


default search action
Ayaz Isazadeh
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j39]Mehdi Ayar, Ayaz Isazadeh, Farhad Soleimanian Gharehchopogh
, MirHojjat Seyedi
:
NSICA: Multi-objective imperialist competitive algorithm for feature selection in arrhythmia diagnosis. Comput. Biol. Medicine 161: 107025 (2023) - 2022
- [j38]MohammadSadegh Mohagheghi
, Jaber Karimpour
, Ayaz Isazadeh:
Improving modified policy iteration for probabilistic model checking. Comput. Sci. 23(1) (2022) - [j37]Zolfaghar Salmanian, Habib Izadkhah, Ayaz Isazadeh:
Auto-Scale Resource Provisioning In IaaS Clouds. Comput. J. 65(2): 297-309 (2022) - [j36]M. Boudaghi, Farnaz Mahan
, Ayaz Isazadeh:
Using BTA Algorithm for finding Nash equilibrium problem aiming the extraction of rules in rule learning. Soft Comput. 26(1): 439-462 (2022) - [j35]Mehdi Ayar, Ayaz Isazadeh, Farhad Soleimanian Gharehchopogh
, MirHojjat Seyedi
:
Chaotic-based divide-and-conquer feature selection method and its application in cardiac arrhythmia classification. J. Supercomput. 78(4): 5856-5882 (2022) - [j34]Navid Teymourian
, Habib Izadkhah
, Ayaz Isazadeh:
A Fast Clustering Algorithm for Modularization of Large-Scale Software Systems. IEEE Trans. Software Eng. 48(4): 1451-1462 (2022) - 2021
- [j33]Zahra Abdi Reyhan, Shahriar Lotfi
, Ayaz Isazadeh, Jaber Karimpour
:
Intra-Tile Parallelization for Two-Level Perfectly Nested Loops With Non-Uniform Dependences. Comput. J. 64(9): 1358-1383 (2021) - [j32]Naeem Shirmohammady
, Habib Izadkhah
, Ayaz Isazadeh:
PPI-GA: A Novel Clustering Algorithm to Identify Protein Complexes within Protein-Protein Interaction Networks Using Genetic Algorithm. Complex. 2021: 2132516:1-2132516:14 (2021) - [j31]Babak Pourasghar, Habib Izadkhah, Ayaz Isazadeh
, Shahriar Lotfi
:
A graph-based clustering algorithm for software systems modularization. Inf. Softw. Technol. 133: 106469 (2021) - [j30]Seyed Mohammad Javad Hosseini, Bahman Arasteh
, Ayaz Isazadeh, Mehran Mohsenzadeh
, Mitra Mirzarezaee
:
An error-propagation aware method to reduce the software mutation cost using genetic algorithm. Data Technol. Appl. 55(1): 118-148 (2021) - [i1]SayedHassan Khatoonabadi, Shahriar Lotfi, Ayaz Isazadeh:
GAP2WSS: A Genetic Algorithm based on the Pareto Principle for Web Service Selection. CoRR abs/2109.10430 (2021) - 2020
- [j29]MohammadSadegh Mohagheghi
, Jaber Karimpour
, Ayaz Isazadeh:
Prioritizing Methods to Accelerate Probabilistic Model Checking of Discrete-Time Markov Models. Comput. J. 63(1): 105-122 (2020) - [j28]Masoud Aghdasifam, Habib Izadkhah
, Ayaz Isazadeh:
A New Metaheuristic-Based Hierarchical Clustering Algorithm for Software Modularization. Complex. 2020: 1794947:1-1794947:25 (2020) - [j27]Masoud Kargar
, Ayaz Isazadeh, Habib Izadkhah
:
New internal metric for software clustering algorithms validity. IET Softw. 14(4): 402-410 (2020) - [j26]Masoud Kargar
, Ayaz Isazadeh, Habib Izadkhah
:
Improving the modularization quality of heterogeneous multi-programming software systems by unifying structural and semantic concepts. J. Supercomput. 76(1): 87-121 (2020)
2010 – 2019
- 2019
- [j25]Ali A. Noroozi
, Jaber Karimpour
, Ayaz Isazadeh:
Information leakage of multi-threaded programs. Comput. Electr. Eng. 78: 400-419 (2019) - [j24]Masoud Kargar
, Ayaz Isazadeh, Habib Izadkhah:
Multi-programming language software systems modularization. Comput. Electr. Eng. 80 (2019) - [j23]Amir Hosseinzadeh-Mokarram
