default search action
Ali Azarpeyvand
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand:
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation. J. Supercomput. 80(8): 10985-11013 (2024) - [j12]Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand:
Publisher Correction: Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation. J. Supercomput. 80(9): 13492 (2024) - [c10]Bahram Parchekani, Samira Nazari, Mohammad Hasan Ahmadilivani, Ali Azarpeyvand, Jaan Raik, Tara Ghasempouri, Masoud Daneshtalab:
Zero-Memory-Overhead Clipping-Based Fault Tolerance for LSTM Deep Neural Networks. DFT 2024: 1-4 - [c9]Mahdi Taheri, Natalia Cherezova, Samira Nazari, Ahsan Rafiq, Ali Azarpeyvand, Tara Ghasempouri, Masoud Daneshtalab, Jaan Raik, Maksim Jenihhin:
AdAM: Adaptive Fault-Tolerant Approximate Multiplier for Edge DNN Accelerators. ETS 2024: 1-4 - [c8]Hossein Rostami, Mostafa Hosseini, Ali Azarpeyvand, Mohammad Reza Heidari Iman, Tara Ghasempouri:
Automatic High Functional Coverage Stimuli Generation for Assertion-based Verification. IOLTS 2024: 1-7 - [i2]Mahdi Taheri, Natalia Cherezova, Samira Nazari, Ahsan Rafiq, Ali Azarpeyvand, Tara Ghasempouri, Masoud Daneshtalab, Jaan Raik, Maksim Jenihhin:
AdAM: Adaptive Fault-Tolerant Approximate Multiplier for Edge DNN Accelerators. CoRR abs/2403.02936 (2024) - 2023
- [j11]Shima Pouyan, Mostafa Charmi, Ali Azarpeyvand, Hossein Hassanpoor:
Propounding First Artificial Intelligence Approach for Predicting Robbery Behavior Potential in an Indoor Security Camera. IEEE Access 11: 60471-60489 (2023) - [j10]Babak Rokh, Ali Azarpeyvand, Alireza Khanteymoori:
A Comprehensive Survey on Model Quantization for Deep Neural Networks in Image Classification. ACM Trans. Intell. Syst. Technol. 14(6): 97:1-97:50 (2023) - 2022
- [j9]Samaneh Rezaei, Reza Omidi, Ali Azarpeyvand:
Logarithm-approximate floating-point multiplier. Microelectron. J. 127: 105521 (2022) - [j8]Omid Abbaszadeh, Ali Azarpeyvand, Alireza Khanteymoori, Abbas Bahari:
Data-Driven and Knowledge-Based Algorithms for Gene Network Reconstruction on High-Dimensional Data. IEEE ACM Trans. Comput. Biol. Bioinform. 19(3): 1545-1557 (2022) - [i1]Babak Rokh, Ali Azarpeyvand, Alireza Khanteymoori:
A Comprehensive Survey on Model Quantization for Deep Neural Networks. CoRR abs/2205.07877 (2022) - 2021
- [c7]Shima Pouyan, Mostafa Charmi, Ali Azarpeyvand, Hossein Hassanpoor:
Significantly improving human detection in low-resolution images by retraining YOLOv3. CSICC 2021: 1-6
2010 – 2019
- 2018
- [j7]Mostafa E. Salehi, Ali Azarpeyvand, Armin Hajaboutalebi Aboutalebi:
Vulnerability Analysis of Adder Architectures Considering Design and Synthesis Constraints. J. Electron. Test. 34(1): 7-14 (2018) - [j6]Mohsen Nourazar, Vahid Rashtchi, Ali Azarpeyvand, Farshad Merrikh-Bayat:
Code Acceleration Using Memristor-Based Approximate Matrix Multiplier: Application to Convolutional Neural Networks. IEEE Trans. Very Large Scale Integr. Syst. 26(12): 2684-2695 (2018) - 2016
- [j5]Ali Azarpeyvand, Mostafa E. Salehi, Seid Mehdi Fakhraie, Saeed Safari:
Fast and accurate architectural vulnerability analysis for embedded processors using Instruction Vulnerability Factor. Microprocess. Microsystems 42: 113-126 (2016) - [j4]Fatemeh Pouyan, Ali Azarpeyvand, Saeed Safari, Sied Mehdi Fakhraie:
Reliability aware throughput management of chip multi-processor architecture via thread migration. J. Supercomput. 72(4): 1363-1380 (2016) - [c6]Samira Nazari, Maryam Hassani, Ali Azarpeyvand:
An ultra-fast multi-objective optimization algorithm for VLIW architecture. EWDTS 2016: 1-7 - 2015
- [j3]Fatemeh Pouyan, Ali Azarpeyvand, Saeed Safari, Sied Mehdi Fakhraie:
Reliability-aware simultaneous multithreaded architecture using online architectural vulnerability factor estimation. IET Comput. Digit. Tech. 9(2): 124-133 (2015) - 2014
- [j2]Ali Azarpeyvand, Mostafa E. Salehi, Sied Mehdi Fakhraie:
An analytical method for reliability aware instruction set extension. J. Supercomput. 67(1): 104-130 (2014) - 2013
- [c5]Bahareh J. Farahani, Ali Azarpeyvand, Saeed Safari, Seid Mehdi Fakhraie:
Reliability-aware cross-layer custom instruction screening. DDECS 2013: 258-262 - 2012
- [j1]Farshad Firouzi, Ali Azarpeyvand, Mostafa E. Salehi, Sied Mehdi Fakhraie:
Adaptive fault-tolerant DVFS with dynamic online AVF prediction. Microelectron. Reliab. 52(6): 1197-1208 (2012) - [c4]Ali Azarpeyvand, Mostafa E. Salehi, Seid Mehdi Fakhraie:
CIVA: Custom instruction vulnerability analysis framework. DDECS 2012: 318-323 - [c3]Ali Azarpeyvand, Mostafa E. Salehi, Sied Mehdi Fakhraie:
Vulnerability Analysis for Custom Instructions. DSD 2012: 144-147 - 2010
- [c2]Ali Azarpeyvand, Mostafa E. Salehi, Farshad Firouzi, Amir Yazdanbakhsh, Sied Mehdi Fakhraie:
Instruction reliability analysis for embedded processors. DDECS 2010: 20-23
2000 – 2009
- 2000
- [c1]Amir M. Sodagar, G. Roientan Lahiji, Ali Azarpeyvand:
A novel architecture for sine-output direct digital frequency synthesizers using parabolic approximation. ICECS 2000: 256-259
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint