Mohammad S. Obaidat

According to our database1, Mohammad S. Obaidat authored at least 582 papers between 1988 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2005, "For contributions to adaptive learning, pattern recognition and system simulation.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Fog Computing for Smart Grid Systems in the 5G Environment: Challenges and Solutions.
IEEE Wireless Commun., 2019

Mobi-Flow: Mobility-Aware Adaptive Flow-Rule Placement in Software-Defined Access Network.
IEEE Trans. Mob. Comput., 2019

Quality-Assured Secured Load Sharing in Mobile Cloud Networking Environment.
IEEE Trans. Cloud Computing, 2019

Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem.
Soft Comput., 2019

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Systems Journal, 2019

LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN.
IEEE Systems Journal, 2019

RILoD: Reduction of Information Loss in a WSN System in the Presence of Dumb Nodes.
IEEE Systems Journal, 2019

Service Degradability Supported by Forecasting System in Optical Data Center Networks.
IEEE Systems Journal, 2019

A New Detection and Prevention System for ARP Attacks Using Static Entry.
IEEE Systems Journal, 2019

An Energy Sensitive Computation Offloading Strategy in Cloud Robotic Network Based on GA.
IEEE Systems Journal, 2019

Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN.
IEEE Systems Journal, 2019

M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes.
IEEE Systems Journal, 2019

Edge Computing-Based Security Framework for Big Data Analytics in VANETs.
IEEE Network, 2019

Resource-Optimized Multiarmed Bandit-Based Offload Path Selection in Edge UAV Swarms.
IEEE Internet of Things Journal, 2019

Dynamic switch migration with noncooperative game towards control plane scalability in SDN.
Int. J. Communication Systems, 2019

ADYTIA: Adaptive and Dynamic TCP Interface Architecture for heterogeneous networks.
Int. J. Communication Systems, 2019

Efficient and secure business model for content centric network using elliptic curve cryptography.
Int. J. Communication Systems, 2019

TACRM: trust access control and resource management mechanism in fog computing.
HCIS, 2019

Secure Reactive Fast Proxy MIPv6-Based Network Mobility (SRFP-NEMO) for Vehicular Ad-hoc Networks (VANETs).
Ad Hoc & Sensor Wireless Networks, 2019

Distributed task allocation algorithm based on connected dominating set for WSANs.
Ad Hoc Networks, 2019

Missing Value Imputations by Rule-Based Incomplete Data Fuzzy Modeling.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

WDM-MDM Silicon-Based Optical Switching for Data Center Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

DLRS: Deep Learning-Based Recommender System for Smart Healthcare Ecosystem.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Vehicular Technology, 2018

TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., 2018

An adaptive task allocation technique for green cloud computing.
The Journal of Supercomputing, 2018

Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud.
IEEE Trans. Emerging Topics Comput., 2018

Learning Automata-Based Data Aggregation Tree Construction Framework for Cyber-Physical Systems.
IEEE Systems Journal, 2018

Border Surveillance With WSN Systems in a Distributed Manner.
IEEE Systems Journal, 2018

DEMANDS: Distributed Energy Management Using Noncooperative Scheduling in Smart Grid.
IEEE Systems Journal, 2018

Situation-Aware Protocol Switching in Software-Defined Wireless Sensor Network Systems.
IEEE Systems Journal, 2018

A TAS-Model-Based Algorithm for Rule Redundancy Detection and Scene Scheduling in Smart Home Systems.
IEEE Systems Journal, 2018

On the Effects of Communication Range Shrinkage of Sensor Nodes in Mobile Wireless Sensor Networks Due to Adverse Environmental Conditions.
IEEE Systems Journal, 2018

Novel Framework of Risk-Aware Virtual Network Embedding in Optical Data Center Networks.
IEEE Systems Journal, 2018

Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems.
IEEE Systems Journal, 2018

A Collaborative Filtering Recommendation-Based Scheme for WLANs With Differentiated Access Service.
IEEE Systems Journal, 2018

Soft-WSN: Software-Defined WSN Management System for IoT Applications.
IEEE Systems Journal, 2018

QoS Aware Predictive Radio Resource Management Approach Based on MIH Protocol.
IEEE Systems Journal, 2018

Local Similarity Imputation Based on Fast Clustering for Incomplete Data in Cyber-Physical Systems.
IEEE Systems Journal, 2018

SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems.
IEEE Network, 2018

A 3D neural network for moving microorganism extraction.
Neural Computing and Applications, 2018

On the placement of controllers in software-Defined-WAN using meta-heuristic approach.
Journal of Systems and Software, 2018

Broadcast tree construction framework in tactile internet via dynamic algorithm.
Journal of Systems and Software, 2018

Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
Journal of Systems and Software, 2018

A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles.
IEEE Internet of Things Journal, 2018

FMD: A DoS mitigation scheme based on flow migration in software-defined networking.
Int. J. Communication Systems, 2018

CFR: A cooperative link failure recovery scheme in software-defined networks.
Int. J. Communication Systems, 2018

Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Communication Systems, 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Communication Systems, 2018

Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network.
Int. J. Communication Systems, 2018

MIMO antenna selection using biogeography-based optimization with nonlinear migration models.
Int. J. Communication Systems, 2018

Web service discovery utilizing logical reasoning and semantic similarity.
Int. J. Communication Systems, 2018

Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation.
IET Networks, 2018

Smart mobility management in 5G heterogeneous networks.
IET Networks, 2018

Learning automaton-based self-protection algorithm for wireless sensor networks.
IET Networks, 2018

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs.
IET Networks, 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Generation Comp. Syst., 2018

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing.
IEEE Communications Magazine, 2018

Reversible Image Mosaic Technology Providing Large Protection Size and High Image Quality.
Ad Hoc & Sensor Wireless Networks, 2018

Improved Mutual Authentication in VANETs.
Ad Hoc & Sensor Wireless Networks, 2018

Mitigating the Effect of Blackhole Attack on MANETs Using AODV Protocol Under Transmission Control Protocol.
Ad Hoc & Sensor Wireless Networks, 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

Performance Assessment of Dynamic Analysis Based Energy Estimation Tools.
Proceedings of the 2018 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2018

New Approach for Mobility Management in Openflow/Software-Defined Networks.
Proceedings of 8th International Conference on Simulation and Modeling Methodologies, 2018

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Staged Incentive Mechanism for Mobile Crowd Sensing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Active Updating Strategy for Caching Periodic Data in the Internet of Things.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Internet of Things Service Recommendation Based on Tripartite Graph with Mass Diffusion.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Efficient Multipath Routing Protocol with Quality of Service for Mobile Ad Hoc Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Distributed Efficient Algorithm for Self-Protection of Wireless Sensor Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Proactive Decision Based Handoff Scheme for Cognitive Radio Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Design for Architecture and Router of 3D Free-Space Optical Network-on-Chip.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Deep Learning-Based Content Centric Data Dissemination Scheme for Internet of Vehicles.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Edge-Based Content Delivery for Providing QoE in Wireless Networks Using Quotient Filter.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

HyClass: Hybrid Classification Model for Anomaly Detection in Cloud Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Community Characteristic Based Controller Deployment Strategy for SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

Partial Charging Scheduling in Wireless Rechargeable Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records.
Proceedings of the IEEE Globecom Workshops, 2018

Base Station Oriented Multi Route Diversity Protocol for Wireless Sensor Networks.
Proceedings of the IEEE Globecom Workshops, 2018

iDVSP: Intelligent Dynamic Virtual Sensor Provisioning in Sensor-Cloud Infrastructure.
Proceedings of the IEEE Global Communications Conference, 2018

DLopC: Data Locality Independency-Aware VM Clustering in Cloud Computing.
Proceedings of the IEEE Globecom Workshops, 2018

A Learning Automaton-Based Controller Placement Algorithm for Software-Defined Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2018

QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures.
Proceedings of the IEEE Global Communications Conference, 2018

Data Consumption-Aware Load Forecasting Scheme for Smart Grid Systems.
Proceedings of the IEEE Globecom Workshops, 2018

DRUMS: Demand Response Management in a Smart City Using Deep Learning and SVR.
Proceedings of the IEEE Global Communications Conference, 2018

Appropriate Service Degradability for Virtualized Inter-Data-Center Optical Networks.
Proceedings of the IEEE Global Communications Conference, 2018

AdCaS: Adaptive Caching for Storage Space Analysis Using Content Centric Networking.
Proceedings of the IEEE Globecom Workshops, 2018

Adaptive Skip Graph Framework for Peer-to-Peer Networks: Search Time Complexity Analysis.
Proceedings of the IEEE Global Communications Conference, 2018

Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the IEEE Globecom Workshops, 2018

Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Ensuring Privacy and Security in E- Health Records.
Proceedings of the 2018 International Conference on Computer, 2018

Blind Signatures Based Secured E-Healthcare System.
Proceedings of the 2018 International Conference on Computer, 2018

Context-Aware Middleware Architectural Framework for Intelligent Smart Grid Data Management.
Proceedings of the 2018 International Conference on Computer, 2018

First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud.
Proceedings of the 2018 International Conference on Computer, 2018

Wireless Sensor Enabled Breast Self-Examination Assistance to Detect Abnormality.
Proceedings of the 2018 International Conference on Computer, 2018

A Fingerprinting Technique for Identification of Wireless Devices.
Proceedings of the 2018 International Conference on Computer, 2018

2017
Constructing data supply chain based on layered PROV.
The Journal of Supercomputing, 2017

Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones.
IEEE Trans. Industrial Informatics, 2017

Distributed Home Energy Management System With Storage in Smart Grid Using Game Theory.
IEEE Systems Journal, 2017

Learning Automata-Based Fault-Tolerant System for Dynamic Autonomous Unmanned Vehicular Networks.
IEEE Systems Journal, 2017

On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network.
IEEE Systems Journal, 2017

3GPP LTE-Advanced Congestion Control Based on MIH Protocol.
IEEE Systems Journal, 2017

D3: distributed approach for the detection of dumb nodes in wireless sensor networks.
Int. J. Communication Systems, 2017

Oceanic forces and their impact on the performance of mobile underwater acoustic sensor networks.
Int. J. Communication Systems, 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Communication Systems, 2017

An altruism-based trust-dependent message forwarding protocol for opportunistic networks.
Int. J. Communication Systems, 2017

Authorship verification using deep belief network systems.
Int. J. Communication Systems, 2017

UCGNet: wireless sensor network-based active aquifer contamination monitoring and control system for underground coal gasification.
Int. J. Communication Systems, 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Communication Systems, 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey.
IET Networks, 2017

Secure and Reliable Multi-Path Routing Protocol for Multi-Hop Wireless Networks.
Ad Hoc & Sensor Wireless Networks, 2017

Energy Optimisation using Distance and Hop-based Transmission (DHBT) in Wireless Sensor Networks - Scheme and Simulation Analysis.
Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, 2017

A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Adaptive and safe presentation strategy of image information on social platform.
Proceedings of the IEEE International Conference on Communications, 2017

Learning automata based optimized multipath routingusing leapfrog algorithm for VANETs.
Proceedings of the IEEE International Conference on Communications, 2017

Connectivity and coverage in machine-type communications.
Proceedings of the IEEE International Conference on Communications, 2017

QoS prediction method for data supply chain based on context.
Proceedings of the IEEE International Conference on Communications, 2017

An efficient learning automata based task offloading in mobile cloud computing environments.
Proceedings of the IEEE International Conference on Communications, 2017

Monitoring the status of iBeacons with crowd sensing.
Proceedings of the IEEE International Conference on Communications, 2017

Synchronized power saving mechanism for WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2017

Sensor Cloud Based Measurement to Management System for Precise Irrigation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Hash-Based Distributed Storage Strategy of FlowTables in SDN-IoT Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Greedy Overlap-Based Algorithm for Partial Coverage of Heterogeneous WSNs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Operating Mode Optimization for Nodes of Data Supply Chain.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

CHSEO: An Energy Optimization Approach for Communication in the Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

ProIDS: Probabilistic Data Structures Based Intrusion Detection System for Network Traffic Monitoring.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

EnClass: Ensemble-Based Classification Model for Network Anomaly Detection in Massive Datasets.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An advanced Internet of Thing based Security Alert System for Smart Home.
Proceedings of the International Conference on Computer, 2017

