Kia Makki

According to our database1, Kia Makki authored at least 130 papers between 1991 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Delay-aware privacy-preserving location-based services under spatiotemporal constraints.
Int. J. Commun. Syst., 2021

2019
Quantifying location privacy in permissioned blockchain-based internet of things (IoT).
Proceedings of the MobiQuitous 2019, 2019

2018
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

2016
Game theoretic modeling of security and trust relationship in cyberspace.
Int. J. Commun. Syst., 2016

A game-theoretic approach on resource allocation with colluding nodes in MANETs.
Proceedings of the Annual IEEE Systems Conference, 2016

2015
Mobile learning object authoring tool and management system for mobile ad hoc wireless networks.
Int. J. Commun. Syst., 2015

2012
Belief based data cleaning for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2012

Game theoretic analysis of users and providers behavior in network under scarce resources.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Machine Learning on Congestion Analysis Based Real-Time Navigation System.
Int. J. Artif. Intell. Tools, 2011

Fast Normalized Cross-Correlation enhanced floating car data estimation.
Proceedings of the 20th Annual Wireless and Optical Communications Conference, 2011

Cellular network location estimation via RSS-based data clean enhanced scheme.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy.
Proceedings of IEEE International Conference on Communications, 2011

2010
Achieve constant performance guarantees using asynchronous crossbar scheduling without speedup.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

Achieving Flow Level Constant Performance Guarantees for CICQ Switches without Speedup.
Proceedings of the Global Communications Conference, 2010

2009
A future location-aware replacement policy for the cache management at the mobile terminal.
Wirel. Commun. Mob. Comput., 2009

A Message from the Incoming Editor-in-Chief.
J. Commun., 2009

On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks.
Int. J. Interdiscip. Telecommun. Netw., 2009

Sensor network security: a survey.
IEEE Commun. Surv. Tutorials, 2009

A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Ensemble of Machine Learning Algorithms for Intrusion Detection.
Proceedings of the IEEE International Conference on Systems, 2009

Providing Performance Guarantees for Buffered Crossbar Switches without Speedup.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Attack Distribution Modeling and Its Applications in Sensor Network Security.
EURASIP J. Wirel. Commun. Netw., 2008

On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Mobility-Assisted Location Management for Vehicular Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A proactive secure routing algorithm defense against node compromise in sensor networks.
Proceedings of the LCN 2008, 2008

Approximate replication of data using adaptive filters in Wireless Sensor Networks.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Multicast-P2P content distribution in large-scale enterprise networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Thermal aware clock synthesis considering stochastic variation and correlations.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Self-organized forensic support in MANETs.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Inferring Internet Worm Temporal Characteristics.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Estimated replication of data in wireless sensor networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Time and Power Based Positioning Scheme for Indoor Location Aware Services.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Dynamic key management for secure routing in MANET.
Wirel. Commun. Mob. Comput., 2007

A context-aware cache structure for mobile computing environments.
J. Syst. Softw., 2007

Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Fuzzy belief pattern classification of incomplete data.
Proceedings of the IEEE International Conference on Systems, 2007

On Optimal Slot Allocation for Reservation TDMA MAC Protocol in Shadow Fading Environment.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Node Compromise Modeling and its Applications in Sensor Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Enabling Peer Cooperation in Private Local Area Networks using BitTorrent.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Fuzzy Belief Reasoning for Intrusion Detection Design.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Revisiting Global Time Synchronization.
Proceedings of the Global Communications Conference, 2007

2006
On Optimizing Compatible Security Policies in Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2006

A future location-prediction replacement strategy for mobile computing environments.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

A context-aware prefetching strategy for mobile computing environments.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2005
Message from the technical program co-chairs.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

2004
Lossy Communicating Finite State Machines.
Telecommun. Syst., 2004

Resource allocation based on pricing for wireless multimedia networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks.
Proceedings of the NETWORKING 2004, 2004

Dynamic Key Management for Secure Routing In LCMRMG.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2003
Mobile users in heterogeneous environments with middleware platform.
Comput. Commun., 2003

On Quality Of Service Routing in Ad-Hoc Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Ad Hoc Wireless Network Fault/Configuration Management.
Proceedings of the International Conference on Wireless Networks, 2003

Predictive Routing Extensions to AODV to Support Quality of Service.
Proceedings of the International Conference on Wireless Networks, 2003

Locality caching multiroot multigeneration routing algorithm in mobile ad hoc networks.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

2002
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems.
SIGMOD Rec., 2002

Efficient implementations of a delay-constrained least-cost multicast algorithm.
J. Commun. Networks, 2002

Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls.
Comput. Commun., 2002

2001
Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems.
IEEE Trans. Knowl. Data Eng., 2001

Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems.
GeoInformatica, 2001

Secure data networking for enterprises.
ACIS Int. J. Comput. Inf. Sci., 2001

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona.
Proceedings of the Developing an Infrastructure for Mobile and Wireless Systems, 2001

An efficient approximate algorithm for delay-cost-constrained QoS routing.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

Strategies for Semantic Caching.
Proceedings of the Database and Expert Systems Applications, 12th International Conference, 2001

2000
Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues.
J. Supercomput., 2000

A new framework for handling mobile clients in a client-server database system.
Comput. Commun., 2000