, Ayaz Isazadeh, Habib Izadkhah:
Early reliability assessment of component-based software system using colored petri net. Turkish J. Electr. Eng. Comput. Sci. 27(4): 2681-2696 (2019) - [j22]Khayyam Salehi
, Jaber Karimpour
, Habib Izadkhah
, Ayaz Isazadeh:
Channel Capacity of Concurrent Probabilistic Programs. Entropy 21(9): 885 (2019) - [c18]Ali A. Noroozi, Khayyam Salehi
, Jaber Karimpour
, Ayaz Isazadeh:
Secure Information Flow Analysis Using the PRISM Model Checker. ICISS 2019: 154-172 - 2018
- [j21]Omid Tarkhaneh, Ayaz Isazadeh, Hossein Jabbari Khamnei:
A new hybrid strategy for data clustering using cuckoo search based on Mantegna levy distribution, PSO and k-means. Int. J. Comput. Appl. Technol. 58(2): 137-149 (2018) - [j20]Ayaz Isazadeh:
Message from the Editor-in-Chief: Prof. Ayaz Isazadeh. Iran J. Comput. Sci. 1(1): 1-2 (2018) - 2017
- [b1]Ayaz Isazadeh, Habib Izadkhah, Islam Elgedawy:
Source Code Modularization - Theory and Techniques. Springer 2017, ISBN 978-3-319-63344-2, pp. 1-265 - [j19]Mohammadbagher Karimi
, Ayaz Isazadeh, Amir Masoud Rahmani
:
QoS-aware service composition in cloud computing using data mining techniques and genetic algorithm. J. Supercomput. 73(4): 1387-1415 (2017) - [j18]Zolfaghar Salmanian
, Habib Izadkhah, Ayaz Isazadeh:
Optimizing web server RAM performance using birth-death process queuing system: scalable memory issue. J. Supercomput. 73(12): 5221-5238 (2017) - 2016
- [j17]Ayaz Isazadeh, Farnaz Mahan
, Witold Pedrycz:
MFlexDT: multi flexible fuzzy decision tree for data stream classification. Soft Comput. 20(9): 3719-3733 (2016) - 2015
- [j16]Mehdi Shadaram, Mubashir Husain Rehmani
, Ayaz Isazadeh:
Introduction to the special section on "Emerging Wireless Networks". Comput. Electr. Eng. 48: 60-61 (2015) - [c17]Jaber Karimpour
, Ayaz Isazadeh, MohammadSadegh Mohagheghi
, Khayyam Salehi
:
Improved Iterative Methods for Verifying Markov Decision Processes. FSEN 2015: 207-214 - [c16]Jaber Karimpour
, Ayaz Isazadeh, Ali A. Noroozi:
Verifying Observational Determinism. SEC 2015: 82-93 - 2014
- [j15]Ayaz Isazadeh, Witold Pedrycz, Farnaz Mahan
:
ECA rule learning in dynamic environments. Expert Syst. Appl. 41(17): 7847-7857 (2014) - [j14]Ayaz Isazadeh, Jaber Karimpour
, Islam Elgedawy
, Habib Izadkhah:
An analytical model for source code distributability verification. J. Zhejiang Univ. Sci. C 15(2): 126-138 (2014) - 2013
- [j13]Mahdi Abdollahi
, Ayaz Isazadeh, Davoud Abdollahi:
Imperialist competitive algorithm for solving systems of nonlinear equations. Comput. Math. Appl. 65(12): 1894-1908 (2013) - [j12]Jaber Karimpour
, Ayaz Isazadeh, Habib Izadkhah:
Early performance assessment in component-based software systems. IET Softw. 7(2) (2013) - [c15]Esmaeil Laleh, Shahriar Lotfi
, Ayaz Isazadeh, Yousef Masodi:
An Algorithm of Developed Imperialist Competition for Suitable Human Resource Layout. SNPD 2013: 11-16 - 2012
- [j11]Ayaz Isazadeh, Mohsen Heydarian:
Distributed multicast multichannel paths. Telecommun. Syst. 50(1): 55-70 (2012) - 2011
- [j10]Leyli Mohammad Khanli
, Ayaz Isazadeh, Tahmuras N. Shishavan:
PHFS: A dynamic replication method, to decrease access latency in the multi-tier data grid. Future Gener. Comput. Syst. 27(3): 233-244 (2011) - [j9]Leyli Mohammad Khanli
, Farnaz Mahan
, Ayaz Isazadeh:
Active rule learning using decision tree for resource management in Grid computing. Future Gener. Comput. Syst. 27(6): 703-710 (2011) - [c14]Arash Jodeiri Salimi, Ayaz Isazadeh, Jaber Karimpour
