Noureddine Boudriga
According to our database1,
Noureddine Boudriga
authored at least 287 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cnas.org.tn
On csauthors.net:
Bibliography
2024
Authentication in QoS Aware VANET: An Approach Based on Enhanced Digital Certificates.
IEEE Access, 2024
2022
Proceedings of the 27th Asia Pacific Conference on Communications, 2022
Proceedings of the 19th International Multi-Conference on Systems, Signals & Devices, 2022
2021
ZAO-AKA : a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system.
Wirel. Networks, 2021
IEEE Trans. Sustain. Comput., 2021
Proceedings of the Intelligent Computing, 2021
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021
Building Structural Health Monitoring: an FBG-based estimation of external vibrations.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021
2020
Proceedings of the 22nd International Conference on Transparent Optical Networks, 2020
A trust-aware micropayment system for data muling in cloud environment: a Blockchain based approach.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020
Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2020), 2020
2019
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios.
J. Univers. Comput. Sci., 2019
Enterprise security investment through time when facing different types of vulnerabilities.
Inf. Syst. Frontiers, 2019
Int. J. Sens. Networks, 2019
Trans. Emerg. Telecommun. Technol., 2019
CoRR, 2019
Ann. des Télécommunications, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2nd International Conference on Networking, 2019
Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
On the Design of an Intelligent Landing and Take-off Assistance System Using Optical Wireless Communication.
Proceedings of the 21st International Conference on Transparent Optical Networks, 2019
Proceedings of the 26th IEEE International Conference on Electronics, Circuits and Systems, 2019
2018
Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform.
J. Netw. Comput. Appl., 2018
J. Grid Comput., 2018
Comput. Electr. Eng., 2018
Trusting Sensors Measurements in a WSN: An Approach Based on True and Group Deviation Estimation.
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018
A Context-Based Model for Validating the Ability of Cyber Systems to Defend Against Attacks.
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018
Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), 2018
Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), 2018
An Optical Wireless Communication Based 5G Architecture to Enable Smart City Applications.
Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2018
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018
2017
Digitizing radio-over-fiber transceiver based on optical tunable encoder and optical codewords.
Photonic Netw. Commun., 2017
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios.
Digit. Investig., 2017
Ad Hoc Sens. Wirel. Networks, 2017
On the design of an embedded wireless sensor network for aircraft vibration monitoring using efficient game theoretic based MAC protocol.
Ad Hoc Networks, 2017
A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017
Chaotic ZKP Based Authentication and Key Distribution Scheme in Environmental Monitoring CPS.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017
The design of a Game-theoretic Based Multiple Access scheme for 5G Millimeter Wave Communication Networks.
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
The design of an optical wireless sensor network based train vibration monitoring system.
Proceedings of the 2017 19th International Conference on Transparent Optical Networks (ICTON), 2017
2016
Ad Hoc Sens. Wirel. Networks, 2016
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016
Internet of Things in Motion: A Cooperative Data Muling Model Under Revisit Constraints.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016
Proceedings of the 18th International Conference on Transparent Optical Networks, 2016
Proceedings of the 18th International Conference on Transparent Optical Networks, 2016
Proceedings of the CONF-IRM 2016, 2016
Proceedings of the Business Information Systems - 19th International Conference, 2016
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
A location-aware authentication and key management scheme for wireless sensor networks.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016
Design and analysis of protecting strategies against border crossing under irregular conditions.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016
2015
Photonic Netw. Commun., 2015
EURASIP J. Wirel. Commun. Netw., 2015
Proceedings of the 23rd International Conference on Software, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Insurance versus Investigation Driven Approach for the Computation of Optimal Security Investment.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the 17th International Conference on Transparent Optical Networks, 2015
Proceedings of the 17th International Conference on Transparent Optical Networks, 2015
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
A Mark Based-Temporal Conceptual Graphs for Enhancing Big Data Management and Attack Scenario Reconstruction.
Proceedings of the Business Information Systems - 18th International Conference, 2015
A Public Safety Wireless Sensor Network: A Visible Light Communication Based Approach.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015
Healthcare Systems in Rural Areas: A Cloud-Sensor Based Approach for Epidemic Diseases Management.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015
Proceedings of the 10th International Conference on Information, 2015
2014
Secur. Commun. Networks, 2014
On a Controlled Random Deployment WSN-Based Monitoring System Allowing Fault Detection and Replacement.
Int. J. Distributed Sens. Networks, 2014
A new leader-based multicast scheme with a Raptor code in IEEE 802.11 multi-rate WLANs.
EURASIP J. Wirel. Commun. Netw., 2014
DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2014
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014
A novel realistic irregular radio model to enhance coverage evaluation in wireless sensor networks.
Proceedings of the 22nd International Conference on Software, 2014
WSN-based flutter control application for aircraft wings structural health monitoring.
Proceedings of the Symposium on Applied Computing, 2014
TargMoveS: An optimized sensor scheduling scheme based on target mobility variations.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014
A hole detection scheme based on polygonal cycles for the irregular radio range in WSN.
Proceedings of the MobiWac'14, 2014
An optimized spectrum allocation scheme for future aircraft Cognitive Radio Wireless Sensor Networks.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
Proceedings of the 16th International Conference on Transparent Optical Networks, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Adaptive QoS and Security for Video Transmission over Wireless Networks: A Cognitive-Based Approach.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
An Innovative Approach for Dynamic Evaluation of Telecommunications Interconnection Costs for Multimedia Real Time Services.
Proceedings of the Business Information Systems Workshops, 2014
Proceedings of the Business Information Systems - 17th International Conference, 2014
Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems.
Proceedings of the Business Information Systems Workshops, 2014
Proceedings of the Ad-hoc Networks and Wireless, 2014
2013
EURASIP J. Wirel. Commun. Netw., 2013
Stateless security filtering of optical data signals: An approach based on code words.
Proceedings of the 17th International Conference on Optical Networking Design and Modeling, 2013
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
Securing implantable cardiac medical devices: use of radio frequency energy harvesting.
Proceedings of the TrustED'13, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
IET Commun., 2012
A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks.
Comput. Secur., 2012
A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012
Proceedings of the Q2SWinet'12, 2012
Proceedings of the Pervasive Computing and the Networked World, 2012
Success Probability Evaluation of Quantum Circuits based on Probabilistic CNOT-Gates.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012
All-optical Multi-wavelength Virtual Memory Architecture - Design and Performances Analysis.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012
A mark association-based investigation of attack scenarios in communication networks.
Proceedings of IEEE International Conference on Communications, 2012
2011
Int. J. Commun. Networks Distributed Syst., 2011
EURASIP J. Wirel. Commun. Netw., 2011
Comput. Secur., 2011
Validation of Security Solutions for Communication Networks: A Policy-Based Approach.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
2010
Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping.
Simul., 2010
J. Networks, 2010
Predictive Dynamic Uplink /Downlink Resource Reservation for Vertical Handoff Optimization in 4G Networks.
Int. J. Bus. Data Commun. Netw., 2010
QoS Scheduling for IEEE 802.16e Mesh Mode using Genetic Algorithms.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
A Novel Secure and Multipath Routing Algorithm in Wireless Sensor Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
A Novel Modular Black-box Architecture for Secure Vehicular Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
Mobility and Security Models for Wireless Sensor Networks using Voronoi Tessellations.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
Predictive dynamic resource reservation for vertical handoff optimization in 4G mobile wireless networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
2009
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams.
J. Networks, 2009
Int. J. Secur. Networks, 2009
Int. J. Commun. Netw. Syst. Sci., 2009
EURASIP J. Adv. Signal Process., 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Intrusion detection and tolerance for transaction based applications in wireless environments.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Grid and Distributed Computing, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
2008
Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking.