Analyzing the hidden-terminal effects and multimedia support for wireless LAN.
Comput. Commun., 2000

On optical communications networks and wideband network architecture.
Comput. Commun., 2000

A system model for mobile and wireless networking.
ACIS Int. J. Comput. Inf. Sci., 2000

A hybrid method to cellular traffic using optic beam interconnects.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Waiting time of handoff calls for the wireless mobile networks with dependent calls arrival processes and impatient calls.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Video Content Representation Based on Texture and Lighting.
Proceedings of the Advances in Visual Information Systems, 4th International Conference, 2000

A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments.
Proceedings of the Tenth International Workshop on Research Issues on Data Engineering: Middleware for Mobile Business Applications and E-Commerce, 2000

Mobile Agents to Automate Fault Management in Wireless and Mobile Networks.
Proceedings of the Parallel and Distributed Processing, 2000

The secure model for enterprise connectivity.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
Design and evaluation of an efficient traffic control scheme for integrated voice, video, and data over asynchronous transfer mode networks: Explicit allowed rate algorithm.
Int. J. Commun. Syst., 1999

Performance of an enhanced GSM protocol supporting non-repudiation of service.
Comput. Commun., 1999

On the design of a location and query management strategy for mobile and wireless environments.
Comput. Commun., 1999

Efficient detection and resolution of deadlocks in distributed databases.
Comput. Commun., 1999

A Distributed Multicast Routing Protocol for Real-Time Multicast Applications.
Comput. Networks, 1999

Dynamic Routing System (DRS): Fault Tolerance in Network Routing.
Comput. Networks, 1999

Performance analysis of a PCS network with state-dependent calls arrival processes and impatient calls.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data.
Proceedings of the 1999 ACM CIKM International Conference on Information and Knowledge Management, 1999

1998
Group Channel Routing for Conferencing Systems in Wide Area Networks.
Inf. Sci., 1998

A Topological-Directional Model for the Apatio-Temporal Composition of Video Objects.
Proceedings of the RIDE'98, 1998

Wireless LAN: Study of Hidden-Terminal Effect and Multimedia Support.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Modeling and Simulation of Multicast Routing Algorithms for Advanced Network Applications.
Simul., 1997

Protocols for Mobile Environments - Editorial.
Mob. Networks Appl., 1997

An ECA Object Service to Support Active Distributed Objects.
Inf. Sci., 1997

A modular methodology to verify communication protocols.
Comput. Commun., 1997

A real-time multicast routing algorithm for multimedia applications.
Comput. Commun., 1997

Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

A distributed algorithm of delay bounded multicast routing for multimedia applications.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

An Agent-Based Mobile System.
Proceedings of the Conceptual Modeling, 1997

1996
Efficient Solutions to Multicast Routing in Communication Networks.
Mob. Networks Appl., 1996

Petri Nets and Self-Stabilization of Communication Protocols.
Informatica (Slovenia), 1996

Reachability and reverse reachability analysis of CFSMs.
Comput. Commun., 1996

Efficient multicast tree algorithm in ATM networks.
Comput. Commun., 1996

A framework for modeling applications as distributed active objects.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

A Framework for Building Distributed Dynamic Applications.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

An Efficient Distributed Mutual Exclusion Algorithm.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

1995
On Reachability Analysis of Communicating Finite State Machines.
Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), 1995

Detection and Resolution of Deadlocks in Distributed Database Systems.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

Automatic Detection of Errors in Distributed Systems.
Proceedings of the 1995 ACM 23rd Annual Conference on Computer Science, CSC '95, Nashville, TN, USA, February 28, 1995

1994
A coherent architecture for a temporal object data base management system.
J. Syst. Softw., 1994

A new storage organization for temporal data bases.
J. Syst. Softw., 1994

A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems.
Int. J. Comput. Simul., 1994

On the Representation of Temporal Object Roles in Object Oriented Databases.
Proceedings of the TIME-94 International Workshop on Temporal Reasoning, 1994

An Efficient Solution To The Critical Section Problem In Distributed Systems.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994

1993
On Temporal Modeling in the Context of Object Databases.
SIGMOD Rec., 1993

An O(sqr N) Token Based Distributed Mutual Exclusion Algorithm.
Informatica (Slovenia), 1993

A Unified Model and Methodology for Temporal Object Databases.
Int. J. Cooperative Inf. Syst., 1993

A Parallel Algorithm for the Steiner Tree Problem.
Proceedings of the Computing and Information, 1993

Towards the Design and Development of a New Model for Geographic Information Systems.
Proceedings of the CIKM 93, 1993

Separating Semantics from Representation in a Temporal Object Database Domain.
Proceedings of the CIKM 93, 1993

1992
A Token Based Distributed K Mutual Exclusion Algorithm.
Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing, 1992

On Algorithms for Mutual Exclusion in Distributed Systems.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

The Steiner tree problem with minimum number of vertices in graphs.
Proceedings of the Second Great Lakes Symposium on VLSI, 1992

A Framework for Temporal Object Databases.
Proceedings of the Information and Knowledge Management, 1992

1991
Two Algorithms for Mutual Exclusion in a Distributed System.
Proceedings of the International Conference on Parallel Processing, 1991


  Loading...