Abdelmadjid Bouabdallah

According to our database1, Abdelmadjid Bouabdallah authored at least 183 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vulnerability-oriented risk identification framework for IoT risk assessment.
Internet Things, 2024

Security-Bag: A Specification-based Intrusion Detection System Applied to Star Topology BLE Networks.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024

Green, scalable and efficient IoT architecture.
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024

Optimizing Energy Consumption for IoT Adaptive Security: A Mobility-Based Solution.
Proceedings of the Second International Conference on Advances in Computing Research, 2024

2023
Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey.
Multim. Tools Appl., May, 2023

Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges.
Wirel. Networks, February, 2023

A Threat-Aware and Efficient Wireless Charging Scheme for IoT Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Preventive Time Slot Allocation MAC Protocol for Vehicular Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Vulnerability and Threat Assessment Framework for Internet of Things Systems.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023

2022
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2022

Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey.
J. Netw. Comput. Appl., 2022

A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices.
Comput. Commun., 2022

Analyses of Recent Advances on Machine Learning-based Trust Management for Mobile IoT Applications.
Proceedings of the 30th International Conference on Software, 2022

Energy-Efficient and Context-aware Trajectory Planning for Mobile Data Collection in IoT using Deep Reinforcement Learning.
Proceedings of the 30th International Conference on Software, 2022

A Cooperative Caching Scheme in Fog/Sensor Nodes for CCN.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of Things.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Security Analysis and Evaluation of Optimized Authentication in Named Data Networking.
Proceedings of the Advances in Computing Systems and Applications, 2022

Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
On QoS-aware location privacy in mobile networks.
Int. J. Inf. Comput. Secur., 2021

A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT.
Comput. Networks, 2021

Efficient and lightweight group rekeying protocol for communicating things.
Comput. Electr. Eng., 2021

A Decentralized and Reliable Election-based Key Management Protocol for Communicating Things.
Proceedings of the International Conference on Software, 2021

Towards Energy Efficient Mobile Data Collection In Cluster-based IoT Networks.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

A novel scheme for congestion notification in IoT low power networks.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Towards Reconciling Safety and Security Risk Analysis Processes in Railway Remote Driving.
Proceedings of the 5th International Conference on System Reliability and Safety, 2021

2020
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things.
J. Netw. Comput. Appl., 2020

Interest-based trust management scheme for social internet of things.
J. Ambient Intell. Humaniz. Comput., 2020

Driver Drowsiness Measurement Technologies: Current Research, Market Solutions, and Challenges.
Int. J. Intell. Transp. Syst. Res., 2020

Optimized in-network authentication against pollution attacks in software-defined-named data networking.
J. Inf. Secur. Appl., 2020

Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach.
IEEE Internet Things J., 2020

An accountable privacy-preserving scheme for public information sharing systems.
Comput. Secur., 2020

A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Using Machine Learning to Estimate the Optimal Transmission Range for RPL Networks.
Proceedings of the NOMS 2020, 2020

An Efficient and Adaptive Configuration of IEEE 802.15.4 MAC for Communication Delay Optimisation.
Proceedings of the 11th International Conference on Network of the Future, 2020

A Memory-efficient Group Key Managment for Communicating Things.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

An Energy Efficient Architecture of self-sustainable WSN based on Energy Harvesting and Wireless Charging with Consideration of Deployment Cost.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

Distributed Time Slots Assignment Protocol in Dynamic Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Autonomous Vehicle Security: Literature Review of Real Attack Experiments.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Toward Intelligent Reconfiguration of RPL Networks using Supervised Learning.
Proceedings of the 2019 Wireless Days, 2019

An Efficient Multi-Group Key Management Protocol for Heterogeneous IoT Devices.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Distributed Collision-free Distance-2 Coloring Algorithm for Ring Networks.
Proceedings of the 2019 International Conference on Software, 2019

Cryptanalysis and Improvement of Identity-Based Multisignature Scheme.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Efficient Accountable Privacy-Preserving Scheme for Public Information Sharing in Fog Computing.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Single-Path Network Coding Authentication for Software-Defined Named Data Networking.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Revocable attribute-based access control in mutli-autority systems.
J. Netw. Comput. Appl., 2018

Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments.
J. Ambient Intell. Humaniz. Comput., 2018

QoS-based routing in Wireless Body Area Networks: a survey and taxonomy.
Computing, 2018

Agent-based broadcast protocols for wireless heterogeneous node networks.
Comput. Commun., 2018

Internet of things security: A top-down survey.
Comput. Networks, 2018

VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems.
Comput. Networks, 2018

MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Efficient Architecture for Trust Management in IoE Based Systems of Systems.
Proceedings of the 13th Annual Conference on System of Systems Engineering, 2018

