Emad Abd-Elrahman

Orcid: 0000-0002-8340-9164

According to our database1, Emad Abd-Elrahman authored at least 32 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Smart Cognitive IoT Devices Using Multi-Layer Perception Neural Network on Limited Microcontroller.
Sensors, 2022

Next-Generation Edge Computing Assisted Autonomous Driving Based Artificial Intelligence Algorithms.
IEEE Access, 2022

2021
Automated Security Assessment for IDaaS Framework.
Wirel. Pers. Commun., 2021

2020
A Survey of Using Blockchain Aspects in Information Centric Networks.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2020

2019
Virtual Identity Performance Evaluations of Anonymous Authentication in IDaaS Framework.
IEEE Access, 2019

Two Dimensional Markov Chain Approximation for MPTCP over HetNets: Performance Evaluation.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Multi-tier Blockchain Framework for IoT-EHRs Systems.
Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops, 2018

2017
OPAC: An optimal placement algorithm for virtual CDN.
Comput. Networks, 2017

IoT_ProSe: Exploiting 3GPP services for task allocation in the Internet of Things.
Ad Hoc Networks, 2017

Optimal and Cost Efficient Algorithm for Virtual CDN Orchestration.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

CDNaaS Framework: TOPSIS as Multi-Criteria Decision Making for vCDN Migration.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

Performance Evaluation of Virtual Identity Approaches for Anonymous Communication in Distributed Environments.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Virtualization Techniques: Challenges and Opportunities.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

Scalable and Cost Efficient Algorithms for Virtual CDN Migration.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

OMAC: Optimal migration algorithm for virtual CDN.
Proceedings of the 23rd International Conference on Telecommunications, 2016

IoT-D2D task allocation: An award-driven game theory approach.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2015
Optimization of Quality of Experience through File Duplication in Video Sharing Servers.
CoRR, 2015

Distributed D2D Architecture for ITS Services in Advanced 4G Networks.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

D2D group communications security.
Proceedings of the International Conference on Protocol Engineering, 2015

Context-aware multi-modal traffic management in ITS: A Q-learning based algorithm.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Multi-Path approach for real-time service delivery optimization over HetNets.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Fast group discovery and non-repudiation in D2D communications using IBE.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Network issues in virtual machine migration.
Proceedings of the International Symposium on Networks, Computers and Communications, 2015

A hybrid model to extend vehicular intercommunication V2V through D2D architecture.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

A Novel Virtual Identity Implementation for Anonymous Communication in Cloud Environments.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

2014
Assisting V2V failure recovery using Device-to-Device communications.
Proceedings of the 2014 IFIP Wireless Days, 2014

Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

2011
Hash Chain Links Resynchronization Methods in Video Streaming Security: Performance Comparison.
J. Mobile Multimedia, 2011

2010
Video streaming security: reliable hash chain mechanism using redundancy codes.
Proceedings of the MoMM'2010, 2010

Video Streaming Security: Window-Based Hash Chain Signature Combines with Redundancy Code - YouTube Scenario as an Internet Case Study.
Proceedings of the 12th IEEE International Symposium on Multimedia, 2010

A hybrid mobility mechanism for heterogeneous networks in IMS.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

2009
Optimization of File Allocation for Video Sharing Servers.
Proceedings of the NTMS 2009, 2009


  Loading...