A multimodal emotion recognition system using deep convolution neural networks
Journal Articles
2024
Mohammed A. Almulla
Journal of Engineering Research
Visit
Copy
A novel CLIPS-based medical expert system for migraine diagnosis and treatment recommendation
Journal Articles
2024
Mohammed A. Almulla
Journal of Engineering Research
Visit
Copy
On the Effect of Prior Knowledge in Text-Based Emotion Recognition
Journal Articles
2024
Mohammed A. Almulla
International Journal of Research and Scientific Innovation 11, no. 8 (2024): 48-58.
Visit
Copy
A partial order framework for incomplete data clustering
Journal Articles
2023
Hamdi Yahyaoui, Hosam AboElfotoh
Appl Intell 53, 7439–7454
Visit
Copy
Leeno: Type 1 diabetes management training environment using smart algorithms
Journal Articles
2022
Ahmad Lafi, Mohamed Smaoui
PLOS ONE 17(9): e0274534
Visit
Copy
Dynamic System Diversification for Securing Cloud-based IoT Subnetworks
Journal Articles
2022
David Evans, Hussain Almohri, Layne Watson, Stephen Billups
ACM Transactions on Autonomous and Adaptive Systems Volume 17 Issue 1-2 Article No.: 2 pp 1–23
Visit
Copy
Lightweight, Effective Detection and Characterization of Mobile Malware Families
Journal Articles
2022
Hussain Almohri, Karim O. Elish, Mahmoud O. Elish
IEEE Transactions on Computers, vol. 71, no. 11, pp. 2982-2995
Visit
Copy
Efficient Mobile Location Tracking and Data Reduction for Proximity Detection Applications
Journal Articles
2022
Hamdi Yahyaoui, Mohamed Koura, Mohamed Landolsi
IEEE Access, vol. 10, pp. 134172-134182
Visit
Copy
Trust-based management in IoT federations
Journal Articles
2022
Hamdi Yahyaoui, Hamid Al-Hamadi, Mohammed Al-Khafajiy, Zakaria Maamar
Future Generation Computer Systems 136, 182-192
Visit
Copy
Model checking agent-based communities against uncertain group commitments and knowledge
Journal Articles
2021
Hamdi Yahyaoui, Jamal Bentahar, Khalid Sultan, Rabeb Mizouni
Expert Syst. Appl., vol. 177, pp. 114792
Visit
Copy
Independent Spanning Trees in Eisenstein-Jacobi Networks
Journal Articles
2021
Bader Albdaiwi, Hosam AboElfotoh, Zaid Hussain
CoRR, vol. abs/2101.09797
Visit
Copy
Real-Time Fault-Tolerance Node-to-Node Disjoint Paths Algorithm for Symmetric Networks
Journal Articles
2021
Hesham AlMansouri, Zaid Hussain
CoRR, vol. abs/2103.09801
Visit
Copy
Panconnectivity Algorithm for Eisenstein-Jacobi Networks
Journal Articles
2021
Mohammad Awadh, Zaid Hussain
CoRR, vol. abs/2103.10500
Visit
Copy
On Parallel Real-Time Security Improvement Using Mixed-Integer Programming
Journal Articles
2021
Homa Alemzadeh, Hussain Almohri, Layne T. Watson, Mohammad Al-Mutawa
IEEE Access, vol. 9, pp. 58824–58837
Visit
Copy
Tap: an app framework for dynamically composable mobile systems
Inproceedings
2021
Jason Nieh, Naser AlDuaij
The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, pp. 336–349
Visit
Copy
Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design
Journal Articles
2021
Ding-Chau Wang, Hamid Al-Hamadi, Ing-Ray Chen
IEEE Trans. Reliab., vol. 70, no. 1, pp. 188–199
Visit
Copy
Unraveling the stability landscape of mutations in the SARS-CoV-2 receptor-binding domain
Journal Articles
2021
Hamdi Yahyaoui, Mohamed Smaoui
Scientific Reports 11, 9166
Visit
Copy
Shadow detection of the satellite images of earth using ratio image pixels
Journal Articles
2021
Hazem Rafaat, Muhammad Sarfraz, Suhaib Musleh
Earth Sci Inform 14, 377–392
Visit
Copy
Measuring semantic similarity between services using hypergraphs
Inproceedings
2021
Eiman Boujarwah, Hamdi Yahyaoui, Mohamad A. Almulla
The 23rd International Conference on Information Integration and Web Intelligence, 205–211
Visit
Copy
Location-based expert system for diabetes diagnosis and medication recommendation
Journal Articles
2021
Mohamad A. Almulla
Kuwait J. Sci. 48 (1) pp. 67-77, 2021
Visit
Copy
A rewriting system for the assessment of XACML policies relationship
Journal Articles
2020
Azzam Mourad, Hamdi Yahyaoui, Mohamad Chehab, Mohamed Mejri
Comput. Secur., vol. 97, pp. 101957
Visit
Copy
A novel scalable representative-based forecasting approach of service quality
Journal Articles
2020
Ahmed Agwa, Hala S. Own, Hamdi Yahyaoui, Zakaria Maamar
Computing, vol. 102, no. 11, pp. 2471–2500
Visit
Copy
Toward cognitive support for automated defect detection
Journal Articles
2020
Ahmed S. Tolba, Ehab Essa, Ghulam Muhammad, Hazem Rafaat, M. Shamim Hossain, Samir Elmougy
Neural Comput. Appl., vol. 32, no. 9, pp. 4325–4333
Visit
Copy
Predictability of IP Address Allocations for Cloud Computing Platforms
Journal Articles
2020
David Evans, Hussain Almohri, Layne T. Watson
IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 500–511
Visit
Copy
An Attack-Resilient Architecture for the Internet of Things
Journal Articles
2020
David Evans, Hussain Almohri, Layne T. Watson
IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 3940–3954
Visit
Copy
An efficient deception architecture for cloud-based virtual networks
Journal Articles
2020
Hussain Almohri, Mohammad Qasem
CoRR, vol. abs/2004.06933
Visit
Copy
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
Journal Articles
2020
Hussain Almohri, Karim O. Elish, Mahmoud Alawadh, Mohammad Al-Mutawa
Secur. Commun. Networks, vol. 2020, pp. 8873258:1–8873258
Visit
Copy
Optimizing the Lifetime of IoT-Based Star and Mesh Networks
Journal Articles
2020
Hamid Al-Hamadi, Ing-Ray Chen, Jin-Hee Cho, Mohammad Saoud
IEEE Access, vol. 8, pp. 63090–63105
Visit
Copy
Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
Journal Articles
2020
Ding-Chau Wang, Hamid Al-Hamadi, Ing-Ray Chen, Meshal Almashan
IEEE Access, vol. 8, pp. 168994–169009
Visit
Copy
Corrections to "Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
Journal Articles
2020
Ding-Chau Wang, Hamid Al-Hamadi, Ing-Ray Chen, Meshal Almashan
IEEE Access, vol. 8, pp. 207181
Visit
Copy
Development platform for artificial pancreas algorithms
Journal Articles
2020
Ahmad Haidar, Mohamed Smaoui, Rémi Rabasa-Lhoret
PLOS ONE 15(12): e0243139.