:
Admission Control for WebServices in Enterprise Systems Using Expert Systems. WISM (1) 2011: 192-199 - 2010
- [j8]Ayaz Isazadeh, Mohsen Heydarian:
Traffic distribution for end-to-end QoS routing with multicast multichannel services. J. Supercomput. 52(1): 47-81 (2010) - [c13]Saeed Rashtbar, Ayaz Isazadeh, Leyli Mohammad Khanly:
A new hybrid approach for multiprocessor system scheduling with genetic algorithm and tabu search (HGTS). ICIS 2010: 626-631
2000 – 2009
- 2009
- [j7]Ayaz Isazadeh, Jaber Karimpour
:
A new formalism for mathematical description and verification of component-based systems. J. Supercomput. 49(3): 334-353 (2009) - 2008
- [j6]Ayaz Isazadeh, Hamid Nouri, Maral Rezvan:
An evolutionary system architecture for information protection. Appl. Math. Comput. 197(2): 687-691 (2008) - [j5]Ayaz Isazadeh, Mohsen Heydarian:
Optimal multicast multichannel routing in computer networks. Comput. Commun. 31(17): 4149-4161 (2008) - [j4]Ayaz Isazadeh, Jaber Karimpour:
Viewcharts: Syntax and Semantics. Informatica 19(3): 345-362 (2008) - [c12]Hooshmand Alipour, Ayaz Isazadeh:
Software Reliability Prediction Based on a Formal Requirements Specification. CSICC 2008: 816-820 - [c11]Mohsen Heydarian, Ayaz Isazadeh, Somayeh Gholizadeh:
End-to-End QoS Routing for Multicasting Provisioning in Computer Networks with Multichannel Paths. International Conference on Internet Computing 2008: 10-16 - [c10]Masoud Kargar
, Ayaz Isazadeh, Farzaneh Fartash, Taha Saderi, Ahmad Habibizad Navin
:
Data-mining by probability-based patterns. ITI 2008: 353-360 - [c9]Habib Karimpour, Ayaz Isazadeh, Mohsen Heydarian:
Object-Oriented Hypermedia Design and J2EE Technology for Web-based Applications. Software Engineering Research and Practice 2008: 334-340 - 2007
- [c8]Morteza Abbaszadeh Meinagh, Ayaz Isazadeh, Bager Zarei
, Mehdi Zarei:
Database Replication: AvailAbility aind Consistency Astsrance via Stream Processing. AICCSA 2007: 396-403 - [c7]Ayaz Isazadeh, Jaber Karimpour
, Hosein Isazadeh:
A New Method for Describing the Syntax and Semantics of VIEWCHARTS. ISPA Workshops 2007: 345-354 - [c6]Ayaz Isazadeh, Jaber Karimpour
, Hosein Isazadeh:
A New Formalism for Describing Concurrent Systems. ISPA Workshops 2007: 355-364 - [c5]Mohsen Heydarian, Ayaz Isazadeh, Hosein Isazadeh:
Optimal Multicast Multichannel Routing in Computer Networks. ISPA Workshops 2007: 503-512 - 2006
- [c4]Sanya Attari, Ayaz Isazadeh:
Processor Allocation in Mesh Multiprocessors Using a Hybrid Method. PDCAT 2006: 492-496 - 2004
- [j3]Ayaz Isazadeh:
Software Engineering: The Trend. Informatica (Slovenia) 28(2): 129-137 (2004) - 2002
- [j2]Ayaz Isazadeh:
Software engineering: configuration languages. Informatica (Slovenia) 26(2) (2002)
1990 – 1999
- 1999
- [j1]Ayaz Isazadeh, David Alex Lamb, Terry Shepard:
Behavioural Views for Software Requirements Engineering. Requir. Eng. 4(1): 19-37 (1999) - 1996
- [c3]Ayaz Isazadeh, David Alex Lamb, Glenn H. MacEwen:
Behavioral Views for Software Requirements Engineering. ECBS 1996: 300-307 - [c2]Ayaz Isazadeh, David Alex Lamb:
An Algorithmic Semantics for Viewcharts. ICECCS 1996: 293-296 - 1995
- [c1]Ayaz Isazadeh, Glenn H. MacEwen, Andrew J. Malton:
Behavioral patterns for software requirement engineering. CASCON 1995: 33
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint