2008 | ||
---|---|---|
57 | EE | Kenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, Madjid Merabti: A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance. AINA Workshops 2008: 1444-1449 |
56 | EE | Madjid Merabti, Abdennour El Rhalibi, Amjad Shaheed, Paul Fergus, Marc Price: Virtual Environments with Content Sharing. Edutainment 2008: 328-342 |
55 | EE | Bo Zhou, Qi Shi, Madjid Merabti: Balancing intrusion detection resources in ubiquitous computing networks. Computer Communications 31(15): 3643-3653 (2008) |
54 | EE | Mengjie Yu, Hala M. Mokhtar, Madjid Merabti: A self-organised middleware architecture for Wireless Sensor Network management. IJAHUC 3(3): 135-145 (2008) |
53 | EE | Madjid Merabti, Abdennour El Rhalibi, Yuanyuan Shen, Jorge Daniel, Alcantara Melendez, Marc Price: Interactive Storytelling: Approaches and Techniques to Achieve Dynamic Stories. T. Edutainment 1: 118-134 (2008) |
2007 | ||
52 | EE | Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar: Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. AINA Workshops (1) 2007: 846-851 |
51 | EE | Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar: Mobile Event Monitoring Protocol for Wireless Sensor Networks. AINA Workshops (1) 2007: 864-869 |
50 | EE | Tarag Fahad, Djamel Djenouri, Robert Askwith, Madjid Merabti: A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. AINA Workshops (1) 2007: 882-887 |
49 | EE | E. C. L. Watts, Madjid Merabti, A. Taleb-Bendiab: A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. AINA Workshops (1) 2007: 923-928 |
48 | EE | Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi: Bridging the Gap between Networked Appliances and Virtual Worlds. AINA Workshops (1) 2007: 935-940 |
47 | EE | Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones: Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49 |
46 | EE | Rozaida Ghazali, Abir Jaafar Hussain, Dhiya Al-Jumeily, Madjid Merabti: Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting. ICANNGA (2) 2007: 123-132 |
45 | EE | Bo Zhou, Qi Shi, Madjid Merabti: Towards Energy-Efficient Intrusion Detection in Pervasive Computing. ICC 2007: 1417-1422 |
44 | EE | Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar: A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks. ICC 2007: 3876-3881 |
43 | EE | Deepa Kundur, Zhu Liu, Madjid Merabti, Heather Yu: Advances in Peer-to-Peer Content Search. ICME 2007: 404-407 |
42 | EE | Heather Yu, John Buford, Madjid Merabti: Improving Messaging Security in Structured P2P Overlay Networks. ICME 2007: 408-411 |
41 | Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar: Spider-Net Zone Routing Protocol for Mobile Sink Wireless Sensor Networks. ICWN 2007: 209-215 | |
2006 | ||
40 | EE | Abdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen: AoIM in peer-to-peer multiplayer online games. Advances in Computer Entertainment Technology 2006: 71 |
39 | Rozaida Ghazali, Abir Jaafar Hussain, Madjid Merabti: Higher order neural networks and their applications to financial time series prediction. Artificial Intelligence and Soft Computing 2006: 120-125 | |
38 | EE | Bo Zhou, Qi Shi, Madjid Merabti: Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. COMPSAC (2) 2006: 203-208 |
37 | EE | Abdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen: Improving Game Processing in Multithreading and Multiprocessor Architecture. Edutainment 2006: 669-679 |
36 | EE | Bo Zhou, Qi Shi, Madjid Merabti: Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. ICCSA (4) 2006: 352-359 |
35 | EE | Zhu Liu, Heather Yu, Deepa Kundur, Madjid Merabti: On Peer-to-Peer Multimedia Content Access and Distribution. ICME 2006: 557-560 |
34 | EE | Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Practical and efficient fair document exchange over networks. J. Network and Computer Applications 29(1): 46-61 (2006) |
33 | EE | Marco Roccetti, Gary Chan, Madjid Merabti, Stan Moyer, Mehmet Ulema, Heather Yu: Special issue on advances in consumer communications and networking. Multimedia Tools Appl. 29(3): 209-210 (2006) |
32 | EE | Anirach Mingkhwan, Paul Fergus, O. Abuelma'atti, Madjid Merabti, Bob Askwith, M. B. Hanneghan: Dynamic service composition in home appliance networks. Multimedia Tools Appl. 29(3): 257-284 (2006) |
2005 | ||
31 | EE | Abdennour El Rhalibi, Nick Baker, Madjid Merabti: Emotional agent model and architecture for NPCs group control and interaction to facilitate leadership roles in computer entertainment. Advances in Computer Entertainment Technology 2005: 156-163 |