Genetic algorithm and probability based routing protocol for Opportunistic Networks.
Proceedings of the International Conference on Computer, 2017

Deadline-constraint services in cloud with heterogeneous servers.
Proceedings of the International Conference on Computer, 2017

Application of Deep Learning to Sentiment Analysis for recommender system on cloud.
Proceedings of the International Conference on Computer, 2017

CITS 2017 general chairs' message.
Proceedings of the International Conference on Computer, 2017

Time efficient dynamic threshold-based load balancing technique for Cloud Computing.
Proceedings of the International Conference on Computer, 2017

GATA: GPS-Arduino based Tracking and Alarm system for protection of wildlife animals.
Proceedings of the International Conference on Computer, 2017

Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
User Experience and Quality-of-Service in Internet of Things: Practice and Trends.
Wireless Personal Communications, 2016

Temporal-Correlation-Aware Dynamic Self-Management of Wireless Sensor Networks.
IEEE Trans. Industrial Informatics, 2016

Multilayered Impact Evaluation Model for Attacking Missions.
IEEE Systems Journal, 2016

Mils-Cloud: A Sensor-Cloud-Based Architecture for the Integration of Military Tri-Services Operations and Decision Making.
IEEE Systems Journal, 2016

A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
Security and Communication Networks, 2016

Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Security and Communication Networks, 2016

MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
Security and Communication Networks, 2016

A new multi-rat scheduling algorithm for heterogeneous wireless networks.
Journal of Systems and Software, 2016

Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks.
Journal of Systems and Software, 2016

GTCharge: A game theoretical collaborative charging scheme for wireless rechargeable sensor networks.
Journal of Systems and Software, 2016

An anonymous and provably secure authentication scheme for mobile user.
Int. J. Communication Systems, 2016

Enhanced IEEE 802.21 Handover Design for QoS Support in Next Generation Wireless Networks.
Ad Hoc & Sensor Wireless Networks, 2016

Channel Allocation in Cognitive Radio Networks using Evolutionary Technique.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Cooperative Radio Resources Allocation in LTE_A Networks within MIH Framework: A Scheme and Simulation Analysis.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016

Cooperative Radio Resources Allocation and Congestion Prevention Scheme for LTE-A.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016

Graph colouring technique for efficient channel allocation in cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Reservation and contention reduced channel access method with effective quality of service for wireless mesh networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Impact of hardware impairment on spectrum underlay cognitive multiple relays network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Accurate indoor localization with crowd sensing.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Sequential detection and average sample number for cognitive radio with multiple primary transmit power levels.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

User admission maximization based on ressource allocation in wireless networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Flexible call admission control with preemption in LTE networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Resource Allocation for Wireless Body Area Networks in Presence of Selfish Agents.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Learning Automata-Based Channel Reservation Scheme to Enhance QoS in Vehicular Adhoc Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Lightweight Authentication Protocol for RFID-Enabled Systems Based on ECC.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Mobility-Aware Flow-Table Implementation in Software-Defined IoT.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Efficient Bandwidth Call Admission Control in 3GPP LTE Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Min-Actor algorithm for connected dominating set formation in WSAN.
Proceedings of the International Conference on Computer, 2016

A priority based message forwarding scheme for Opportunistic Networks.
Proceedings of the International Conference on Computer, 2016

Learning automata based decision making algorithm for task offloading in mobile cloud.
Proceedings of the International Conference on Computer, 2016

A distributed coverage optimization and connectivity maintenance strategy based on unknown sensors in WSAN.
Proceedings of the International Conference on Computer, 2016

Secure message communication among vehicles using elliptic curve cryptography in smart cities.
Proceedings of the International Conference on Computer, 2016

2015
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wireless Personal Communications, 2015

Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime.
IEEE Trans. Computers, 2015

MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks.
IEEE Systems Journal, 2015

Safety Challenges and Solutions in Mobile Social Networks.
IEEE Systems Journal, 2015

Efficient Medium Access Control for Cyber-Physical Systems With Heterogeneous Networks.
IEEE Systems Journal, 2015

Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks.
IEEE Systems Journal, 2015

A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems.
IEEE Systems Journal, 2015

A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks.
IEEE Systems Journal, 2015

A new secure and efficient scheme for network mobility management.
Security and Communication Networks, 2015

Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing.
Security and Communication Networks, 2015

QualityScan scheme for load balancing efficiency in vehicular ad hoc networks (VANETs).
Journal of Systems and Software, 2015

Guest Editorial.
JNW, 2015

Guest Editorial.
JNW, 2015

Guest Editorial.
JNW, 2015

Capacity Analysis in the Next Generation Wireless Networks Based on SINR Constraints.
JNW, 2015

Network Selection in Heterogeneous Wireless System Environments.
JNW, 2015

Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks.
JNW, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Systems, 2015

Advanced Mathematics and Numerical Modeling of IoT.
J. Applied Mathematics, 2015

Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis.
IEEE Internet of Things Journal, 2015

Improved IPSec tunnel establishment for 3GPP-WLAN interworking.
Int. J. Communication Systems, 2015

Probabilistic response-time analysis for real-time systems in body area sensor networks.
Int. J. Communication Systems, 2015

Extracting mobility pattern from target trajectory in wireless sensor networks.
Int. J. Communication Systems, 2015

Economics of customer's decisions in smart grid.
IET Networks, 2015

A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurrency and Computation: Practice and Experience, 2015

Smart-Evac: Big Data-Based Decision Making for Emergency Evacuation.
IEEE Cloud Computing, 2015

A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs.
IEEE Access, 2015

Probability-based Controlled Flooding in Opportunistic Networks.
Proceedings of the WINSYS 2015, 2015

An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis.
Proceedings of the SIMULTECH 2015 - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Colmar, Alsace, France, 21, 2015

Wormhole prevention using COTA mechanism in position based environment over MANETs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Wireless Body Area Networks with varying traffic in epidemic medical emergency situation.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

AID: A prototype for Agricultural Intrusion Detection using Wireless Sensor Network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Energy-efficient connectivity re-establishment in WSN in the presence of dumb nodes.
Proceedings of the IEEE International Conference on Communication, 2015

A Reinforcement learning-based cognitive MAC protocol.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

All-in-one binary word solution for IP traceback in Wireless Mesh Network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Markov model-based adaptive CAC scheme for 3GPP LTE femtocell networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Secure and Optimal Routing Protocol for Multi-Hop Cellular Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An Adaptive Algorithm for Joint Data Detection and Channel Estimation for Meteor Burst Communications Based on Per-Survivor Processing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Learning Automata-Based Cross Layer Framework with Context Awareness for Wireless Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Context-Aware Estimation Approach Based on Participatory Sensing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Cloud-Based Optimal Energy Forecasting for Enabling Green Smart Grid Communication.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Performance Evaluation of a Decoupled-Level with QoS-Aware Downlink Scheduling Algorithm for LTE Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Markovian Model Based Channel Allocation in Cognitive Radio Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

A MSCTP-Based Authentication Protocol: MSCTPAP.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

New Elastic Node Addressing Schemes for Next-Generation Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Enhanced MIH Architecture-Aware Radio Resource Management Approach in NGWNs.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme.
Proceedings of the International Conference on Computer, 2015

Learning automaton based context oriented middleware architecture for precision agriculture.
Proceedings of the International Conference on Computer, 2015

A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network.
Proceedings of the International Conference on Computer, 2015

2014
Networks of learning automata for the vehicular environment: a performance analysis study.
IEEE Wireless Commun., 2014

Learning Automata-Based QoS Framework for Cloud IaaS.
IEEE Trans. Network and Service Management, 2014

A comparative simulation study on the power-performance of multi-core architecture.
The Journal of Supercomputing, 2014

An analytical study of resource division and its impact on power and performance of multi-core processors.
The Journal of Supercomputing, 2014

Towards a framework for large-scale multimedia data storage and processing on Hadoop platform.
The Journal of Supercomputing, 2014

Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks.
The Journal of Supercomputing, 2014

QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment.
IEEE Trans. Cloud Computing, 2014

Vehicular Security Through Reputation and Plausibility Checks.
IEEE Systems Journal, 2014

A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
Security and Communication Networks, 2014

Security of e-systems.
Security and Communication Networks, 2014

Secure socket layer certificate verification: a learning automata approach.
Security and Communication Networks, 2014

Online risk-based authentication using behavioral biometrics.
Multimedia Tools Appl., 2014

A MIH-based approach for best network selection in heterogeneous wireless networks.
Journal of Systems and Software, 2014

Existence of dumb nodes in stationary wireless sensor networks.
Journal of Systems and Software, 2014

An efficient design and validation technique for secure handover between 3GPP LTE and WLANs systems.
Journal of Systems and Software, 2014

Smart devices and spaces for pervasive computing.
Journal of Systems Architecture - Embedded Systems Design, 2014

Dynamic intelligence towards merging cloud and communication services.
Information Systems Frontiers, 2014

Adaptive call admission control in 3GPP LTE networks.
Int. J. Communication Systems, 2014

A novel media independent handover-based approach for vertical handover over heterogeneous wireless networks.
Int. J. Communication Systems, 2014

Routing bandwidth guaranteed paths for traffic engineering in WiMAX mesh networks.
Int. J. Communication Systems, 2014

Context-aware quality of service in wireless sensor networks.
IEEE Communications Magazine, 2014

Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations.
Proceedings of the WINSYS 2014, 2014

Foreword.
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014

Secure micro mobility protocol for new generation wireless network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Secure macro mobility protocol for new generation access network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A SCTP-based Authentication Protocol: SCTPAP.
Proceedings of the DCNET 2014, 2014

A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

ISEND: An Improved Secure Neighbor Discovery Protocol for Wireless Networks.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Optimized MIH-assisted P-NEMO design for vertical handover over heterogeneous network mobility.
Proceedings of the IEEE International Conference on Communications, 2014

Routing as a Bayesian Coalition Game in Smart Grid Neighborhood Area Networks: Learning Automata-based approach.
Proceedings of the IEEE International Conference on Communications, 2014

Honeypots deployment for the analysis and visualization of malware activity and malicious connections.
Proceedings of the IEEE International Conference on Communications, 2014

Optimizing handover decision and target selection in LTE-A network-based on MIH protocol.
Proceedings of the IEEE International Conference on Communications, 2014

A cluster-based load balancing algorithm in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

Analysis of reliability and throughput under saturation condition of IEEE 802.15.6 CSMA/CA for wireless body area networks.
Proceedings of the IEEE Global Communications Conference, 2014

On forecasting the ONU sleep period in XG-PON systems using exponential smoothing techniques.
Proceedings of the IEEE Global Communications Conference, 2014

Call admission control and adaptive bandwidth management approach for HWNs.
Proceedings of the IEEE Global Communications Conference, 2014

Prioritized payload tuning mechanism for wireless body area network-based healthcare systems.
Proceedings of the IEEE Global Communications Conference, 2014

Energy-efficient smart metering for green smart grid communication.
Proceedings of the IEEE Global Communications Conference, 2014

Power and Delay-aware Multi-Path Routing Protocol for Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2014

A novel vertical handoff decision making algorithm across Heterogeneous Wireless Networks.
Proceedings of the International Conference on Computer, 2014

Power and Delay-Aware Routing Protocol for Ad Hoc Networks.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
A web-based integrated environment for simulation and analysis with NS-2.
IEEE Wireless Commun., 2013

Finding overlapping communities in a complex network of social linkages and Internet of things.
The Journal of Supercomputing, 2013

Biometric Authentication Using Mouse Gesture Dynamics.
IEEE Systems Journal, 2013

Energized geocasting model for underwater wireless sensor networks.
Simulation Modelling Practice and Theory, 2013

Secured and fast handoff in wireless mesh networks.
Security and Communication Networks, 2013

A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set.
Security and Communication Networks, 2013

Guest Editorial.
JNW, 2013

QoS-Aware Multipath Communications over MANETs.
JNW, 2013

Advanced computer mathematics based cryptography and security technologies.
Int. J. Comput. Math., 2013

Learning automata as a utility for power management in smart grids.
IEEE Communications Magazine, 2013