Visit
Copy
A multilevel adaptive reduction technique for time series
Journal Articles
2020
Hamdi Yahyaoui, Hosam AboElfotoh, Yanjun Shu
eurocomputing 555, 126657
Visit
Copy
An Overview of Feature-Based Shadow Detection Methods
Incollections
2020
Hazem Rafaat, Muhammad Sarfraz, Suhaib Musleh
Advancements in Computer Vision Applications in Intelligent Systems and Multimedia Technologies, 115-145
Visit
Copy
Rule-Based Expert System for Headache Diagnosis and Medication Recommendation
Journal Articles
2020
Mohamad A. Almulla, Noura Al-Ajmi
International Journal of Health and Medical Engineering 14 (12), 388-391
Visit
Copy
Specification and recognition of service trust behaviors
Journal Articles
2020
Hamdi Yahyaoui, Jumana El-Qurna, Mohamad A. Almulla
Kuwait J. Sci. 47 (1) pp. 33-41
Visit
Copy
A novel trend based SAX reduction technique for time series
Journal Articles
2019
Hamdi Yahyaoui, Reem Al-Daihani
Expert Syst. Appl., vol. 130, pp. 113–123
Visit
Copy
Identifying Android Malware Families Using Android-Oriented Metrics
Inproceedings
2019
Hussain Almohri, Karim O. Elish, Lina G. Hashem, William Blanc
2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, pp. 4708–4713
Visit
Copy
Heterogeneous Multi-Mobile Computing
Inproceedings
2019
Alexander Van't Hof, Jason Nieh, Naser AlDuaij
Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, pp. 707
Visit
Copy
Trust Management of Smart Service Communities
Journal Articles
2019
Hamid Al-Hamadi, Ing-Ray Chen, Jin-Hee Cho
IEEE Access, vol. 7, pp. 26362–26378
Visit
Copy
COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks
Journal Articles
2019
Hamid Al-Hamadi, Ing-Ray Chen, Jin-Hee Cho
IEEE Access, vol. 7, pp. 92296–92313
Visit
Copy
Trust-Based Service Management for Mobile Cloud IoT Systems
Journal Articles
2019
Ding-Chao Wang, Hamid Al-Hamadi, Ilsun You, Ing-Ray Chen, Jeffrey J. P. Tsai, Jia Guo
IEEE Trans. Netw. Serv. Manag., vol. 16, no. 1, pp. 246–263
Visit
Copy
Trust-Based IoT Cloud Participatory Sensing of Air Quality
Journal Articles
2019
Ding-Chau Wang, Hamid Al-Hamadi, Ing-Ray Chen, Jeffrey J. P. Tsai, Jia Guo
Wirel. Pers. Commun., vol. 105, no. 4, pp. 1461–1474
Visit
Copy
Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems
Inproceedings
2019
Ding-Chao Wang, Hamid Al-Hamadi, Ing-Ray Chen
14th IEEE International Symposium on Autonomous Decentralized System, ISADS 2019, Utrecht, The Netherlands, pp. 1–6
Visit
Copy
Timing of insulin basal rate reduction to reduce hypoglycemia during late post-prandial exercise in adults with type 1 diabetes using insulin pump therapy: A randomized crossover trial
Journal Articles
2019
Amélie Roy-Fleming, Charlotte Cameli, Corinne Suppère, Laurent Legault, Martin Ladouceur, Mohamed Smaoui, Nadine Taleb, Rémi Rabasa-Lhoret, Saad Elbekri, Virginie Messier
Diabetes & Metabolism, Volume 45, Issue 3, Pages 294-300
Visit
Copy
Unsupervised clustering of service performance behaviors
Journal Articles
2018
Hala S. Own, Hamdi Yahyaoui
Inf. Sci., vol. 422, pp. 558–571
Visit
Copy
Computer Aided Qur'an Pronunciation using DNN
Journal Articles
2018
Hazem Rafaat, Mohsen A. Rashwan, Mubarak Al-Marri, Mustafa Abdallah, Sherif M. Abdou
J. Intell. Fuzzy Syst., vol. 34, no. 5, pp. 3257–3271
Visit
Copy
An Improved One-to-All Broadcasting in Higher Dimensional Eisenstein-Jacobi Networks
Inproceedings
2018
Zaid Hussain
26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2018, Cambridge, United Kingdom, pp. 34–44
Visit
Copy
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds
Journal Articles
2018
David Evans, Hussain Almohri, Layne T. Watson
IEEE Trans. Inf. Forensics Secur., vol. 13, no. 6, pp. 1361–1375
Visit
Copy
Fidelius Charm: Isolating Unsafe Rust Code
Inproceedings
2018
David Evans, Hussain Almohri
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 248–255
Visit
Copy
Trust as a Service for IoT Service Management in Smart Cities
Inproceedings
2018
Ding-Chao Wang, Hamid Al-Hamadi, Ilsun You, Ing-Ray Chen, Jeffrey J. P. Tsai, Jia Guo
20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, Exeter, United Kingdom, pp. 1358–1365
Visit
Copy
Impact of macronutrient content of meals on postprandial glucose control in the context of closed-loop insulin delivery: A randomized cross-over study
Journal Articles
2018
Amélie Roy‐Fleming, Lisa Bonato, Martin Ladouceur, Mohamed Smaoui, Rémi Rabasa‐Lhoret, Virginie Messier, Véronique Gingras
Diabetes, Obesity and Metabolism, Volume 20, Issue 11, Pages 2695-2699
Visit
Copy
Overnight Glucose Control with Dual- and Single-Hormone Artificial Pancreas in Type 1 Diabetes with Hypoglycemia Unawareness: A Randomized Controlled Trial
Journal Articles
2018
Ahmad Haidar, Alexander Abitbol, Laurent Legault, Mohamed Smaoui, Nathan Cohen, Rémi Rabasa-Lhoret, Virginie Messier
Diabetes technology & therapeutics, Volume 20, Issue 3, Pages 189-196
Visit
Copy
Treatment of mild-to-moderate hypoglycemia in patients with type 1 diabetes treated with insulin pump therapy: are current recommendations effective?
Journal Articles
2018
Ahmad Haidar, Katherine Desjardins, Laurent Legault, Mohamed Smaoui, Rémi Rabasa-Lhoret, Valérie Savard, Virginie Messier, Véronique Gingras
Acta Diabetologica\nvolume 55, pages 227–231
Visit
Copy
Impact of erroneous meal insulin bolus with dual-hormone artificial pancreas using a simplified bolus strategy - A randomized controlled trial
Journal Articles
2018
Charlotte Cameli, Laurent Legault, Martin Ladouceur, Mohamed Smaoui, Rémi Rabasa-Lhoret, Virginie Messier, Véronique Gingras
Sci Rep 8, 2621
Visit
Copy
The Artificial Pancreas and Meal Control: An Overview of Postprandial Glucose Regulation in Type 1 Diabetes
Journal Articles
2018
Ahmad Haidar, Anas El Fathi, Benoit Boulet, Mohamed Smaoui, Veronique Gingras
IEEE Control Systems Magazine, vol. 38, no. 1, pp. 67-85
Visit
Copy
Minimal locating-paired-dominating sets in triangular and king grids\n
Journal Articles
2018
Ludovit Niepel, Mariam Kinawi, Zaid Hussain
Kuwait J. Sci. 48 (3) pp. 39-45
Visit
Copy
Formal specification and integration of distributed security policies
Journal Articles
2017
Hamdi Yahyaoui, Mohamed Mejri
Comput. Lang. Syst. Struct., vol. 49, pp
Visit
Copy
A new framework for the verification of service trust behaviors
Journal Articles
2017
Hamdi Yahyaoui, Jumana El-Qurna, Mohamad A. Almulla
Knowl. Based Syst., vol. 121, pp. 7–22
Visit
Copy
A Novel Method to Investigate the Effect of Social Network "Hook" Images on Purchasing Prospects in E-Commerce
Journal Articles
2017
Mohamed Smaoui
Complexity, vol. 2017, pp. 9264920:1–9264920:16
Visit
Copy
Fog Intelligence for Real-Time IoT Sensor Data Analytics
Journal Articles
2017
Ahmed Ghoneim, Ahmed S. Tolba, Ehab Essa, Ghulam Muhammad, Hazem Rafaat, M. Shamim Hossain, Samir Elmougy
IEEE Access, vol. 5, pp. 24062–24069
Visit
Copy
Higher dimensional Eisenstein-Jacobi networks
Journal Articles
2017
Arash Shamaei, Zaid Hussain
J. Parallel Distributed Comput., vol. 102, pp. 91–102
Visit
Copy
Node-independent spanning trees in Gaussian networks
Journal Articles
2017
Anton Cerný, Bader Albdaiwi, Zaid Hussain
J. Parallel Distributed Comput., vol. 109, pp. 324–332
Visit
Copy
Node-Independent Spanning Trees in Gaussian Networks
Journal Articles
2017
Anton Cerný, Bader Albdaiwi, Zaid Hussain
CoRR, vol. abs/1701.02991 &
Visit
Copy
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
Inproceedings
2017
Danfeng (Daphne) Yao, Homa Alemzadeh, Hussain Almohri, Long Cheng
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2017, Philadelphia, PA, USA, pp. 114–119
Visit
Copy
Security Evaluation by Arrogance: Saving Time and Money
Inproceedings
2017
Hussain Almohri, Sayed A. Almohri
1st IEEE/ACM International Workshop on Software Engineeting for Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, pp. 12–16
Visit
Copy
Binary compatible graphics support in Android for running iOS apps
Inproceedings
2017
Jason Nieh, Jeremy Andrus, Naser AlDuaij
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, pp. 55–67
Visit
Copy
A GPU-based genetic algorithm for the p-median problem
Journal Articles
2017
Bader Albdaiwi, Hosam AboElfotoh
J. Supercomput., vol. 73, no. 10, pp. 4221–4244
Visit
Copy
An optimal adaptive stabilizing algorithm for two edge-disjoint paths problem
Journal Articles
2017
Fawaz M. AlAzemi, Mehmet Hakan Karaata
The Journal of Supercomputing, vol. 73, no. 3, pp. 1257–1273
Visit
Copy
Partitioned Similarity Search with Cache-Conscious Data Traversal
Journal Articles
2017
Maha Alabduljalil, Tao Yang, Xin Jin, Xun Tang