An Efficient Multi-Group Key Management Protocol for Internet of Things.
Proceedings of the 26th International Conference on Software, 2018

Performance Specifications of Market Physiological Sensors for Efficient Driver Drowsiness Detection System.
Proceedings of the 7th International Conference on Sensor Networks, 2018

On Enhancing Location Privacy and QoS for Video Streaming Over Wireless Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Peer-to-Peer Collaborative Video-on-Demand Streaming over Mobile Content Centric Networking.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Authenticated Network Coding for Software-Defined Named Data Networking.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Adaptive and dual data-communication trust scheme for clustered wireless sensor networks.
Telecommun. Syst., 2017

A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications.
Pervasive Mob. Comput., 2017

A trust-based approach for securing data communication in delay tolerant networks.
Int. J. Inf. Comput. Secur., 2017

Energy-efficient mechanisms in security of the internet of things: A survey.
Comput. Networks, 2017

Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Towards authenticated network coding for named data networking.
Proceedings of the 25th International Conference on Software, 2017

ABR: A new efficient attribute based revocation on access control system.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Distributed Fine-Grained Secure Control of Smart Actuators in Internet of Things.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Providing Collision-Free and Conflict-Free Communication in General Synchronous Broadcast/Receive Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Lightweight Sharing Scheme for Data Integrity Protection in WSNs.
Wirel. Pers. Commun., 2016

Game Theory Framework for MAC Parameter Optimization in Energy-Delay Constrained Sensor Networks.
ACM Trans. Sens. Networks, 2016

Lightweight identity-based authentication protocol for wireless sensor networks.
Int. J. Inf. Comput. Secur., 2016

Healing on the cloud: Secure cloud architecture for medical wireless sensor networks.
Future Gener. Comput. Syst., 2016

M2M Security: Challenges and Solutions.
IEEE Commun. Surv. Tutorials, 2016

Reliable and energy aware query-driven routing protocol for wireless sensor networks.
Ann. des Télécommunications, 2016

Efficient QoS-aware heterogeneous architecture for energy-delay constrained connected objects.
Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, 2016

TAS-IoT: Trust-Based Adaptive Security in the IoT.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Key Pre-Distributions From Graph-Based Block Designs.
CoRR, 2015

Trusted Execution Environment: What It is, and What It is Not.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

ETTAF: Efficient Target Tracking and Filming with a Flying Ad Hoc Network.
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015

Temperature MAC plug-in for large scale WSN.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Adaptive Data-Communication Trust Mechanism for Clustered Wireless Sensor Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Scalable Multi-group Key Management for Advanced Metering Infrastructure.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: A review and taxonomy.
J. Netw. Comput. Appl., 2014

Efficient QoS provisioning at the MAC layer in heterogeneous wireless sensor networks.
Comput. Commun., 2014

Energy efficiency in wireless sensor networks: A top-down survey.
Comput. Networks, 2014

Energy-efficient architecture for wearable sensor networks.
Proceedings of the 2014 IFIP Wireless Days, 2014

MSR: Minimum-Stop Recharging Scheme for Wireless Rechargeable Sensor Networks.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Context-aware energy-efficient wireless sensor architecture for body activity recognition.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Wireless sensor networks for rehabilitation applications: Challenges and opportunities.
J. Netw. Comput. Appl., 2013

Temperature-Aware Density Optimization for Low Power Wireless Sensor Networks.
IEEE Commun. Lett., 2013

A new class of Hash-Chain based key pre-distribution schemes for WSN.
Comput. Commun., 2013

Multi-hop wireless charging optimization in low-power networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

WSN lifetime optimization through controlled sink mobility and packet buffering.
Proceedings of the Global Information Infrastructure Symposium, 2013

A Systemic Approach for IoT Security.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Reliability for Emergency Applications in Internet of Things.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Braided Disjoint Branch Routing Protocol for WSNs.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Adaptive Group Key Management Protocol for Wireless Communications.
J. Univers. Comput. Sci., 2012

Certification-based trust models in mobile ad hoc networks: A survey and taxonomy.
J. Netw. Comput. Appl., 2012

An efficient key management scheme for content access control for linear hierarchies.
Comput. Networks, 2012

Fast Restoration of Connectivity for Wireless Sensor Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012

Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

A new adaptive MAC protocol with QoS support for heterogeneous wireless sensor networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

A new weighted shortest path tree for convergecast traffic routing in WSN.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

A New Scalable Key Pre-Distribution Scheme for WSN.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction.
Comput. Networks, 2011

Rehabilitation supervision using wireless sensor networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Toward a high-fidelity wireless sensor network for rehabilitation supervision.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