Trust-based Security Protocol against blackhole attacks in opportunistic networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol.
Proceedings of the SIMULTECH 2013, 2013

Capacity Analysis of Heterogeneous Wireless Networks under SINR Interference Constraints.
Proceedings of the SIGMAP and WINSYS 2013, 2013

An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

A fault-tolerant routing protocol for dynamic autonomous unmanned vehicular networks.
Proceedings of IEEE International Conference on Communications, 2013

End-to-end delay distribution in wireless heterogeneous networks.
Proceedings of IEEE International Conference on Communications, 2013

Residential Energy Management in Smart Grid: A Markov Decision Process-Based Approach.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

MOCLO: A Cloud Framework for Mobile Devices.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Re-authentication protocol from WLAN to LTE (ReP WLAN-LTE).
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013

Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks.
Proceedings of the International Conference on Computer, 2013

Learning Automata Based Sentiment Analysis for recommender system on cloud.
Proceedings of the International Conference on Computer, 2013

A joint call admission control-based approach for initial RAT selection in HetNets.
Proceedings of the International Conference on Computer, 2013

Secure and integrated handover authentication scheme with FMIPv6.
Proceedings of the International Conference on Computer, 2013

2012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2012

Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems.
The Journal of Supercomputing, 2012

Feedback Suppression in Multicast Satellite Networks Using Game Theory.
IEEE Systems Journal, 2012

Multimedia P2P networking: Protocols, solutions and future directions.
Peer-to-Peer Networking and Applications, 2012

Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation.
Journal of Systems and Software, 2012

Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines.
Journal of Systems and Software, 2012

Software Performance Modeling using the UML: a Case Study.
JNW, 2012

Guest Editorial.
JNW, 2012

Guest Editorial.
JNW, 2012

Network-coded multiple-source cooperation aided relaying for free-space optical transmission.
Int. J. Communication Systems, 2012

Providing reliable and link stability-based geocasting model in underwater environment.
Int. J. Communication Systems, 2012

Jamming in underwater sensor networks: detection and mitigation.
IET Communications, 2012

An acoustic communication based AQUA-GLOMO simulator for underwater networks.
HCIS, 2012

An adaptive learning approach for fault-tolerant routing in Internet of Things.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Optimizing Energy using Probabilistic Routing in Underwater Sensor Network.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks.
Proceedings of the SIGMAP and WINSYS 2012, 2012

Trust-enhanced message security protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2012

Design of an effective QoS-aware mapping scheme using persistent allocation probing.
Proceedings of IEEE International Conference on Communications, 2012

Traffic optimization through information dissemination.
Proceedings of IEEE International Conference on Communications, 2012

A novel medium access Control Protocol for radio-over-fiber access networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Community detection in an integrated Internet of Things and social network architecture.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

GROOV: A geographic routing over VANETs and its performance evaluation.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Adaptive wireless networks using learning automata.
IEEE Wireless Commun., 2011

Synchronization of multihop wireless sensor networks at the application layer.
IEEE Wireless Commun., 2011

FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems.
IEEE Systems Journal, 2011

An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation.
Simulation Modelling Practice and Theory, 2011

Security enhancements for UDDI.
Security and Communication Networks, 2011

Dynamic adaptation of response-time models for QoS management in autonomic systems.
Journal of Systems and Software, 2011

Guest Editorial.
JNW, 2011

Comparison of the Design Characteristics of MMI Wavelength Demultiplexers Using Different Approaches by Computing the Effective Index.
JNW, 2011

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks.
JIPS, 2011

Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks.
Computer Communications, 2011

Stable Move Algorithm (SMA) for BW allocation in wireless mobile WiMAX networks 802.16e.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

QoS-aware Multipath Routing Protocol for Delay Sensitive Applications in MANETs - A Cross-layer Approach.
Proceedings of the WINSYS 2011, 2011

Application of Ant Colony Optimization to Develop Energy Efficient Protocol in Mobile Ad-Hoc Networks.
Proceedings of the WINSYS 2011, 2011

Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Computational Intelligence Applied to Wildfire Prediction using Wireless Sensor Networks.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher.
Proceedings of the Global Communications Conference, 2011

Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011

Optimizing Energy through Parabola Based Routing in Underwater Sensor Networks.
Proceedings of the Global Communications Conference, 2011

ServiceChord: A Scalable Service Capability Interaction Framework for IMS.
Proceedings of the Global Communications Conference, 2011

2010
Virtual Backoff Algorithm: An Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks.
IEEE Trans. Vehicular Technology, 2010

Adaptive and Learning Systems.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2010

Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2010

IGFS: A New MAC Protocol Exploiting Heterogeneous Propagation Delays in the Dynamic Bandwidth Allocation on WDM-EPON.
IEEE Systems Journal, 2010

A Counter Disassociation Mechanism (CDM) for Wireless LANs and its Performance Simulation Analysis.
IEEE Systems Journal, 2010

Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping.
Simulation, 2010

A low-overhead fault-tolerant routing algorithm for mobile ad hoc networks: A scheme and its simulation analysis.
Simulation Modelling Practice and Theory, 2010

Survivable ATM mesh networks: Techniques and performance evaluation.
Journal of Systems and Software, 2010

An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks.
Journal of Systems and Software, 2010

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments.
JIPS, 2010

Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks.
IET Communications, 2010

Network Layer based Secure Routing Protocol for Wireless Ad Hoc Sensor Networks in Urban Environments.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010

Markov decision process-based analysis of rechargeable nodes in wireless sensor networks.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

A reactive Optimized Link State Routing protocol for Mobile ad hoc networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

A mechanism for reducing congestion while routing bulky data in Mobile Ad Hoc Networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

A cluster-head selection algorithm for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

Efficient Cooperative Caching with Improved Performance in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2010

GreenCom 2010 Keynote Speech: Mohammad S. Obaidat.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Novel Adaptive Mapping Scheme for IEEE 802.16 Mobile Downlink Framing.
Proceedings of the Global Communications Conference, 2010

Predictive multi-hop stable routing in Vehicular Ad Hoc Networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