ACM Trans. Knowl. Discov. Data, vol. 11, no. 3, pp. 34:1–34:38
Visit
Copy
Trust-Based Decision Making for Health IoT Systems
Journal Articles
2017
Hamid Al-Hamadi, Ing-Ray Chen
IEEE Internet Things J., vol. 4, no. 5, pp. 1408–1419
Visit
Copy
A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces
Inproceedings
2017
Ding-Chao Wang, Hamid Al-Hamadi, Ing-Ray Chen, Jeffrey J. P. Tsa, Jia Guo
Fuzzy Systems and Data Mining III - Proceedings of FSDM 2017 [Hualien, Taiwan, pp. 479–484
Visit
Copy
Data Collection Techniques Using Multi-Channel Network Coding in Low-Power and Lossy Networks
PhD Theses
2017
Mansour Abdulaziz
George Mason University, Fairfax, Virginia, USA
Visit
Copy
MuTrans: A multi-channel network coding approach to mobile data collection
Inproceedings
2017
Mansour Abdulaziz, Robert Simon
13th Annual Conference on Wireless On-demand Network Systems and Services, WONS 2017, Jackson, WY, USA, pp. 120–123
Visit
Copy
Parallel Construction of Edge-Disjoint Node-Independent Spanning Trees in Dense Gaussian Networks
Inproceedings
2017
Bader Albdaiwi, Hosam AboElfotoh, Zaid Hussain
The 23rd Int'l Conf on Parallel and Distributed Processing Techniques and Applications, PDPTA'17, Pages: 117-122
Visit
Copy
Lattice-based ranking for service trust behaviors
Journal Articles
2016
Aisha Al-Mutairi, Hamdi Yahyaoui, Hazem Rafaat
Knowl. Based Syst., vol. 102, pp. 20–38
Visit
Copy
A Rewriting System for the Assessment of XACML Policies Similarity
Journal Articles
2016
Hamdi Yahyaoui, Mohamed Mejri
CoRR, vol. abs/1605.05887
Visit
Copy
From model-driven specification to design-level set-based analysis of XACML policies
Journal Articles
2016
Azzam Mourad, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui, Hanine Tout
Comput. Electr. Eng., vol. 52, pp. 65–79
Visit
Copy
Verifying concurrent probabilistic systems using probabilistic-epistemic logic specifications
Journal Articles
2016
Abdessamad Ben Hamza, Hamdi Yahyaoui, Jamal Bentahar, Wei Wan
Appl. Intell., vol. 45, no. 3, pp. 747–776
Visit
Copy
A feature-based trust sequence classification algorithm
Journal Articles
2016
Aisha Al-Mutairi, Hamdi Yahyaoui
Appl. Intell., vol. 45, no. 3, pp. 747–776
Visit
Copy
Investigating Mutations to Reduce Huntingtin Aggregation by Increasing Htt-N-Terminal Stability and Weakening Interactions with PolyQ Domain
Journal Articles
2016
Cody Mazza, Jérôme Waldisp ü, Mohamed Smaoui
Comp. Math. Methods in Medicine, vol. 2016, pp. 6247867:1–6247867:12
Visit
Copy
Vector Based Techniques for Short Answer Grading
Inproceedings
2016
Ahmed Ezzat Magooda, Hazem Rafaat, Magda B. Fayek, Mohamed A. Zahran, Mohsen A. Rashwan
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2016, Key Largo, Florida, USA. pp. 238–243
Visit
Copy
RDI_Team at SemEval-2016 Task 3: RDI Unsupervised Framework for Text Ranking
Inproceedings
2016
Ahmad A. Al Sallab, Ahmed Magooda, Amr Gomaa, Ashraf Y. Mahgoub, Eslam Kamal, Hany Ahmed, Hazem Rafaat, Mohsen A. Rashwan
Proceedings of the 10th International Workshop on Semantic Evaluation, SemEval@NAACL-HLT 2016, San Diego, CA, USA, pp. 822–827
Visit
Copy
Edge-disjoint node-independent spanning trees in dense Gaussian networks
Journal Articles
2016
Anton Cerný, Bader Albdaiwi, Robert E. L. Aldred, Zaid Hussain
J. Supercomput., vol. 72, no. 12, pp. 4718–4736
Visit
Copy
Edge-Disjoint Node-Independent Spanning Trees in Dense Gaussian Networks
Journal Articles
2016
Anton Cerný, Bader Albdaiwi, Robert E. L. Aldred, Zaid Hussain
CoRR, vol. abs/1601.06915
Visit
Copy
An Improved One-to-All Broadcasting in Higher Dimensional Eisenstein-Jacobi Networks
Journal Articles
2016
Zaid Hussain
CoRR, vol. abs/1612.01842
Visit
Copy
Heuristics for the Variable Sized Bin Packing Problem Using a Hybrid P-System and CUDA Architecture
Journal Articles
2016
Bader Albdaiwi, Hosam AboElfotoh, Mohamad A. Almulla, Qadha'a AlEnezi
CoRR, vol. abs/1602.08735
Visit
Copy
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
Journal Articles
2016
Danfeng (Daphne) Yao, Hussain Almohri, Layne T. Watson, Xinming Ou
IEEE Trans. Dependable Secur. Comput., vol. 13, no. 4, pp. 474–487
Visit
Copy
On the Number of Cycles in a Graph
Journal Articles
2016
Bader Albdaiwi
CoRR, vol. abs/1603.01807
Visit
Copy
A GPU-Based Genetic Algorithm for the P-Median Problem
Journal Articles
2016
Bader Albdaiwi, Hosam AboElfotoh
CoRR, vol. abs/1610.10061
Visit
Copy
Edge Disjoint Hamiltonian Cycles in Gaussian Networks
Journal Articles
2016
Bader Albader, Bella Bose
IEEE Trans. Computers, vol. 65, no. 1, pp. 315–321
Visit
Copy
Trust-Based IoT Participatory Sensing for Hazard Detection and Response
Inproceedings
2016
Hamid Al-Hamadi, Ing-Ray Chen, Jeffrey J. P. Tsa, Jia Guo
Service-Oriented Computing - ICSOC 2016 Workshops - ASOCA, ISyCC, BSCI, and Satellite Events, Banff, AB, Canada, . Revised Selected Papers, pp. 79–84
Visit
Copy
Trust-based decision making for environmental health community of interest IoT systems
Inproceedings
2016
Hamid Al-Hamadi, Ing-Ray Chen
12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016, New York, NY, USA, pp. 1–6
Visit
Copy
A new scheme for maximizing the lifetime of heterogeneous wireless sensor networks
Journal Articles
2016
Hosam AboElfotoh, Reem Aldaihani
arXiv:1602.04440
Visit
Copy
Rough set based classification of real world Web services
Journal Articles
2015
Hala S. Own, Hamdi Yahyaoui
Inf. Syst. Frontiers, vol. 17, no. 6, pp. 1301–1311
Visit
Copy
Analyzing Social Web Services' Capabilities
Inproceedings
2015
Azzam Mourad, Hamdi Yahyaoui, Mohamed Sellami, Zakaria Maamar
24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2015, Larnaca, Cyprus,, pp. 122–127
Visit
Copy
A new fuzzy hybrid technique for ranking real world Web services
Journal Articles
2015
Hamdi Yahyaoui, Kawthar Almatori, Mohamad A. Almulla
Knowl. Based Syst., vol. 77, pp. 1–15
Visit
Copy
Modeling and classification of service behaviors
Journal Articles
2015
Hala S. Own, Hamdi Yahyaoui, Zaki Malik
Expert Syst. Appl., vol. 42, no. 21, pp. 7610–7619
Visit
Copy
Probing the binding affinity of amyloids to reduce toxicity of oligomers in diabetes
Journal Articles
2015
Henri Orland, Jérôme Waldisp ü, Mohamed Smaoui
Bioinform., vol. 31, no. 14, pp. 2294–2302
Visit
Copy
Deep Learning Framework with Confused Sub-Set Resolution Architecture for Automatic Arabic Diacritization
Journal Articles
2015
Ahmad A. Al Sallab, Ahmed Rafea, Hazem Rafaat, Mohsen A. Rashwan
IEEE ACM Trans. Audio Speech Lang. Process., vol. 23, no. 3, pp. 505–516
Visit
Copy
Word Representations in Vector Space and their Applications for Arabic
Inproceedings
2015
Ahmed Magooda, Amir Atyia, Ashraf Y. Mahgoub, Hazem Rafaat, Mohamed A. Zahran, Mohsen A. Rashwan
Computational Linguistics and Intelligent Text Processing - 16th International Conference, CICLing 2015, Cairo, Egypt, Part I, pp. 430–443
Visit
Copy
RDI System for Extrinsic Plagiarism Detection (RDI_RED), Working Notes for PANAraPlagDet at FIRE 2015
Inproceedings
2015
Ahmed Magooda, Ashraf Y. Mahgoub, Hazem Rafaat, Magda B. Fayek, Mohsen A. Rashwan
Post Proceedings of the Workshops at the 7th Forum for Information Retrieval Evaluation, Gandhinagar, India, pp. 126–128
Visit
Copy
RDI System for Intrinsic Plagiarism Detection (RDI_RID), Working Notes for PANAraPlagDet at FIRE 2015
Inproceedings
2015
Ahmed Magooda, Ashraf Y. Mahgoub, Magda B. Fayek, Mohsen A. Rashwan
Post Proceedings of the Workshops at the 7th Forum for Information Retrieval Evaluation, Gandhinagar, India, pp. 129–130
Visit
Copy
Cross Lingual Lexical Substitution Using Word Representation in Vector Space
Inproceedings
2015
Hazem Rafaat, Mohamed A. Zahran, Mohsen A. Rashwan
Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2015, Hollywood, Florida, USA, pp. 211–216
Visit
Copy
Better traffic distribution one-to-all broadcast in higher dimensional Gaussian networks
Journal Articles
2015
Zaid Hussain
J. Supercomput., vol. 71, no. 12, pp. 4381–4399
Visit
Copy
Optimal Elbow Angle for Extracting sEMG Signals During Fatiguing Dynamic Contraction
Journal Articles
2015
Bader Albader, Francisco Sepulveda, Mohammad R. Almulla
Computers, vol. 4, no. 3, pp. 251–264
Visit
Copy
Optimal Elbow Angle for MMG Signal Classification of Biceps Brachii during Dynamic Fatiguing Contraction
Inproceedings
2015
Francisco Sepulveda, Mohammad R. Almulla, Mohammad Suoud
Bioinformatics and Biomedical Engineering - Third International Conference, IWBBIO 2015, Granada, Spain, Part I, pp. 303–314
Visit
Copy
Super Wavelet for sEMG Signal Extraction During Dynamic Fatiguing Contractions
Journal Articles