On QoS Provisioning in Context-Aware Wireless Sensor Networks for Healthcare.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
A new worm propagation threat in BitTorrent: modeling and analysis.
Telecommun. Syst., 2010

Key management with host mobility in dynamic groups.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

An efficient and highly resilient key management scheme for wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

BiTIT: Throttling BitTorrent illegal traffic.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
The Topology Change Attack: Threat and Impact.
J. Univers. Comput. Sci., 2009

TKS: a transition key management scheme for secure application level multicast.
Int. J. Secur. Networks, 2009

Reliable and fully distributed trust model for mobile ad hoc networks.
Comput. Secur., 2009

BitTorrent Worm Sensor Network : P2P Worms Detection and Containment.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

2008
Adaptive clustering for scalable key management in dynamic group communications.
Int. J. Secur. Networks, 2008

Scalable Delay-constrained Multicast Group Key Management.
Int. J. Netw. Secur., 2008

On security issues in embedded systems: challenges and solutions.
Int. J. Inf. Comput. Secur., 2008

HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Key management for content access control in a hierarchy.
Comput. Networks, 2007

NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Adaptive Multicast Membership Management for Mobile Multicast Receivers.
Proceedings of the 2006 IEEE International Conference on Wireless and Mobile Computing, 2006

S-DV: A new approach to Secure Distance Vector routing protocols.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

AAA based security architecture for multicast content distribution.
Proceedings of the International Symposium on Computer Networks, 2006

Hierarchical Home Agent Architecture for Mobile IP Communications.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Transparent Handover for Mobile Multicast Sources.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Mobile Multicast Route Optimisation.
Proceedings of IEEE International Conference on Communications, 2006

2005
Leader election in oriented star graphs.
Networks, 2005

Multicast receiver and sender access control and its applicability to mobile IP environments: A survey.
IEEE Commun. Surv. Tutorials, 2005

H<sub>2</sub>A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming.
Comput. Secur., 2005

RLH: receiver driven layered hash-chaining for multicast data origin authentication.
Comput. Commun., 2005

A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks.
Proceedings of the 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 2005

An Efficient Key Management Algorithm for Hierarchical Group Communication.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview.
ACM SIGOPS Oper. Syst. Rev., 2004

A new approach to scalable and fault-tolerant group key management protocols.
J. High Speed Networks, 2004

IP Mobile multicast: Challenges and solutions.
IEEE Commun. Surv. Tutorials, 2004

A taxonomy of multicast data origin authentication: Issues and solutions.
IEEE Commun. Surv. Tutorials, 2004

SAKM: a scalable and adaptive key management approach for multicast communications.
Comput. Commun. Rev., 2004

Mobility-Aware Rendezvous Point for Mobile Multicast Sources.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

A Scalable and Adaptive Key Management Protocol for Group Communication.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

A<sup>2</sup>cast: an adaptive source authentication protocol for multicast streams.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Performance Analysis of Binding Update in Mobile IP during Handoff.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2003
Gestion de clés et sécurité multipoint: étude et perspectives.
Ann. des Télécommunications, 2003

EBM: A New Approach for Scalable DiffServ Multicasting.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Increasing the robustness of initial key agreement using failure detectors.
Proceedings of the Global Telecommunications Conference, 2003

2002
A new approach for delay-constrained routing.
Comput. Commun., 2002

GMRP: problème généralisé de routage multipoint.
Ann. des Télécommunications, 2002

Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

AKMP: an adaptive key management protocol for secure multicast.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002

2001
A Simple Resource Reservation Protocol for Multicast Communications.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP).
Proceedings of the Networking, 2001

2000
A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem.
ACM SIGOPS Oper. Syst. Rev., 2000

A simple resource reservation protocol for the Internet.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

Self-Stabilizing Protocol for Shortest Path Tree for Multi-cast Routing in Mobile Networks (Research Note).
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000

1999
A Distributed Algorithm for Constructing an Eulerian Cycle in Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

1998
Embedding Complete Binary Trees Into Star and Pancake Graphs.
Theory Comput. Syst., 1998

1997
A Distributed Algorithm for Finding an Eulerian Cycle in Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Systems, 1997

1995
Edge Deletion Preserving the Diameter of the Hypercube.
Discret. Appl. Math., 1995

1994
On Mutual Exclusion in Faulty Distributed Systems.
ACM SIGOPS Oper. Syst. Rev., 1994

Embedding Complete Binary Trees into Star Networks.
Proceedings of the Mathematical Foundations of Computer Science 1994, 1994

1993
An Improvement of the Maekawa's Mutual Exclusion Algorithm to Make it Fault-Tolerant.
Parallel Process. Lett., 1993

On the edge forwarding index problem for small graphs.
Networks, 1993


  Loading...