Ahmed A. Zewail

According to our database1, Ahmed A. Zewail authored at least 34 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Device-to-Device Coded-Caching With Distinct Cache Sizes.
IEEE Trans. Commun., 2020

2019
Coded Caching for Heterogeneous Systems: An Optimization Perspective.
IEEE Trans. Commun., 2019

Cache-Aided Combination Networks with Asymmetric End Users.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Untrusted Caches in Two-layer Networks.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Coded Placement for Systems with Shared Caches.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

An Optimization Framework for Secure Delivery in Heterogeneous Coded Caching Systems.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2018
Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays.
IEEE J. Sel. Areas Commun., 2018

Device-to-Device Secure Coded Caching.
CoRR, 2018

On Coded Caching with Heterogeneous Distortion Requirements.
Proceedings of the 2018 Information Theory and Applications Workshop, 2018

The Wiretap Channel with a Cache.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Device-to-Device Coded Caching with Heterogeneous Cache Sizes.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cache-aided combination networks with secrecy guarantees.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2017

Centralized Coded Caching with Heterogeneous Cache Sizes.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Coded caching for combination networks with cache-aided relays.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Optimization of heterogeneous caching systems with rate limited links.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Using network coding to achieve the capacity of deterministic relay networks with relay messages.
Wirel. Commun. Mob. Comput., 2016

Green Distributed Storage Using Energy Harvesting Nodes.
IEEE J. Sel. Areas Commun., 2016

Two-Hop Untrusted Relay Channel with an External Eavesdropper under Layered Secrecy Constraints.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Coded caching for resolvable networks with security requirements.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Fundamental limits of secure device-to-device coded caching.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships.
IEEE J. Sel. Top. Signal Process., 2015

The two-hop interference untrusted-relay channel with confidential messages.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Towards green distributed storage systems.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
The multiple access channel with an untrusted relay.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Achievable degrees of freedom region of MIMO relay networks using Detour Schemes.
Proceedings of the IEEE International Conference on Communications, 2014

Communicating in a socially-aware network: Impact of relationship types.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Optimal strategies for targeted influence in signed networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Multi-terminal networks with an untrusted relay.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
The Achievable Degrees of Freedom Region of Relay Networks using Detours.
CoRR, 2013

The deterministic capacity of relay networks with relay private messages.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

The deterministic multicast capacity of 4-node relay networks.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013


  Loading...