2015
Francisco Sepulveda, Mohammad R. Almulla
J. Medical Systems, vol. 39, no. 1, pp. 167
Visit
Copy
Revisiting the Definition of the Relational Tuple Calculus
Inproceedings
2015
Bader Albdaiwi, Bernhard Thalheim
New Trends in Databases and Information Systems - ADBIS 2015 Short Papers and Workshops, BigDap, DCSA, GID, MEBIS, OAIS, SW4CH, WISARD, Poitiers, France, pp. 3–11
Visit
Copy
Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks
Journal Articles
2015
Hamid Al-Hamadi, Ing-Ray Chen
IEEE Trans. Netw. Serv. Manag., vol. 12, no. 3, pp. 451–466
Visit
Copy
Integrated Intrusion Detection and Tolerance in Homogeneous Clustered Sensor Networks
Journal Articles
2015
Hamid Al-Hamadi, Ing-Ray Chen
ACM Trans. Sens. Networks, vol. 11, no. 3, pp. 47:1–47:24
Visit
Copy
Multi-channel network coding in tree-based wireless sensor networks
Inproceedings
2015
Mansour Abdulaziz, Robert Simon
International Conference on Computing, Networking and Communications, ICNC 2015, Garden Grove, CA, USA, pp. 924–930
Visit
Copy
Mobile data collection using multi-channel network coding in wireless sensor networks
Inproceedings
2015
Mansour Abdulaziz, Robert Simon
IEEE 40th Conference on Local Computer Networks (LCN), Clearwater Beach, FL, USA, pp. 205-208
Visit
Copy
A novel non-functional matchmaking approach between fuzzy user queries and real world web services based on rough sets
Journal Articles
2014
Hala S. Own, Hamdi Yahyaoui, Mohamad A. Almulla
Future Gener. Comput. Syst., vol. 35, pp. 27–38
Visit
Copy
A Fuzzy Model for Selecting Social Web Services
Inproceedings
2014
Hamdi Yahyaoui, Mohamad A. Almulla, Zakaria Maamar
Web Information Systems Engineering - WISE 2014 - 15th International Conference, Thessaloniki, Greece, Part II, pp. 32–46
Visit
Copy
Automatic Arabic diacritics restoration based on deep nets
Inproceedings
2014
Ahmad A. Al Sallab, Ahmed Rafea, Hazem Rafaat, Mohsen A. Rashwan
Proceedings of the EMNLP 2014 Workshop on Arabic Natural Language Processing, ANLP@EMNLP 20104, Doha, Qatar, pp. 65–72
Visit
Copy
Semantic Query Expansion for Arabic Information Retrieval
Inproceedings
2014
Ashraf Y. Mahgoub, Hazem Rafaat, Magda B. Fayek, Mohamed A. Zahran, Mohsen A. Rashwan
Proceedings of the EMNLP 2014 Workshop on Arabic Natural Language Processing, ANLP@EMNLP 20104, Doha, Qatar, pp. 87–92
Visit
Copy
Novel Pseudo-Wavelet Function for MMG Signal Extraction during Dynamic Fatiguing Contractions
Journal Articles
2014
Francisco Sepulveda, Mohammad R. Almulla
Sensors, vol. 14, no. 6, pp. 9489–9504
Visit
Copy
Process Authentication for High System Assurance
Journal Articles
2014
Danfeng (Daphne) Yao, Dennis G. Kafura, Hussain Almohri
IEEE Trans. Dependable Secur. Comput., vol. 11, no. 2, pp. 168–180
Visit
Copy
DroidBarrier: know what is executing on your android
Inproceedings
2014
Danfeng (Daphne) Yao, Dennis G. Kafura, Hussain Almohri
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA, pp. 257–264
Visit
Copy
Cider: native execution of iOS apps on android
Inproceedings
2014
Alexander Van't Hof, Christoffer Dall, Jason Nieh, Jeremy Andrus, Naser AlDuaij, Nicolas Viennot
Architectural Support for Programming Languages and Operating Systems, ASPLOS 2014, Salt Lake City, UT, USA, pp. 367–382
Visit
Copy
Pattern-Based Conceptual Data Modelling
Inproceedings
2014
Bader Albdaiwi, Bernhard Thalheim, René Noack
Information Modelling and Knowledge Bases XXVI, 24th International Conference on Information Modelling and Knowledge Bases (EJC 2014), Kiel, Germany, pp. 1–20
Visit
Copy
Load balancing for partition-based similarity search
Inproceedings
2014
Maha Alabduljalil, Tao Yang, Xin Jin, Xun Tang
The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '14, Gold Coast , QLD, Australia, pp. 193–202
Visit
Copy
Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems
Inproceedings
2014
Mohammad Al-Mutawa, Shivakant Mishra
Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Montreal, QC, Canada, pp. 51–60
Visit
Copy
Towards a community-based, social network-driven framework for Web services management
Journal Articles
2013
Erbin Lim, Hamdi Yahyaoui, Philippe Thiran, Zakaria Maamar
Future Gener. Comput. Syst., vol. 29, no. 6, pp. 1363–1377
Visit
Copy
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models
Journal Articles
2013
Hamdi Yahyaoui, Sami Zhioua
Knowl. Inf. Syst., vol. 37, no. 2, pp. 389–416
Visit
Copy
Symbolic model checking composite Web services using operational and control behaviors
Journal Articles
2013
Hamdi Yahyaoui, Jamal Bentahar, Melissa Kova, Zakaria Maamar
Expert Syst. Appl., vol. 40, no. 2, pp. 508–522
Visit
Copy
Arabase - A Database Combining Different Arabic Resources with Lexical and Semantic Information
Inproceedings
2013
Hazem Rafaat, Mohamed A. Zahran, Mohsen A. Rashwan
KDIR/KMIS 2013 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval and the International Conference on Knowledge Management and Information Sharing, Vilamoura, Algarve, Portugal, pp. 233–240
Visit
Copy
Cache-conscious performance optimization for similarity search
Inproceedings
2013
Maha Alabduljalil, Tao Yang, Xun Tang
The 36th International ACM SIGIR conference on research and development in Information Retrieval, SIGIR '13, Dublin, Ireland, pp. 713–722
Visit
Copy
Optimizing parallel algorithms for all pairs similarity search
Inproceedings
2013
Maha Alabduljalil, Tao Yang, Xun Tang
Sixth ACM International Conference on Web Search and Data Mining, WSDM 2013, Rome, Italy, pp. 203–212
Visit
Copy
Preserving data privacy through data partitioning in mobile application
Journal Articles
2013
Mohammad Al-Mutawa, Shivakant Mishra
ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 17, no. 3, pp. 11–12
Visit
Copy
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
Journal Articles
2013
Hamid Al-Hamadi, Ing-Ray Chen
IEEE Trans. Netw. Serv. Manag., vol. 10, no. 2, pp. 189–203
Visit
Copy
Adaptive network management for countering selective capture in wireless sensor networks
Inproceedings
2013
Hamid Al-Hamadi, Ing-Ray Chen
Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013, Zurich, Switzerland, pp. 203–210
Visit
Copy
Dynamic multisource multipath routing for intrusion tolerance and lifetime maximization of autonomous wireless sensor networks
Inproceedings
2013
Hamid Al-Hamadi, Ing-Ray Chen
11th International Symposium on Autonomous Decentralized Systems, ISADS 2013, Mexico City, Mexico, pp. 1–7
Visit
Copy
On path exposure in probabilistic wireless sensor networks
Inproceedings
2013
Ehab S. Elmallah, Hosam AboElfotoh, Mohammed Elmorsy
38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, pp. 433–440
Visit
Copy
A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security
Journal Articles
2012
Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Sara Ayoubi
Int. J. Web Grid Serv., vol. 8, no. 4, pp. 361–385
Visit
Copy
Towards a BPEL model-driven approach for Web services security
Inproceedings
2012
Azzam Mourad, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui, Hanine Tout
Int. J. Web Grid Serv., vol. 8, no. 4, pp. 361–385
Visit
Copy
A trust-based game theoretical model for Web services collaboration
Journal Articles
2012
Hamdi Yahyaoui
Knowl. Based Syst., vol. 27, pp. 162–169
Visit
Copy
Keyed hash function based on a chaotic map
Journal Articles
2012
Ali Kanso, Hamdi Yahyaoui, Mohamad A. Almulla
Inf. Sci., vol. 186, no. 1, pp. 249–264
Visit
Copy
A synergy between context-aware policies and AOP to achieve highly adaptable Web services
Journal Articles
2012
Azzam Mourad, Hamdi Yahyaoui, Lina Yao, Mohamad A. Almulla, Quan Z. Sheng
Serv. Oriented Comput. Appl., vol. 6, no. 4, pp. 379–392
Visit
Copy
Machine Learning Approach to Enhance the Design of Automated Theorem Provers
Inproceedings
2012
Hazem Rafaat, Mahdi Khalifa, Mohamad A. Almulla
Neural Information Processing - 19th International Conference, ICONIP 2012, Doha, Qatar, Proceedings, Part II, pp. 673–682
Visit
Copy
Introduction to the Proceedings of the 2012 Workshop on Large Scale Intelligent Environments (WOLSIE'12)
Inproceedings
2012
James Dooley, Matthew Ball, Mohammad R. Almulla, Rolando Menchaca-Méndez, Víctor González
Workshop Proceedings of the 8th International Conference on Intelligent Environments, Guanajuato, Mexico, June pp. 157
Visit
Copy
Beyond Four Walls: Towards Large-Scale Intelligent Environments
Inproceedings
2012
James Dooley, Matthew Ball, Mohammad R. Almulla
Workshop Proceedings of the 8th International Conference on Intelligent Environments, Guanajuato, Mexico, pp. 158–168
Visit
Copy
