2007 |
15 | EE | Mohammad Saraireh,
Reza Saatchi,
Samir Al-Khayatt,
Rebecca Strachan:
Assessment and improvement of quality of service in wireless networks using fuzzy and hybrid genetic-fuzzy approaches.
Artif. Intell. Rev. 27(2-3): 95-111 (2007) |
2006 |
14 | EE | Mohammad Saraireh,
Reza Saatchi,
Samir Al-Khayatt,
Rebecca Strachan:
Development and Evaluation of a Fuzzy Inference Engine System to Incorporate Quality of Service in IEEE 802.11 Medium Access Protocol.
ICWMC 2006: 29 |
2005 |
13 | | Mohammad Saraireh,
Reza Saatchi,
Samir Al-Khayatt,
Rebecca Strachan:
A comparative study of IEEE 802.11 MAC access mechanisms for different traffic types.
ICETE 2005: 28-35 |
12 | | Yazeed A. Al-Sbou,
Reza Saatchi,
Samir Al-Khayatt,
Rebecca Strachan:
Estimation of the distributions of the QOS parameters using sampled passive measurements techniques.
ICETE 2005: 324-329 |
2004 |
11 | | Siraj A. Shaikh,
Samir Al-Khayatt:
Analysis and implementation of virtual private network support in corporate networks.
Parallel and Distributed Computing and Networks 2004: 251-256 |
10 | | Firat Tekiner,
Zabih Ghassemlooy,
Samir Al-Khayatt,
Mark Thompson:
Implementation and evaluation of shufflenet, gemnet and de bruijn graph logical network topologies.
Parallel and Distributed Computing and Networks 2004: 582-587 |
9 | EE | Henry O. Nyongesa,
Samir Al-Khayatt,
Suliman M. Mohamed,
M. Mahmoud:
Fast Robust Fingerprint Feature Extraction and Classification.
Journal of Intelligent and Robotic Systems 40(1): 103-112 (2004) |
2002 |
8 | EE | Samir Al-Khayatt,
Siraj A. Shaikh,
Babak Akhgar,
Jawed I. A. Siddiqi:
Performance of Multimedia Applications with IPSec Tunneling.
ITCC 2002: 134-138 |
7 | EE | Samir Al-Khayatt,
Siraj A. Shaikh,
Babak Akhgar,
Jawed I. A. Siddiqi:
A Study of Encrypted, Tunneling Models in Virtual Private Networks.
ITCC 2002: 139-143 |
6 | EE | Jawed I. A. Siddiqi,
Babak Akhgar,
Carl Davies,
Samir Al-Khayatt:
E-Commerce: Continuous Growth or Leveling Out?
ITCC 2002: 491-497 |
5 | EE | Babak Akhgar,
Jawed I. A. Siddiqi,
Samir Al-Khayatt:
Strategic exploitation of ERP for E-Business.
ITCC 2002: 498-503 |
2001 |
4 | EE | Samir Al-Khayatt,
Richard Neale:
Automated Detection of Internet Usage Policy Violation.
AICCSA 2001: 507-510 |
3 | | Samir Al-Khayatt,
Mark Charlesworth,
Siraj A. Shaikh:
Virtual Private Network Support in a Corporate Network.
WebNet 2001: 12-14 |
2 | | Samir Al-Khayatt,
Richard Neale:
Tools for Tracking Employees' Usage of Internet.
WebNet 2001: 9-11 |
1999 |
1 | | Samir Al-Khayatt,
Paul Wheway,
Steve Moore:
Improving performance and security of corporate networks.
Computers and Their Applications 1999: 115-119 |