A novel Geocast technique with hole detection in underwater sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Clustering-driven wireless data broadcasting.
IEEE Wireless Commun., 2009

Efficient data acquisition in underwater wireless sensor Ad Hoc networks.
IEEE Wireless Commun., 2009

Cluster-Based Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc Networks.
IEEE Systems Journal, 2009

Guest Editorial: Performance Evaluation of Computer and Telecommunication Systems.
Simulation, 2009

Security in wireless sensor networks.
Security and Communication Networks, 2009

LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks.
Security and Communication Networks, 2009

An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks.
Security and Communication Networks, 2009

New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation.
Journal of Systems and Software, 2009

An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks.
Journal of Systems and Software, 2009

Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2009

Guest Editorial.
JNW, 2009

Guest Editorial.
JNW, 2009

EEAODR: An energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Int. J. Communication Systems, 2009

Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

An experimental analysis study of bandwidth allocation with QoS in wireless networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

A new scheme for distributed channel allocation in cellular networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

An efficient power-aware broadcast technique for wireless ad hoc networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Attack Graph Generation with Infused Fuzzy Clustering.
Proceedings of the SECRYPT 2009, 2009

Trust management in opportunistic pervasive healthcare systems.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

Fairness and throughput optimization in wireless mesh networks.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

Using Ant-Like Agents for Fault-Tolerant Routing in Mobile Ad-Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks.
Proceedings of IEEE International Conference on Communications, 2009

An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms.
Proceedings of IEEE International Conference on Communications, 2009

Optimizing Power Utilization in Vehicular Ad Hoc Networks through Angular Routing: A Protocol and Its Performance Evaluation.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Cross-Layer Based Data Management in Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Efficient Resource Reservation for Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A quality of service scheduling technique for optical LANs.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Adaptive learning solution for congestion avoidance in wireless sensor networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

An adaptive learning-like solution of random early detection for congestion avoidance in computer networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

An efficient 802.11 medium access control method and its simulation analysis.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

A new counter disassociation mechanism (CDM) for 802.11b/g wireless local area networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Simulating Peer-to-Peer networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Medium access control protocols for wireless LANs [Guest Editorial].
IEEE Wireless Commun., 2008

Supporting Quality-of-Service Scheduling in a TT-FR WDM System.
IEEE Systems Journal, 2008

Guest Editorial Recent Advances in Global Navigation and Communication Satellite Systems.
IEEE Systems Journal, 2008

Node Stability-Based Location Updating in Mobile Ad-Hoc Networks.
IEEE Systems Journal, 2008

Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking.
IEEE Systems Journal, 2008

A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis.
Simulation, 2008

A New Security Access Scheme for WLANs and Its Performance Simulation Analysis.
Simulation, 2008

Performance Evaluation of Computer and Telecommunication Systems.
Simulation, 2008

UWSim: A Simulator for Underwater Sensor Networks.
Simulation, 2008

A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks.
Int. J. Communication Systems, 2008

WHOMoVeS: An optimized broadband sensor network for military vehicle tracking.
Int. J. Communication Systems, 2008

FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks.
Computer Communications, 2008

Guest editorial: Performance evaluation of communication networks.
Computer Communications, 2008

Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis.
Computer Communications, 2008

Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

New Techniques to Enhance the Capabilities of the Socks Network Security Protocol.
Proceedings of the SECRYPT 2008, 2008

Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold.
Proceedings of the SECRYPT 2008, 2008

Fundamentals of wireless networks systems.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

AER filtering using GLIDER: VHDL cellular automata description.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

An Energy-Efficient On-Demand Routing algorithm for Mobile Ad-Hoc Networks.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

Multi-Hop Synchronization at the Application Layer of Wireless and Satellite Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

An Efficient Approach for Location Updating in Mobile Ad Hoc Networks.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008

2007
Advances in Performance Evaluation of Computer and Telecommunication Systems.
Simulation, 2007

Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks: A Scheme and Performance Evaluation.
Simulation, 2007

On the problem of capacity allocation and flow assignment in self-healing ATM networks.
Computer Communications, 2007

Guest Editorial: Advances in Communication Networking.
Computer Communications, 2007

Performance analysis of a dynamic QoS scheme in optical label-switched networks.
Computer Communications, 2007

Advances in computer communication networks.
Computer Communications, 2007

A new high rate adaptive wireless data dissemination scheme.
Computer Communications, 2007

A novel node architecture for optical networks: Modeling, analysis and performance evaluation.
Computer Communications, 2007

Future and Challenges of the Security of e-Systems and Computer Networks.
Proceedings of the SECRYPT 2007, 2007

A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Secure Grid-Based Multi-Party Micropayment System in 4G Networks.
Proceedings of the ICE-B 2007, 2007

Robust Watermarking System Using Security Enhancement on Content Based Image Segmentation.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Trends and Challenges in Wireless Systems.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Radio-based Cooperation Scheme for DDoS Detection.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

A Real-Time Admission Control and Planning of OLS Networks.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

A Dynamic QoS-Based Scheme for Admission Control in OBS Networks.
Proceedings of IEEE International Conference on Communications, 2007

A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks.
Proceedings of IEEE International Conference on Communications, 2007

Location Management in Wireless Fourth Generation Networks.
Proceedings of the Global Communications Conference, 2007

Radio-Based Cooperation for Wireless Intrusion Detection.
Proceedings of the Global Communications Conference, 2007

Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach.
Proceedings of the Proceedings 40th Annual Simulation Symposium (ANSS-40 2007), 2007

Security Enhancement for Watermarking Technique Using Content based Image Segmentation.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

A QoS-Oriented Protocol for Burst Admission Control in OBS Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis.
Simulation, 2006

Guest Editorial: Recent Advances in Modeling and Simulation of Network Systems.
Simulation, 2006

Performance evaluation of a novel scheme for QoS provision in UTRA TDD.
Computer Communications, 2006

Performance Evaluation of Wireless Networks and Communications.
Computer Communications, 2006

Performance optimization of an adaptive wireless push system in environments with locality of demand.
Computer Communications, 2006

SQAP: A simple QoS supportive adaptive polling protocol for wireless LANs.
Computer Communications, 2006

Recent advances in wireless networks and systems.
Computers & Electrical Engineering, 2006