Visualization of Real-World Web Services Based on Fuzzy Logic
Inproceedings
2012
Hamdi Yahyaoui, Kawthar Almatori, Mohamad A. Almulla
Eighth IEEE World Congress on Services, SERVICES 2012, Honolulu, HI, USA, June, pp. 330–335
Visit
Copy
Identifying native applications with high assurance
Inproceedings
2012
Danfeng (Daphne) Yao, Dennis G. Kafura, Hussain Almohri
Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, pp. 275–282
Visit
Copy
An Optimal Inherently Stabilizing 2-Neighborhood Crash Resilient Protocol for Secure and Reliable Routing in Hypercube Networks
Journal Articles
2012
Bader Albdaiwi, Mehmet Hakan Karaata, Ozgur Sinanoglu
Comput. J., vol. 55, no. 5, pp. 578–589
Visit
Copy
Non-periodic Tilings of (mathbbR) n by Crosses
Journal Articles
2012
Bader Albdaiwi, Peter Horák
Discret. Comput. Geom., vol. 47, no. 1, pp. 1–16
Visit
Copy
Diameter Perfect Lee Codes
Journal Articles
2012
Bader Albdaiwi, Peter Horák
IEEE Trans. Inf. Theory, vol. 58, no. 8, pp. 5490–5499
Visit
Copy
Efficient Communication Algorithms in Hexagonal Mesh Interconnection Networks
Journal Articles
2012
Bader Albader, Bella Bose, Mary Flahive
IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 1, pp. 69–77
Visit
Copy
Clustering and load balancing optimization for redundant content removal
Inproceedings
2012
Alexandra Potapova, Maha Alabduljalil, Shanzhong Zhu, Tao Yang, Xin Liu
Proceedings of the 21st World Wide Web Conference, WWW 2012, Lyon, France (Companion Volume), pp. 103–112
Visit
Copy
Personalized Energy Consumption Modeling on Smartphones
Inproceedings
2012
Abhishek Jaiantilal, Larry Shi, Mohammad Al-Mutawa, Shivakant Mishra, Xin Pan, Yifei Jiang
Mobile Computing, Applications, and Services - 4th International Conference, MobiCASE 2012, Seattle, WA, USA, pp. 343–354
Visit
Copy
Energy vs. QoS Tradeoff Analysis of Multipath Routing Protocols for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
Inproceedings
2012
Hamid Al-Hamadi, Ing-Ray Chen
10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012, Leganes, Madrid, Spain, pp. 387–394
Visit
Copy
Bootstrapping Trust of Web Services through Behavior Observation
Inproceedings
2011
Hamdi Yahyaoui, Sami Zhioua
Web Engineering - 11th International Conference, ICWE 2011, Paphos, Cyprus, pp. 319–330
Visit
Copy
Towards context-adaptable Web service policies
Inproceedings
2011
Azzam Mourad, Hamdi Yahyaoui, L. Wang, Mohamad A. Almulla, Quan Z. Sheng
Proceedings of the 2nd International Conference on Ambient Systems, Networks and Technologies (ANT 2011), the 8th International Conference on Mobile Web Information Systems (MobiWIS-2011), Niagara Falls, Ontario, Canada, pp. 610–617
Visit
Copy
Social Engineering of Communities of Web Services In
Inproceedings
2011
Erbin Lim, Hamdi Yahyaoui, Philippe Thiran, Zakaria Maamar
11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, German, pp. 100–109,
Visit
Copy
A QoS-Based Fuzzy Model for Ranking Real World Web Services
Inproceedings
2011
Hamdi Yahyaoui, Kawthar Almatori, Mohamad A. Almulla
IEEE International Conference on Web Services, ICWS 2011, Washington, DC, USA, pp. 203–210
Visit
Copy
Toward an abstract language on top of XACML for web services security
Inproceedings
2011
Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour
6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, pp. 254–259
Visit
Copy
Towards a Method for Engineering Social Web Services
Inproceedings
2011
Hakim Hacid, Hamdi Yahyaoui, Leandro Krug Wives, Noura Faci, Zakaria Maamar
Engineering Methods in the Service-Oriented Context - 4th IFIP WG 8.1 Working Conference on Method Engineering, ME 2011, Paris, France, pp. 153–167
Visit
Copy
A novel training weighted ensemble (TWE) with application to face recognition
Journal Articles
2011
Ahmad S. Tolba, Alhussain M. Aly, Hazem Rafaat
Appl. Soft Comput., vol. 11, no. 4, pp. 3608–3617
Visit
Copy
A Review of Non-Invasive Techniques to Detect and Predict Localised Muscle Fatigue
Journal Articles
2011
Francisco Sepulveda, Martin Colley, Mohammad R. Almulla
Sensors, vol. 11, no. 4, pp. 3545–3594
Visit
Copy
An Autonomous Wearable System for Predicting and Detecting Localised Muscle Fatigue
Journal Articles
2011
Francisco Sepulveda, Martin Colley, Mohammad R. Almulla
Sensors, vol. 11, no. 2, pp. 1542–1557
Visit
Copy
Data aggregation for emphp-median problems
Journal Articles
2011
Bader Albdaiwi, Boris Goldengorin, Diptesh Ghosh
J. Comb. Optim., vol. 21, no. 3, pp. 348–363
Visit
Copy
Diameter Perfect Lee Codes
Journal Articles
2011
Bader Albdaiwi, Peter Horák
CoRR, vol. abs/1109.3475
Visit
Copy
Brief Announcement: A Stabilizing Algorithm for Finding Two Edge-Disjoint Paths in Arbitrary Graphs
Inproceedings
2011
Fawaz M. AlAzemi, Mehmet Hakan Karaata
Stabilization, Safety, and Security of Distributed Systems - 13th International Symposium, SSS 2011, Grenoble, France, pp. 433–434
Visit
Copy
CID3: System Support for Loosely-Coupled Personal Computing Environments
Inproceedings
2011
Mohammad Al-Mutawa, Shivakant Mishra
Proceedings of 20th International Conference on Computer Communications and Networks, ICCCN 2011, Maui, Hawaii, USA, pp. 1–6
Visit
Copy
On area coverage reliability of wireless sensor networks
Inproceedings
2011
Ehab S. Elmallah, Hosam AboElfotoh, Janelle J. Harms, Mohamed H. Shazly
IEEE 36th Conference on Local Computer Networks, LCN 2011, Bonn, Germany, pp. 580–588
Visit
Copy
Separating Operational and Control Behaviors: A New Approach to Web Services Modeling
Journal Articles
2010
Hamdi Yahyaoui, Jamal Bentahar, Khouloud Boukadi, Quan Z. Sheng, Zakaria Maamar
IEEE Internet Comput., vol. 14, no. 3, pp. 68–76
Visit
Copy
New approach for the dynamic enforcement of Web services security
Inproceedings
2010
Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Sara Ayoubi
Eighth Annual Conference on Privacy, Security and Trust, PST 2010, Ottawa, Ontario, Canada, pp. 189–196,
Visit
Copy
Context-based specification of Web service policies using WSPL
Inproceedings
2010
Hamdi Yahyaoui, Mohamad A. Almulla
Fifth IEEE International Conference on Digital Information Management, ICDIM 2010, Lakehead University, Thunder Bay, Canada, pp. 496–501
Visit
Copy
A framework to coordinate web services in composition scenarios
Journal Articles
2010
Hamdi Yahyaoui, Khouloud Boukadi, Zakaria Maamar
Int. J. Web Grid Serv., vol. 6, no. 2, pp. 95–123
Visit
Copy
Trust Assessment for Web Services Collaboration
Inproceedings
2010
Hamdi Yahyaoui
IEEE International Conference on Web Services, ICWS 2010, Miami, Florida, USA, pp. 315–320,
Visit
Copy
Feature Fusion for Automated Visual Inspection of Flat Surface Products
Journal Articles
2010
Ahmad Alsaeed Tolba, Hamayun Ahmed Khan, Hazem Rafaat
Int. J. Comput. Their Appl., vol. 17, no. 3, pp. 133–143
Visit
Copy
Predicting the time to localized muscle fatigue using ANN and evolved sEMG feature
Inproceedings
2010
Francisco Sepulveda, Mohammad R. Almulla
Autonomous and Intelligent Systems - First International Conference, AIS 2010, Povoa de Varzim, Portugal, pp. 1–6
Visit
Copy
Novel Feature Modelling the Prediction and Detection of sEMG Muscle Fatigue towards an Automated Wearable System
Journal Articles
2010
Francisco Sepulveda, Mohammad R. Almulla
Sensors, vol. 10, no. 5, pp. 4838–4854
Visit
Copy
A simulation-based software design framework for network-centric and parallel systems
Inproceedings
2010
Hussain Almohri, Osman Balci
SPLASH Workshop on Programming Support Innovations for Emerging Distributed Applications (PSI EtA - (Psi)textTheta 2010), Reno/Tahoe, Nevada, USA, pp. 5
Visit
Copy
An Inherently Stabilizing Algorithm for Node-To-Node Routing over All Shortest Node-Disjoint Paths in Hypercube Networks
Journal Articles
2010
Bader Albdaiwi, Mehmet Hakan Karaata, Ozgur Sinanoglu
IEEE Trans. Computers, vol. 59, no. 7, pp. 995–999
Visit
Copy
System support for anywhere anytime personal computing environment
Inproceedings
2010
Mohammad Al-Mutawa, Shivakant Mishra
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), Bangalore, India, pp. 7
Visit
Copy
A Three-State Node Reliability Model for Sensor Networks
Inproceedings
2010
Ehab S. Elmallah, Hosam AboElfotoh, Mohamed H. Shazly
Proceedings of the Global Communications Conference, GLOBECOM 2010, Miami, Florida, USA, pp. 1–5
Visit
Copy
A New Approach to Model Web Services' Behaviors Based on Synchronization
Inproceedings
2009
Hamdi Yahyaoui, Jamal Bentahar, Khouloud Boukadi, Quan Z. Sheng, Zakaria Maamar
23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, pp. 43–49,
Visit
Copy