30 | EE | David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith: Buffer Overrun Prevention Through Component Composition Analysis. COMPSAC (1) 2005: 156-163 |
29 | John Haggerty, Qi Shi, Madjid Merabti: Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. SEC 2005: 327-342 | |
28 | EE | Abdennour El Rhalibi, Madjid Merabti: Agents-based modeling for a peer-to-peer MMOG architecture. Computers in Entertainment 3(2): 3 (2005) |
27 | EE | G. Arora, Martin Hanneghan, Madjid Merabti: P2P commercial digital content exchange. Electronic Commerce Research and Applications 4(3): 250-263 (2005) |
26 | EE | John Haggerty, Qi Shi, Madjid Merabti: Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE Journal on Selected Areas in Communications 23(10): 1994-2002 (2005) |
25 | EE | Ning Zhang, Qi Shi, Madjid Merabti: Revocation of privacy-enhanced public-key certificates. Journal of Systems and Software 75(1-2): 205-214 (2005) |
2004 | ||
24 | EE | David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith: An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. ITCC (1) 2004: 112-117 |
23 | EE | Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Autonomous mobile agent based fair exchange. Computer Networks 46(6): 751-770 (2004) |
22 | EE | Ning Zhang, Qi Shi, Madjid Merabti: A unified approach to a fair document exchange system. Journal of Systems and Software 72(1): 83-96 (2004) |
2003 | ||
21 | EE | Hala M. Mokhtar, Rubem Pereira, Madjid Merabti: An Effective Bandwidth Model for Deterministic QoS Guarantees of VBR Traffic. ISCC 2003: 1318-1323 |
20 | EE | Abiola Abimbola, Qi Shi, Madjid Merabti: NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. ISCC 2003: 232-237 |
19 | EE | Paul Fergus, Anirach Mingkhwan, Madjid Merabti, Martin Hanneghan: DiSUS: Mobile Ad Hoc Network Unstructured Services. PWC 2003: 484-491 |
18 | EE | Ning Zhang, Qi Shi, Madjid Merabti: An efficient protocol for anonymous and fair document exchange. Computer Networks 41(1): 19-28 (2003) |
17 | EE | Bob Askwith, Madjid Merabti, Qi Shi: MNPA: A basis for privacy-enhanced QoS in mobile networks. Microprocessors and Microsystems 27(2): 93-100 (2003) |
2002 | ||
16 | EE | John Haggerty, Qi Shi, Madjid Merabti: Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. ACSAC 2002: 413-422 |
15 | EE | Chris Bewick, Rubem Pereira, Madjid Merabti: Network constrained smoothing: enhanced multiplexing of MPEG-4 video. ISCC 2002: 114-119 |
14 | EE | Hala M. Mokhtar, Rubem Pereira, Madjid Merabti: Fair-rate GPS: a new class for decoupling delay and bandwidth properties. ISCC 2002: 583-588 |
13 | John Haggerty, Qi Shi, Madjid Merabti: The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146 | |
2001 | ||
12 | EE | D. W. Gresty, Qi Shi, Madjid Merabti: Requirements for a General Framework for Response to Distributed Denial-of-Service. ACSAC 2001: 422-432 |
11 | EE | Hala M. Mokhtar, Rubem Pereira, Madjid Merabti: Cell-by-Cell Round Robin Service Discipline for ATM Networks. ICN (2) 2001: 507-516 |
10 | EE | Hala M. Mokhtar, Rubem Pereira, Madjid Merabti: Resource Allocation Scheme for Deterministic Services of Video Streams. ISCC 2001: 353-358 |
2000 | ||
9 | EE | Madjid Merabti, Qi Shi, Rolf Oppliger: Advanced security techniques for network protection. Computer Communications 23(17): 1581-1583 (2000) |
8 | EE | Bob Askwith, Madjid Merabti, Qi Shi: MNPA: a mobile network privacy architecture. Computer Communications 23(18): 1777-1788 (2000) |
1999 | ||
7 | Ning Zhang, Qi Shi, Madjid Merabti: A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999) | |
6 | Putra Sumari, Madjid Merabti, Rubem Pereira: Video-on-demand server: Strategies for improving performance. IEE Proceedings - Software 146(1): 33-38 (1999) | |
1998 | ||
5 | EE | Ewan Smith, Adil Al-Yasiri, Madjid Merabti: A Multi-Tiered Classification Scheme for Component Retrieval. EUROMICRO 1998: 20882-20889 |
1997 | ||
4 | EE | Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley: Achieving User Privacy in Mobile Networks. ACSAC 1997: 108- |
1996 | ||
3 | Martin Hanneghan, Madjid Merabti, Gary Colquhoun: The World-Wide Web as Platform for Supporting Interactive Concurrent Engineering. CAiSE 1996: 301-318 | |
1995 | ||
2 | Andrew Symons, Madjid Merabti, Carl Bamford: Dynamically Re-configurable Distributed Multimedia Systems: An Object Based Framework. OOIS 1995: 173-188 | |
1 | Martin Hanneghan, Madjid Merabti, Gary Colquhoun: The Design of an Object-Oriented Repository to Support Concurrent Engineering. OOIS 1995: 200-215 |