Mobility, sensing, and security management in wireless ad hoc sensor systems.
Computers & Electrical Engineering, 2006

Security Enhancement of Multimedia Copyright Protection.
Proceedings of the IEEE International Conference on Systems, 2006

Recent trends and challenges in wireless networks.
Proceedings of the International Symposium on Computer Networks, 2006

SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks.
Proceedings of the E-Business and Telecommunication Networks, 2006

SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks.
Proceedings of the ICE-B 2006, 2006

Secured and Seamless Handoff in Wireless Fourth Generation Systems.
Proceedings of the 13th IEEE International Conference on Electronics, 2006

Performance Acceleration of Adaptive Wireless Data Broadcasting System for High Data Rate Environments.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Designing a Wireless Sensor Network for Mobile Target Localization and Tracking.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

2005
Guest Editorial: Performance Evaluation of Wireless Systems.
Simulation, 2005

On the performance of adaptive TDMA protocols in WDM passive star networks with fixed transmitters and tunable receivers.
Perform. Eval., 2005

Performance modeling and evaluation of high-performance parallel and distributed systems.
Perform. Eval., 2005

Carrier-sense-assisted adaptive learning MAC protocols for distributed wireless LANs.
Int. J. Communication Systems, 2005

International Journal of Communication Systems.
Int. J. Communication Systems, 2005

Fault and intrusion tolerance in wireless ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Fundamentals of wireless networks systems.
Proceedings of the ICETE 2005, 2005

Trends and challenges in wireless networks.
Proceedings of the ICETE 2005, 2005

A watermarking technique for geometric manipulation attacks.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

An advance dynamic resource reservation algorithm for OBS networks: Design and performance.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

On regional performance improvement of an adaptive wireless push system in environments with locality of demand.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Mobility and security issues in wireless ad-hoc sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
A Simulation Study of Scalable Broadcast in High-Performance Regular Networks.
Simulation, 2004

An adaptive protocol model for IEEE 802.11 wireless LANs.
Computer Communications, 2004

Advances in computer communications.
Computer Communications, 2004

Relational-based calculus for trust management in networked services.
Computer Communications, 2004

The economics of wireless networks.
Commun. ACM, 2004

On carrier-sense integration in learning automata-based MAC protocols for ad-hoc wireless LANs.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Fundamentals of Wireless Network Systems.
Proceedings of the ICETE 2004, 2004

SNR-WPA: an adaptive protocol for mobile 802.11 wireless LANs.
Proceedings of IEEE International Conference on Communications, 2004

A neural approach to adaptive MAC protocols for wireless LANs.
Proceedings of IEEE International Conference on Communications, 2004

On the Security Enhancement of Multimedia Copyright Protection for E-Business.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

Design Alternatives for Virtual Private Networks.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

2003
Digital watermarking-based DCT and JPEG model.
IEEE Trans. Instrumentation and Measurement, 2003

A comparative study of digital watermarking in JPEG and JPEG 2000 environments.
Inf. Sci., 2003

Efficient fast learning automata.
Inf. Sci., 2003

A framework for the design of bank communications systems.
Computer Communications, 2003

DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle.
Computer Communications, 2003

Recent advances in computer communications networking.
Computer Communications, 2003

Modeling and simulation of IEEE 802.11 WLAN mobile ad hoc networks using topology broadcast reverse-path forwarding (TBRPF).
Computer Communications, 2003

Third generation and beyond wireless systems.
Commun. ACM, 2003

A neural-based MAC protocol for distributed wireless LANs.
Proceedings of the IEEE International Conference on Systems, 2003

Resource Management Schemes in Optical Networks.
Proceedings of the 23rd International Conference of the Chilean Computer Science Society (SCCC 2003), 2003

Adaptive distributed bus arbitration schemes for shared-medium ATM switches.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

On the use of population-based incremental learning in the medium access control of broadcast communication systems.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

Admission control and resource management of uncertain duration traffic in optical networks.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

2002
On the use of learning automata in the control of broadcast networks: a methodology.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2002

Learning automata-based bus arbitration for shared-medium ATM switches.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2002

Guest editorial learning automata: theory, paradigms, and applications.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2002

Modeling and Simulation of Adaptive Available Bit Rate Voice over Asynchronous Transfer Mode Networks.
Simulation, 2002

Introduction to the Special Issue: ATM Systems and Networks: Basics, Issues, and Performance Modeling and Simulation.
Simulation, 2002

Introduction to the Special Issue: ATM Systems and Networks: Basics, Issues, and Performance Modeling and Simulation.
Simulation, 2002

Adaptive protocols for optical LANs with bursty and correlated traffic.
Int. J. Communication Systems, 2002

Advances in optical networking.
Int. J. Communication Systems, 2002

An implementation for ATM Adaptation Layer 5.
Computer Communications, 2002

A new injection limitation mechanism for wormhole networks.
Computer Communications, 2002

Advances in performance evaluation of computer and telecommunications networking.
Computer Communications, 2002

TRAP: a high performance protocol for wireless local area networks.
Computer Communications, 2002

A comparative evaluation study of the performance of DQRAP and DQDB in metropolitan area networks.
Computers & Electrical Engineering, 2002

A new protocol for wireless LANs.
Proceedings of the IEEE International Conference on Communications, 2002

An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices.
Proceedings of the IEEE International Conference on Communications, 2002

Adaptive QoS schemes in DWDM networks.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Performance Modeling and Simulation of ATM Systems and Networks.
Simulation, 2001

Performance Modeling and Simulation of ATM Systems and Networks.
Simulation, 2001

Performance Modeling and Simulation of ATM Systems and Networks.
Simulation, 2001

SCS News: Mohammad S. Obaidat Elected Fellow of SCS.
Simulation, 2001

Performance Evaluation of ZOMA Preemptive Deadlock Recovery Mechanism for Wormhole Networks.
Simulation, 2001

An intelligent simulation methodology to characterize defects in materials.
Inf. Sci., 2001

An efficient adaptive bus arbitration scheme for scalable shared-medium ATM switch.
Computer Communications, 2001

Performance evaluation of telecommunication systems: models, issues and applications (Guest Editorial).
Computer Communications, 2001

On a congestion management scheme for high speed networks using aggregated large deviations principle.
Computer Communications, 2001

Supporting Adaptive QoS for Multiple Classes of Service in DWDM Networks.
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001

Adaptive Protocols for Single-Hop Photonic Networks with Bursty Traffic.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

2000
An adaptive approach to manage traffic in CDMA ATM networks.
Computer Communications, 2000

A methodology to optimize the design of telecommunication systems.
Computer Communications, 2000

QoS management in wireless ATM networks using large deviation principle.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

1999
A Simulation Methodology to Study Input Buffering in ATM Switches.
Simulation, 1999

Performance Evaluation of Computer and Telecommunications Systems.
Simulation, 1999

Application of Neural Networks to Cache Replacement.
Neural Computing and Applications, 1999

Estimation of Pitch Period of Speech Signal Using a New Dyadic Wavelet Algorithm.
Inf. Sci., 1999

Schemes for mobility management of wireless ATM networks.
Int. J. Communication Systems, 1999

Telecommunication systems for the new millennium.
Int. J. Communication Systems, 1999

A performance analysis scheme for intelligent wireless ATM networks.
Int. J. Communication Systems, 1999

A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks.
Computer Communications, 1999

Intelligent Services Integration in Mobile ATM Networks.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Managing mobility in a wireless ATM network.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Performance analysis of intelligent mobile ATM networks.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Managing traffic in CDMA ATM networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

1998
Estimating neural networks-based algorithm for adaptive cache replacement.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 1998

Editorial Artificial Neural Networks To Systems, Man, And Cybernetics: Characteristics, Structures, And Applications.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 1998

Performance Evaluation of Computer and Telecommunication Systems.
Simulation, 1998

Performance Evaluation of Computer and Telecommunication Systems.
Simulation, 1998

Ultrasonic Transducer Characterization by Neural Networks.
Inf. Sci., 1998

A Performance Evaluation Study of four Wavelet Algorithms for the Pitch Period Estimation of Speech Signals.
Inf. Sci., 1998

Guest editorial performance evaluation of ATM systems.
Int. J. Communication Systems, 1998

Bandwidth allocation and call admission control in ATM networks.
Int. J. Communication Systems, 1998

Optimum Design of Telecommunication Systems.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Verification of computer users using keystroke dynamics.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 1997

Modeling and Simulation of Computer Systems and Networks: Part II: Computer Systems.
Simulation, 1997

Guest Editorial: Modeling and Simulation of Computer Systems and Networks: Part I: Networks.
Simulation, 1997

Simulation Study of a Novel Cache Replacement Algorithm.
Simulation, 1997

A Simulation Evaluation Study of Neural Network Techniques to Computer User Identification.
Inf. Sci., 1997

Determination of buffer capacity for payload multiplexing in SDH systems.
Int. J. Communication Systems, 1997

Integrated dynamic distributed routing and admission control in ATM networks.
Int. J. Communication Systems, 1997

Multiple connections in data communication and advanced applications.
Computer Communications, 1997

An evaluation study of protocols used in cable TV networks.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

Performance analysis of parallel frame synchronization scheme in SDH systems.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

1996
A simulation study of the mechanisms to enhance TCP protocol in wide area computer networks.
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

1995
A Performance Simulation Study of the Ethernet and Token Bus Local Computer Networks.
Simulation, 1995

High Speed Networking: Performance Simulation Modeling and Applications.
Simulation, 1995

High-Performance Protocols for Ring LAN and MAN Computer Networks.
Inf. Sci., 1995

A verification methodology for computer systems users.
Proceedings of the 1995 ACM symposium on applied computing, 1995

1994
Book Reviews : Discrete Event Simulation: A Practical Approach by Udo W. Pooch and James A. Wall CRC Press, 1993, 412 pages, Price: $64.95 , ISBN: 0-8493-7174-0.
Simulation, 1994

HSOP: A Neural Network Paradigm and its Applications.
Neural Computing and Applications, 1994

A methodology for evaluating the performance of CISC computer systems under single and two-level cache environments.
Microprocessing and Microprogramming, 1994

Performance Evaluation of CISC Computer Systems Under Single- and Two-Level Cache Environments.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
On the characterization of ultrasonic transducers using pattern recognition.
IEEE Trans. Systems, Man, and Cybernetics, 1993

Computer users verification using the perceptron algorithm.
IEEE Trans. Systems, Man, and Cybernetics, 1993

An online neural network system for computer access security.
IEEE Trans. Industrial Electronics, 1993

Book Reviews: Advanced Computer Architecture: Parallelism, Scalability, and Programmability by Kai Hwang McGraw-Hill, New York, N.Y., 1993. Price: $56.95, ISBN: 0-07-031622-8.
Simulation, 1993

A Simulation Methodology for RISC Computer Systems.
Simulation, 1993

High Performance Computing/Computers: Simulation Modeling and Applications.
Simulation, 1993

Performance simulation analysis of RISC-based multiprocessors under uniform and nonuniform traffic.
Inf. Sci., 1993

A methodology for improving computer access security.
Computers & Security, 1993

An Intelligent Video Pattern Generator for Use in Ophthalmology.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

WBTPE: A Priority Ethernet LAN Protocol.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
Methodologies for characterizing ultrasonic transducers using neural network and pattern recognition techniques.
IEEE Trans. Industrial Electronics, 1992

Performance of the short-time Fourier Transform and Wavelet Transform to phonocardiogram signal analysis.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Performance comparison of neural networks and pattern recognition techniques for classifying ultrasonic transducers.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Performance of the perceptron algorithm for the classification of computer users.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

MTR: A Modified Token Ring Protocol and Its Performance.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

1991
A dynamic and static microcomputer-based stereogram generator.
IEEE Trans. Systems, Man, and Cybernetics, 1991

Dimensionality reduction and feature extraction applications in identifying computer users.
IEEE Trans. Systems, Man, and Cybernetics, 1991

A comparative simulation study of the performance of single-bus and two-bus multiprocessors.
Simulation, 1991

1988
A computerized random element stereogram generator: Design and experiments.
Proceedings of the First Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'88), 1988


  Loading...