A Formal Verification Approach of Conversations in Composite Web Services Using NuSMV
Inproceedings
2009
Hamdi Yahyaoui, Jamal Bentahar, Melissa Kova, Zakaria Maamar
New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Eighth SoMeT 2009, Prague, Czech Republic, pp. 245–261
Visit
Copy
Web Services Synchronization in Composition Scenarios
Inproceedings
2009
Hamdi Yahyaoui, Jamal Bentahar, Khouloud Boukadi, Zakaria Maamar
Proceedings of the Second Multi-Agent Logics, Languages, and Organisations Federated Workshops, Turin, Italy
Visit
Copy
On the Synchronization of Web Services Interactions
Inproceedings
2009
Hamdi Yahyaoui, Khouloud Boukadi, Quan Z. Sheng, Xitong Li, Zakaria Maamar
The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, pp. 644–651,
Visit
Copy
A Reputation-Based Game for Tasks Allocation
Inproceedings
2009
Hamdi Yahyaoui
Enterprise Information Systems, 11th International Conference, ICEIS 2009, Milan, Italy, pp. 728–736
Visit
Copy
An Intrusion Detection Game Theoretical Model
Journal Articles
2009
Benwen Zhu, Hadi Otrok, Hamdi Yahyaoui, Prabir Bhattacharya
Inf. Secur. J. A Glob. Perspect., vol. 18, no. 5, pp. 199–212
Visit
Copy
Rough Set Based Global Features for Online Signature Identification
Journal Articles
2009
Hala S. Own, Hazem Rafaat, Waheeda Al-Mayyan
Egypt. Comput. Sci. J., vol. 31, no. 1
Visit
Copy
Committee machines for facial-gender recognition
Journal Articles
2009
Ahmad S. Tolba, Ezzat Shaddad, Hazem Rafaat
Int. J. Hybrid Intell. Syst., vol. 6, no. 1, pp. 41–51
Visit
Copy
Detecting Localised Muscle Fatigue during Isometric Contraction using Genetic Programming
Inproceedings
2009
Ahmed Kattan, Francisco Sepulveda, Mohammad R. Almulla, Riccardo Poli
IJCCI 2009 - Proceedings of the International Joint Conference on Computational Intelligence, Funchal, Madeira, Portugal, pp. 292–297
Visit
Copy
Enumerating and decoding perfect linear Lee codes
Journal Articles
2009
Bader Albdaiwi, Lorenzo Milazzo, Peter Horák
Des. Codes Cryptogr., vol. 52, no. 2, pp. 155–162
Visit
Copy
Efficient domination in directed tori and the Vizing's conjecture for directed graphs
Journal Articles
2009
Anton Cerný, Bader Albdaiwi, Ludovít Niepel
Ars Comb., vol. 91
Visit
Copy
Equivalent instances of the simple plant location problem
Journal Articles
2009
Bader Albdaiwi, Boris Goldengorin, Gerard Sierksma
Comput. Math. Appl., vol. 57, no. 5, pp. 812–820
Visit
Copy
Dynamic Election-Based Sensing and Routing in Wireless Sensor Networks
Inproceedings
2009
Hosam AboElfotoh, Hossam S. Hassanein, Sharief M. A. Oteafy
Proceedings of the Global Communications Conference, GLOBECOM 2009, Honolulu, Hawaii, USA, pp. 1–6
Visit
Copy
Reputation of Communities of Web Services - Preliminary Investigation
Inproceedings
2008
Hamdi Yahyaoui, Jamal Bentahar, Philippe Thiran, Said Elnaffar, Zakaria Maamar
22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, pp. 1603–1608,
Visit
Copy
Identifying malicious peers in MANETs
Inproceedings
2008
Hamdi Yahyaoui, Ibrahim Kamel
15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008, St. Julien's, Malta, pp. 898–901
Visit
Copy
Web Services Interactions: Analysis, Modeling, and Management
Journal Articles
2008
Djamal Benslimane, Hamdi Yahyaoui, Quan Z. Sheng, Zakaria Maamar
Int. J. Softw. Eng. Knowl. Eng., vol. 18, no. 2, pp. 179–198
Visit
Copy
On the reputation of communities of web services
Inproceedings
2008
Hamdi Yahyaoui, Jamal Bentahar, Nabil Sahli, Philippe Thiran, Said Elnaffar
Proceedings of the 8th international conference on New technologies in distributed systems, NOTERE '08, Lyon, France, pp. 4:1–4:8
Visit
Copy
Introducing Affect into Competitive Game Play
Inproceedings
2008
Maha Alabduljalil, Songhua Xu, Willard L Miranker
20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), Dayton, Ohio, USA, Volume 2, pp. 246–250
Visit
Copy
Reliability of wireless sensor grids
Inproceedings
2008
Ehab S. Elmallah, Hosam AboElfotoh
The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, pp. 252–257
Visit
Copy
Decentralized Multi-Level Duty Cycling in Sensor Networks
Inproceedings
2008
Hosam AboElfotoh, Hossam S. Hassanein, Sharief M. A. Oteafy
Proceedings of the Global Communications Conference, GLOBECOM 2008, New Orleans, LA, USA, pp. 817–821
Visit
Copy
On Checking the Compatibility of Web Services' Policies
Inproceedings
2007
Djamal Benslimane, Fenglin Liu, Hamdi Yahyaoui, Quan Z. Sheng, Zakaria Maamar
Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), Adelaide, Australia, pp. 125–130
Visit
Copy
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL
Inproceedings
2007
Hamdi Yahyaoui, Mourad Debbabi, Nadia Tawbi
Seventh International Conference on Quality Software (QSIC 2007), Portland, Oregon, USA, pp. 348–355
Visit
Copy
Dynamic management of UDDI registries in a wireless environment of web services: Concepts, architecture, operation, and deployment
Journal Articles
2007
Hamdi Yahyaoui, Qusay H. Mahmoud, Zakaria Maamar
J. Intell. Inf. Syst., vol. 28, no. 2, pp. 105–131
Visit
Copy
Mixed Radix Gray Codes and Edge Disjoint Hamiltonian Cycles in Toroidal Networks
Inproceedings
2007
Bader Albdaiwi, Bella Bose, Madhusudhanan Anantha
IEEE International Symposium on Information Theory, ISIT 2007, Nice, France, pp. 1991–1995
Visit
Copy
Mixed-Radix Gray Codes in Lee Metric
Journal Articles
2007
Bader Albdaiwi, Bella Bose, Madhusudhanan Anantha
IEEE Trans. Computers, vol. 56, no. 10, pp. 1297–1307
Visit
Copy
A flow-based reliability measure for wireless sensor networks
Journal Articles
2007
Ehab S. Elmallah, Hosam AboElfotoh, Hossam S. Hassanein
Int. J. Sens. Networks, vol. 2, no. 5/6, pp. 311–320
Visit
Copy
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors
Journal Articles
2006
Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui, Mourad Debbabi
Sci. Comput. Program., vol. 59, no. 1-2, pp. 38–63
Visit
Copy
Fast decoding of quasi-perfect Lee distance codes
Journal Articles
2006
Bader Albdaiwi, Peter Horák
Des. Codes Cryptogr., vol. 40, no. 3, pp. 357–367
Visit
Copy
Circular Layout Cutsets: An Approach for Improving Consecutive Cutset Bounds for Network Reliability
Journal Articles
2006
Ehab S. Elmallah, Hosam AboElfotoh
IEEE Trans. Reliab., vol. 55, no. 4, pp. 602–612
Visit
Copy
On The Reliability of Wireless Sensor Networks
Inproceedings
2006
Ehab S. Elmallah, Hosam AboElfotoh, Hossam S. Hassanein
Proceedings of IEEE International Conference on Communications, ICC Istanbul, Turkey, pp. 3455–3460
Visit
Copy
Accelerating embedded Java for mobile devices
Journal Articles
2005
Azzam Mourad, Chamseddine Talhi, Hamdi Yahyaoui, Mourad Debbabi
IEEE Commun. Mag., vol. 43, no. 9, pp. 80–85
Visit
Copy
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines
Journal Articles
2005
Abdelouahed Gherbi, Chamseddine Talhi, Hamdi Yahyaoui, Lamia Ketari, Mourad Debbabi, Nadia Tawbi, Sami Zhioua
J. Object Technol., vol. 4, no. 1, pp. 83–108
Visit
Copy
Toward an Agent-Based and Context-Oriented Approach for Web Services Composition
Journal Articles
2005
Hamdi Yahyaoui, Soraya Kouadri Mostéfaoui, Zakaria Maamar
IEEE Trans. Knowl. Data Eng., vol. 17, no. 5, pp. 686–697
Visit
Copy
On Self-Coordinating Web Services Using Similarity and Neural Networks
Inproceedings
2005
Chirine Ghedira, Djamal Benslimane, Hamdi Yahyaoui, Irfan Younas, Zakaria Maamar
2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), Hong Kong, China, pp. 171–176
Visit
Copy
Tuple spaces for self-coordination of web services
Inproceedings
2005
Chirine Ghedira, Djamal Benslimane, Hamdi Yahyaoui, Qusay H. Mahmoud, Zakaria Maamar
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, pp. 1656–1660
Visit
Copy
Quasi-perfect resource placements for two-dimensional toroidal networks
Journal Articles
2005
Bader Albdaiwi, Bella Bose
J. Parallel Distributed Comput., vol. 65, no. 7, pp. 815–831
Visit
Copy
WebGD Framework and WebGD-GEN Application Generator
Inproceedings
2005
Bader Albader, Surya Halim, Toshimi Minoura
17th International Conference on Scientific and Statistical Database Management, SSDBM 2005, University of California, Santa Barbara, CA, USA, Proceedings, pp. 55–58
Visit
Copy
Computing reliability and message delay for Cooperative wireless distributed sensor networks subject to random failures
Journal Articles
2005
Hosam AboElfotoh, Krishnendu Chakrabarty, S. Sitharama Iyengar
IEEE Trans. Reliab., vol. 54, no. 1, pp. 145–155
Visit
Copy
Design and Development of an M-Commerce Environment: The E-CWE Project
Journal Articles
2004
Hamdi Yahyaoui, Wathiq Mansoor, Zakaria Maamar
