broadcasting actors
B Yousefi, F Ghassemi, R Khosravi
International Conference on Fundamentals of Software Engineering, 69-83, 2015
82015
Probabilistic key pre-distribution for heterogeneous mobile ad hoc networks using subjective logic
M Ahmadi, M Gharib, F Ghassemi, A Movaghar
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
72015
Model checking mobile ad hoc networks
F Ghassemi, W Fokkink
Formal Methods in System Design 49 (3), 159-189, 2016
52016
An analysis of vendor lock-in problem in cloud storage
SM Razavian, H Khani, N Yazdani, F Ghassemi
ICCKE 2013, 331-335, 2013
52013
Hybrid rebeca: Modeling and analyzing of cyber-physical systems
I Jahandideh, F Ghassemi, M Sirjani
Cyber Physical Systems. Model-Based Design, 3-27, 2018
42018
An efficient loop-free version of aodvv2
B Yousefi, F Ghassemi
arXiv preprint arXiv:1709.01786, 2017
22017
Product line process theory
F Ghassemi, MR Mousavi
Journal of Logical and Algebraic Methods in Programming 85 (1), 200-226, 2016
22016
Modeling routing protocols in adhoc networks
F Ghassemi, A Movaghar
Computer Society of Iran Computer Conference, 419-426, 2008
22008
Reliable restricted process theory
F Ghassemi, W Fokkink
Fundamenta Informaticae 165 (1), 1-41, 2019
12019
ConsiDroid: A concolic-based tool for detecting SQL injection vulnerability in Android apps
E Edalat, B Sadeghiyan, F Ghassemi
arXiv preprint arXiv:1811.10448, 2018
12018
Verification of mobile ad hoc network processes with data
F Ghassemi
The CSI Journal on Computer Science and Engineering 15 (2), 44-52, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20