IEEE Syst. J., 2008
J. Networks, 2008
Int. J. Commun. Syst., 2008
Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis.
Comput. Commun., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems.
Proceedings of the NTMS 2008, 2008
Proceedings of the NTMS 2008, 2008
Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks.
Proceedings of the NTMS 2008, 2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
An elliptic threshold signature framework for k-security in wireless sensor networks.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Proceedings of the 3rd Workshop on the Use of P2P, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Automated Intrusion Response System: Surveys and Analysis.
Proceedings of the 2008 International Conference on Security & Management, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks: A Scheme and Performance Evaluation.
Simul., 2007
Int. J. Commun. Syst., 2007
Eur. J. Oper. Res., 2007
Comput. Commun., 2007
A novel node architecture for optical networks: Modeling, analysis and performance evaluation.
Comput. Commun., 2007
Comput. Commun., 2007
Proceedings of the IEEE International Conference on Systems, 2007
Proceedings of the IEEE International Conference on Systems, 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Secure Grid-Based Multi-Party Micropayment System in 4G Networks.
Proceedings of the ICE-B 2007, 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Proceedings 40th Annual Simulation Symposium (ANSS-40 2007), 2007
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
2006
Simul., 2006
Comput. Commun., 2006
Comput. Electr. Eng., 2006
SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks.
Proceedings of the ICE-B 2006, 2006
Proceedings of the 13th IEEE International Conference on Electronics, 2006
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006
Proceedings of the e-Business and Telecommunication Networks, 2006
2005
Computer and network security risk management: theory, challenges, and countermeasures.
Int. J. Commun. Syst., 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
A formal logic-based language and an automated verification tool for computer forensic investigation.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security.
Proceedings of the Computer Network Security, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Detecting distributed computer network attacks: A multi-dimensional wavelet approach.
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
An advance dynamic resource reservation algorithm for OBS networks: Design and performance.
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Comput. Commun., 2004
Proceedings of the IEEE International Conference on Systems, 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
SPUR: A Secured Protocol for UMTS Registration.
Proceedings of the ICETE 2004, 2004
2003
DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle.
Comput. Commun., 2003
Comput. Commun., 2003
Proceedings of the 23rd International Conference of the Chilean Computer Science Society (SCCC 2003), 2003
Admission control and resource management of uncertain duration traffic in optical networks.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
2002
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
Proceedings of the IEEE International Conference on Communications, 2002
2001
On a congestion management scheme for high speed networks using aggregated large deviations principle.
Comput. Commun., 2001
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001
2000
Comput. Commun., 2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
1999
Int. J. Commun. Syst., 1999
Int. J. Commun. Syst., 1999
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999
1998
Int. J. Commun. Syst., 1998
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998
1997
Comput. Commun., 1997
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997
Formal Protocol Description: Model and validation.
Proceedings of the Participants Copies of Third International Seminar on the Use of Relational Methods in Computer Science, 1997
1995
J. Syst. Integr., 1995
1993
Corrigendum: Specification and execution of transactions for advanced database applications.
Inf. Syst., 1993
A Priority-Based PCG Algorithm for Global Deadlock Detection and Resilution in Multidatabase Systems.
Proceedings of the RIDE-IMS '93, 1993
1992
Semantic-Based Software Retrieval to Support Rapid Prototyping.
Struct. Program., 1992
Inf. Syst., 1992
Formal Aspects Comput., 1992
Computers in the Classroom: A National Proposal.
Proceedings of the Education and Society, 1992
A Transition Net Formalism for Deductive Databases Efficiently Handling Quering and Integrity Constraints Aspects.
Proceedings of the International Conference on Database and Expert Systems Applications, 1992
1991
1990
A Database of Software Components: An Algebraic Structure and Its Implementation.
Proceedings of the International Conference on Database and Expert Systems Applications, 1990