J. Organ. Comput. Electron. Commer., vol. 14, no. 4, pp. 285–303
Visit
Copy
Towards an Agent-Based and Context-Oriented Approach to Compose Web Services
Inproceedings
2004
Hamdi Yahyaoui, Soraya Kouadri Mostéfaoui, Willem-Jan van den Heuvel, Zakaria Maamar
ICEIS 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, pp. 214–221
Visit
Copy
Messengers for the Dynamic Management of Distributed UDDI Registries
Inproceedings
2004
Hamdi Yahyaoui, Qusay H. Mahmoud, Soraya Kouadri Mostéfaoui, Wathiq Mansoor, Zakaria Maamar
1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), Networking and Services, Cambridge, MA, USA, pp. 346–355
Visit
Copy
A dynamic compiler for embedded Java virtual machines
Inproceedings
2004
Abdelouahed Gherbi, Chamseddine Talhi, Hamdi Yahyaoui, Lamia Ketari, Mourad Debbabi, Nadia Tawbi, Sami Zhioua
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, PPPJ 2004, Las Vegas, Nevada, USA, pp. 100–106
Visit
Copy
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines
Inproceedings
2004
Abdelouahed Gherbi, Chamseddine Talhi, Hamdi Yahyaoui, Lamia Ketari, Mourad Debbabi, Sami Zhioua
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, PPPJ 2004, Las Vegas, Nevada, USA, pp. 107–113
Visit
Copy
A Web services composition approach based on software agents and context
Inproceedings
2004
Hamdi Yahyaoui, Soraya Kouadri Mostéfaoui, Zakaria Maamar
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, pp. 1619–1623
Visit
Copy
Dynamic Management of UDDI Registries in a Wireless Environment of Web Services
Inproceedings
2004
Hamdi Yahyaoui, Soraya Kouadri Mostéfaoui, Zakaria Maamar
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, pp. 1619–1623
Visit
Copy
Perfect Distance-d Placements in 2D Toroidal Networks
Journal Articles
2004
Bader Albdaiwi, Marilynn L. Livingston
The Journal of Supercomputing, vol. 29, no. 1, pp. 45–57
Visit
Copy
Edge-disjoint Hamiltonian cycles in two-dimensional torus
Journal Articles
2004
Bader Albdaiwi, Bella Bose, Myung M. Bae
Int. J. Math. Mathematical Sciences, vol. 2004, no. 25, pp. 1299–1308
Visit
Copy
Method Call Acceleration in Embedded Java Virtual Machines
Inproceedings
2003
Hamdi Yahyaoui, Lamia Ketari, M. M. Erhioui, Mourad Debbabi, Nadia Tawbi, Sami Zhioua
Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, Part III, pp. 750–759,
Visit
Copy
Quasi-perfect Lee distance codes
Journal Articles
2003
Bader Albdaiwi, Bella Bose
IEEE Trans. Inf. Theory, vol. 49, no. 6, pp. 1535–1539
Visit
Copy
On resource placements in 3D tori
Journal Articles
2003
Bader Albdaiwi, Bella Bose
J. Parallel Distributed Comput., vol. 63, no. 9, pp. 838–845
Visit
Copy
Multi-objective optimization based flow control in multipoint-to-point communication
Inproceedings
2003
Hosam AboElfotoh, Hossam S. Hassanein, Xinhua Weng
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, IPCCC 2003, Phoenix, Arizona, USA, pp. 361–368
Visit
Copy
Software agents and wireless E-commerce
Journal Articles
2001
Hamdi Yahyaoui, Wathiq Mansoor, Willem-Jan van den Heuvel, Zakaria Maamar
SIGecom Exch., vol. 2, no. 3, pp. 10–17
Visit
Copy
E-Commerce through Wireless Devices
Inproceedings
2001
Hamdi Yahyaoui, Wathiq Mansoor, Zakaria Maamar
10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), Cambridge, MA, USA, pp. 31–36
Visit
Copy
Improving the time efficiency of proving theorems using a learning mechanism
Journal Articles
2001
Ahmed Almonayyes, Hazem Rafaat, Mohammed Almulla, Rana'a Alharshani
Int. J. Comput. Math., vol. 77, no. 2, pp. 169–180
Visit
Copy
Implementation and Performance Evaluation of a Gesture-to-Arabic-Speech Translation System
Journal Articles
2001
Abdul Nasser S. Abu-Rezq, Ahmad S. Tolba, Hazem Rafaat, Mohammad A. Quminasi
J. Comput. Their Appl., vol. 8, no. 3
Visit
Copy
A learning mechanism to enhance the time efficiency of proving theorems
Inproceedings
2001
Ahmad Almonayyes, Hazem Rafaat, Mohamad A. Almulla
Proceedings of the ISCA 16th International Conference Computers and Their Applications, March 28-30, 2001, Seattle, Washington, USA, pp. 268–271, ISCA
Visit
Copy
Improving the time efficiency of proving theorems using a learning mechanism
Journal Articles
2001
Ahmed Almonayyes, Hazem Rafaat, Mohamad A. Almulla, Rana'a Alharshani
Int. J. Comput. Math., vol. 77, no. 2, pp. 169–180
Visit
Copy
A learning mechanism to enhance the time efficiency of proving theorems
Inproceedings
2001
Ahmad S. Al-monayyes, Hazem Rafaat, Mohamad A. Almulla
Proceedings of the ISCA 16th International Conference Computers and Their Applications, Seattle, Washington, USA, pp. 268–271
Visit
Copy
A neural approach to topological optimization of communication networks, with reliability constraints
Journal Articles
2001
Hosam AboElfotoh, Loulwa S. Al-Sumait
IEEE Trans. Reliab., vol. 50, no. 4, pp. 397–408
Visit
Copy
Estimating Expected Route-Length in Cellular Networks
Inproceedings
2001
Ahmad S. Al-monayyes, Hosam AboElfotoh
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nevada, USA, pp. 236–238
Visit
Copy
Supporting QoS routing in mobile ad hoc networks using probabilistic locality and load balancing
Inproceedings
2001
Ehab S. Elmallah, Hosam AboElfotoh, Hossam S. Hassanein
Proceedings of the Global Telecommunications Conference, GLOBECOM '01, San Antonio, TX, USA, pp. 2901–2906
Visit
Copy
On the Use of a Simple Mobility Model in Ad Hoc Routing
Inproceedings
2001
Ehab S. Elmallah, Hosam AboElfotoh, Hossam S. Hassanein
30th International Workshops on Parallel Processing (ICPP 2001 Workshops), Valencia, Spain, pp. 479–484
Visit
Copy
The design and implementation of RRCGS (Retargetable RISC Code Generator for the SUIF)
PhD Theses
2000
Thalaya Alfawzan
University of Sussex, UK
Visit
Copy
Dynamic resource-allocation for congestion-control in high-speed LAN Interconnection
Journal Articles
1999
Hosam AboElfotoh, Hossam S. Hassanein, Shatha K. Habra
Comput. Commun., vol. 22, no. 15-16, pp. 1423–1439
Visit
Copy
An integrated call admission and buffer management scheme for LAN interconnection over a shared-memory ATM switch
Journal Articles
1998
Hosam AboElfotoh, Hossam S. Hassanein, Shatha K. Habra
Comput. Commun., vol. 21, no. 8, pp. 697–714
Visit
Copy
Adapting Big-Step Semantics to Small-Step Style: Coinductive Interpretations and "Higher-Order" Derivations
Journal Articles
1997
David A Schmidt, Husain Ibraheem
Electron. Notes Theor. Comput. Sci., vol. 10, pp. 121
Visit
Copy
Algorithms for computing message delay for wireless networks
Journal Articles
1997
Hosam AboElfotoh
Networks, vol. 29, no. 2, pp. 117–124
Visit
Copy
Modular neural network architectures for classification
Inproceedings
1996
Gasser Auda, Hazem Rafaat, Mohamed Kamel
Proceedings of International Conference on Neural Networks (ICNN'96), Washington, DC, USA, June 3-6, 1996, pp. 1279–1284, IEE
Visit
Copy
Voting schemes for cooperative neural network classifiers
Inproceedings
1995
Gasser Auda, Hazem Rafaat, Mohamed Kamel
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27 - December 1, 1995, pp. 1240–1243, IEEE
Visit
Copy
An Arabic OCR Using Neural Network Classifiers
Inproceedings
1995
Gasser Auda, Hazem Rafaat
Image Analysis Applications and Computer Graphics, Third International Computer Science Conference, ICSC'95, Hong Kong, December 11-13, 1995, Proceedings, pp. 510–511, Springer
Visit
Copy
Correcting for unreliable regression integration testing
Inproceedings
1995
James E. Kimble Jr, Khalil Abdullah, Lee J. White
Proceedings of the International Conference on Software Maintenance, ICSM 1995, Opio (Nice), France, October, pp. 232–241
Visit
Copy
Relational Spatial Topologies for Historical Geographical Information
Journal Articles
1994
David A. Gauthier, Hazem Rafaat, Zhongsen Yang
Int. J. Geogr. Inf. Sci., vol. 8, no. 2, pp. 163–173
Visit
Copy
Improving Classification Using a Tree Structured Neural Network
Journal Articles
1994
Abdulla Ismail, Hazem Rafaat, Hussein I. Shahein, Mohamed H. El-Shafie, Mohsen A. Rashwan
J. Intell. Fuzzy Syst., vol. 2, no. 2, pp. 101–114
Visit
Copy
A tree structured neural network
Inproceedings
1993
Hazem Rafaat, Mohsen A. Rashwan
2nd International Conference Document Analysis and Recognition, ICDAR '93, October, Tsukuba City, Japan, pp. 939–941
Visit
Copy
Fingerprint image postprocessing: A combined statistical and structural approach
Journal Articles
1991
Hazem Rafaat, Qinghan Xiao
Pattern Recognit., vol. 24, no. 10, pp. 985–992
Visit
Copy
An extended relational database for remotely sensed image data management within GIS
Journal Articles
1991
