Ali Kanso

Orcid: 0000-0002-4366-841X

According to our database1, Ali Kanso authored at least 67 papers between 2003 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On Hosoya's dormants and sprouts.
Appl. Math. Comput., 2022

Multi-perspective human robot interaction through an augmented video interface supported by deep learning.
Proceedings of the 31st IEEE International Conference on Robot and Human Interactive Communication, 2022

A concept to solve Bin Picking problem in the robotics based on CAD Model and Measurement data.
Proceedings of the 10th International Conference on Systems and Control, 2022

Engineering a platform for reinforcement learning workloads.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

2021
Evaluating High Availability-Aware Deployments Using Stochastic Petri Net Model and Cloud Scoring Selection Tool.
IEEE Trans. Serv. Comput., 2021

Designing a Kubernetes Operator for Machine Learning Applications.
Proceedings of the WOC '21: Proceedings of the Seventh International Workshop on Container Technologies and Container Clouds, 2021

Intelligent Robotic System for Solving Dissection Puzzle Combining K-Nearest Neighbors, Decision Tree and Deep Q Network.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

2020
Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps.
Informatica, 2020

A Lossless Linear Algebraic Secret Image Sharing Scheme.
Informatica, 2020

2019
Generic input template for cloud simulators: A case study of CloudSim.
Softw. Pract. Exp., 2019

A novel efficient image encryption scheme based on chained skew tent maps.
Neural Comput. Appl., 2019

Can Container Fusion Be Securely Achieved?
Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 2019

2018
ACE: Availability-Aware CloudSim Extension.
IEEE Trans. Netw. Serv. Manag., 2018

A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation.
Multim. Tools Appl., 2018

A novel secret image sharing scheme using large primes.
Multim. Tools Appl., 2018

An efficient lossless secret sharing scheme for medical images.
J. Vis. Commun. Image Represent., 2018

Middleware-managed high availability for cloud applications.
Int. J. Inf. Commun. Technol., 2018

2017
An efficient (t, n)-threshold secret image sharing scheme.
Multim. Tools Appl., 2017

Serverless: beyond the cloud.
Proceedings of the 2nd International Workshop on Serverless Computing, 2017

Leveraging the Serverless Architecture for Securing Linux Containers.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Comparing Scaling Methods for Linux Containers.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Enhancing OpenStack Fault Tolerance for Provisioning Computing Environments.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2016
Building a cloud on earth: A study of cloud computing data center simulators.
Comput. Networks, 2016

Open quipus with the same Wiener index as their quadratic line graph.
Appl. Math. Comput., 2016

Simple Leaderless Consistency Protocol.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

A Formal Model for the Availability Analysis of Cloud Deployed Multi-tiered Applications.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Availability Analysis of Cloud Deployed Applications.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Mitigating the Risk of Cloud Services Downtime Using Live Migration and High Availability-Aware Placement.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

QoS Assurance through Low Level Analysis of Resource Utilization of the Cloud Applications.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A variant of Baptista's encryption scheme.
Secur. Commun. Networks, 2015

An efficient and robust image encryption scheme for medical applications.
Commun. Nonlinear Sci. Numer. Simul., 2015

Towards an Elasticity Framework for Legacy Highly Available Applications in the Cloud.
Proceedings of the 2015 IEEE World Congress on Services, 2015

High availability-aware optimization digest for applications deployment in cloud.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Leveraging Linux Containers to Achieve High Availability for Cloud Services.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Comparing Containers versus Virtual Machines for Achieving High Availability.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Simulating High Availability Scenarios in Cloud Data Centers: A Closer Look.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Enhanced teleoperation of UAVs with haptic feedback.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

CHASE: Component High Availability-Aware Scheduler in Cloud Computing Environment.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
An image encryption scheme based on irregularly decimated chaotic maps.
Signal Process. Image Commun., 2014

A blind chaos-based watermarking technique.
Secur. Commun. Networks, 2014

Comparing redundancy models for high availability middleware.
Computing, 2014

A robust chaotic algorithm for digital image steganography.
Commun. Nonlinear Sci. Numer. Simul., 2014

Automatic Generation of Description Files for Highly Available Services.
Proceedings of the Software Engineering for Resilient Systems - 6th International Workshop, 2014

A tool chain for generating the description files of highly available software.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Foundations for long-term collaborative research.
Proceedings of the WISE'14, 2014

2013
Automatic configuration generation for service high availability with load balancing.
Concurr. Comput. Pract. Exp., 2013

A concurrent key exchange protocol based on commuting matrices.
Concurr. Comput. Pract. Exp., 2013

A fast and efficient chaos-based keyed hash function.
Commun. Nonlinear Sci. Numer. Simul., 2013

Automating Service Availability Analysis: An Application to a Highly Available Media-Streaming Service.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Achieving High Availability at the Application Level in the Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Keyed hash function based on a chaotic map.
Inf. Sci., 2012

Configuration-Based Service Availability Analysis for Middleware Managed Applications.
Proceedings of the System Analysis and Modeling: Theory and Practice, 2012

2011
Cryptosystems based on continued fractions.
Secur. Commun. Networks, 2011

Integrating Legacy Applications for High Availability: A Case Study.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Automatic Annotation of Software Configuration Models with Service Recovery Information.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Workload Balancing for Highly Available Services: The Case of the N+M Redundancy Model.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Cipher Systems Based on Controlled Exact Chaotic Maps.
Int. J. Bifurc. Chaos, 2010

Controlled Henon System and its Cryptographic Applications.
Int. J. Bifurc. Chaos, 2010

Modified self-shrinking generator.
Comput. Electr. Eng., 2010

Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

2009
Irregularly Decimated Chaotic Map(S) for Binary Digits Generations.
Int. J. Bifurc. Chaos, 2009

Search-Based Chaotic Pseudorandom Bit Generator.
Int. J. Bifurc. Chaos, 2009

A Tool Suite for the Generation and Validation of Configurations for Software Availability.
Proceedings of the ASE 2009, 2009

Generating AMF Configurations from Software Vendor Constraints and User Requirements.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Automatic Generation of AMF Compliant Configurations.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

2004
More Generalized Clock-Controlled Alternating Step Generator.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Clock-Controlled Shrinking Generator of Feedback Shift Registers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...