David A. Gauthier, Hazem Rafaat, Ludovit Niepel, Qinghan Xiao
IEEE Trans. Geosci. Remote. Sens., vol. 29, no. 4, pp. 651–655
Visit
Copy
Combining Statistical and Structural Information for Fingerprint Image Processing, Classification and identification
Incollections
1991
Hazem Rafaat, Qinghan Xiao
Pattern Recognition: Architectures, Algorithms and Applications, vol. 29, pp. 335–354, World Scientific
Visit
Copy
A texture information-directed region growing algorithm for image segmentation and region classification
Journal Articles
1988
Andrew K. C. Wong, Hazem Rafaat
Comput. Vis. Graph. Image Process., vol. 43, no. 1, pp. 1–21
Visit
Copy
On the Problem of Coding with Minimal Costs
Journal Articles
1979
AbuBaker ElSayed
Information and Control, vol. 40, no. 3, pp. 291–300
Visit
Copy
Traffic Flow based Feature Engineering for Urban Management System
inproceedings
2023
Hongfan Mu, Noura Aljeri, Azzedine Boukerche
NOMS 2023: 1-6
Visit
Copy
A novel proactive controller deployment protocol for 5G-enabled software-defined Vehicular Networks
journal article
2022
Noura Aljeri, Azzedine Boukerche
Comput. Commun. 182: 88-97
Visit
Copy
Mobility management in space-ground-integrated networks
journal article
2022
Noura Aljeri, Azzedine Boukerche
Computing 104(7): 1551-1564
Visit
Copy
Smart and Green Mobility Management for 5G-enabled Vehicular Networks
journal article
2022
Noura Aljeri, Azzedine Boukerche
Trans. Emerg. Telecommun. Technol. 33(3)
Visit
Copy
An efficient heuristic switch migration scheme for software-defined vehicular networks
journal article
2022
Noura Aljeri, Azzedine Boukerche
J. Parallel Distributed Comput. 164: 96-105
Visit
Copy
An Energy-Efficient Controller Management Scheme for Software-Defined Vehicular Networks
journal article
2022
Azzedine Boukerche, Noura Aljeri
IEEE Trans. Sustain. Comput. 7(1): 61-74
Visit
Copy
EDiPSo: An Efficient Scalable Topology Discovery Protocol for Software-Defined Vehicular Networks
journal article
2021
Noura Aljeri, Azzedine Boukerche
Comput. Networks 200: 108342
Visit
Copy
Mobility Management in 5G-enabled Vehicular Networks: Models, Protocols, and Classification
journal article
2021
Noura Aljeri, Azzedine Boukerche
ACM Comput. Surv. 53(5): 92:1-92:35
Visit
Copy
Design Guidelines for Topology Management in Software-Defined Vehicular Networks
journal article
2021
Azzedine Boukerche, Noura Aljeri
IEEE Netw. 35(2): 120-126
Visit
Copy
A Mobility-based Switch Migration Scheme for Software-Defined Vehicular Networks
inproceedings
2021
Noura Aljeri, Azzedine Boukerche
ICC 2021: 1-6
Visit
Copy
A Novel Dynamic Split and Merge Clustering Scheme for SDVN
inproceedings
2021
Noura Aljeri, Azzedine Boukerche
DIVANet 2021: 71-76
Visit
Copy
ADVICE-LOC: An adaptive vehicle-centric location management scheme for intelligent connected cars
journal article
2020
Noura Aljeri, Azzedine Boukerche
Ad Hoc Networks 107: 102223
Visit
Copy
Fog-enabled vehicular networks: A new challenge for mobility management
journal article
2020
Noura Aljeri, Azzedine Boukerche
Internet Technol. Lett. 3(6)
Visit
Copy
Machine Learning-Based Models for Real-time Traffic Flow Prediction in Vehicular Networks
journal article
2020
Peng Sun, Noura Aljeri, Azzedine Boukerche
IEEE Netw. 34(3): 178-185
Visit
Copy
An Energy-Efficient Proactive Handover Scheme for Vehicular Networks Based on Passive RSU Detection
journal article
2020
Peng Sun, Noura AlJeri, Azzedine Boukerche
IEEE Trans. Sustain. Comput. 5(1): 37-47
Visit
Copy
DACON: A Novel Traffic Prediction and Data-Highway-Assisted Content Delivery Protocol for Intelligent Vehicular Networks
journal article
2020
Peng Sun, Noura AlJeri, Azzedine Boukerche
IEEE Trans. Sustain. Comput. 5(4): 501-513
Visit
Copy
A Dynamic MAP Discovery and Selection Scheme for Predictive Hierarchical MIPv6 in Vehicular Networks
journal article
2020
Noura Aljeri, Azzedine Boukerche
IEEE Trans. Veh. Technol. 69(1): 793-806
Visit
Copy
Load Balancing and QoS-Aware Network Selection Scheme in Heterogeneous Vehicular Networks
inproceedings
2020
Noura Aljeri, Azzedine Boukerche
ICC 2020: 1-6
Visit
Copy
A Performance Evaluation of Time-Series Mobility Prediction for Connected Vehicular Networks
inproceedings
2020
Noura Aljeri, Azzedine Boukerche
Q2SWinet 2020: 127-131
Visit
Copy
An Adaptive Traffic-Flow based Controller Deployment Scheme for Software-Defined Vehicular Networks
inproceedings
2020
Noura Aljeri, Azzedine Boukerche
MSWiM 2020: 191-198
Visit
Copy
A Distributed Topology Discovery Protocol for Software-Defined Vehicular Networks
inproceedings
2020
Noura Aljeri, Azzedine Boukerche
PE-WASUN 2020: 17-24
Visit
Copy
A two-tier machine learning-based handover management scheme for intelligent vehicular networks
journal article
2019
Noura Aljeri, Azzedine Boukerche
Ad Hoc Networks 94
Visit
Copy
Movement prediction models for vehicular networks: an empirical analysis
journal article
2019
Noura Aljeri, Azzedine Boukerche
Wirel. Networks 25(4): 1505-1518
Visit
Copy
A Novel Online Machine Learning Based RSU Prediction Scheme for Intelligent Vehicular Networks
inproceedings
2019
Noura Aljeri, Azzedine Boukerche
AICCSA 2019: 1-8
Visit
Copy
A Probabilistic Neural Network-Based Road Side Unit Prediction Scheme for Autonomous Driving
inproceedings
2019
Noura Aljeri, Azzedine Boukerche
ICC 2019: 1-6
Visit
Copy
An Efficient Handover Trigger Scheme for Vehicular Networks Using Recurrent Neural Networks
inproceedings
2019
Noura Aljeri, Azzedine Boukerche
Q2SWinet 2019: 85-91
Visit
Copy
An Optimized Link Duration-Based Mobility Management Scheme for Connected Vehicular Networks
inproceedings
2019
Noura Aljeri, Azzedine Boukerche
PE-WASUN 2019: 7-14
Visit
Copy
A Queueing Model-Assisted Traffic Conditions Estimation Scheme for Supporting Vehicular Edge Computing
inproceedings
2019
Peng Sun, Noura Aljeri, Azzedine Boukerche
PIMRC 2019: 1-6
Visit
Copy
A Fast Vehicular Traffic Flow Prediction Scheme Based on Fourier and Wavelet Analysis
inproceedings
2018
Peng Sun, Noura AlJeri, Azzedine Boukerche
GLOBECOM 2018: 1-6
Visit
Copy
Mobility and Handoff Management in Connected Vehicular Networks
inproceedings
2018
Noura Aljeri, Azzedine Boukerche
MobiWac 2018: 82-88
Visit
Copy
A Novel Proactive Handover Scheme for Achieving Energy-Efficient Vehicular Networks
inproceedings
2018
Peng Sun, Noura AlJeri, Azzedine Boukerche
Q2SWinet@MSWiM 2018: 23-28
Visit
Copy
An Efficient Movement-Based Handover Prediction Scheme for Hierarchical Mobile IPv6 in VANETs
inproceedings
2018
Noura Aljeri, Azzedine Boukerche
PE-WASUN 2018: 47-54
Visit
Copy
Mobile IP Handover for Vehicular Networks: Methods, Models, and Classifications
journal article
2017
Azzedine Boukerche, Alexander Magnano, Noura Aljeri
ACM Comput. Surv. 49(4): 73:1-73:34
Visit
Copy
A Novel Passive Road Side Unit Detection Scheme in Vehicular Networks
inproceedings
2017
Peng Sun, Noura Aljeri, Azzedine Boukerche
GLOBECOM 2017: 1-5
Visit
Copy
Performance evaluation of movement prediction techniques for vehicular networks
inproceedings
2017
Noura Aljeri, Azzedine Boukerche
ICC 2017: 1-6
Visit
Copy
A predictive collision detection protocol using vehicular networks
inproceedings
2017
Noura Aljeri, Azzedine Boukerche
PIMRC 2017: 1-5
Visit
Copy
A modular distributed simulation-based architecture for intelligent transportation systems
journal article
2016
Robson Eduardo De Grande, Azzedine Boukerche, Shichao Guan, Noura Aljeri
Concurr. Comput. Pract. Exp. 28(12): 3409-3426
Visit
Copy
Towards a secure hybrid adaptive gateway discovery mechanism for intelligent transportation systems
journal article
2016
Azzedine Boukerche, Noura Aljeri, Kaouther Abrougui, Yan Wang
Secur. Commun. Networks 9(17): 4027-4047
Visit
Copy
A reliable quality of service aware fault tolerant gateway discovery protocol for vehicular networks
journal article
2015
Noura Aljeri, Kaouther Abrougui, Mohammed Almulla, Azzedine Boukerche
Wirel. Commun. Mob. Comput. 15(10): 1485-1495
Visit
Copy
A Performance Evaluation of Load Balancing and QoS-aware Gateway Discovery Protocol for VANETs
inproceedings
2013
Noura Aljeri, Kaouther Abrougui, Mohammed Almulla, Azzedine Boukerche
AINA Workshops 2013: 90-94
Visit
Copy
An efficient fault detection and diagnosis protocol for vehicular networks
inproceedings
2013
Noura Aljeri, Mohammed Almulla, Azzedine Boukerche
DIVANet@MSWiM 2013: 23-30
Visit
Copy
A reliable and robust gateway discovery mechanism for vehicular ad hoc networks
inproceedings
2012
Noura Aljeri, Kaouther Abrougui, Mohammed Almulla, Azzedine Boukerche
MOBIWAC 2012: 121-124
Visit
Copy