dblp.uni-trier.dewww.uni-trier.de

Madjid Merabti

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
57EEKenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, Madjid Merabti: A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance. AINA Workshops 2008: 1444-1449
56EEMadjid Merabti, Abdennour El Rhalibi, Amjad Shaheed, Paul Fergus, Marc Price: Virtual Environments with Content Sharing. Edutainment 2008: 328-342
55EEBo Zhou, Qi Shi, Madjid Merabti: Balancing intrusion detection resources in ubiquitous computing networks. Computer Communications 31(15): 3643-3653 (2008)
54EEMengjie Yu, Hala M. Mokhtar, Madjid Merabti: A self-organised middleware architecture for Wireless Sensor Network management. IJAHUC 3(3): 135-145 (2008)
53EEMadjid Merabti, Abdennour El Rhalibi, Yuanyuan Shen, Jorge Daniel, Alcantara Melendez, Marc Price: Interactive Storytelling: Approaches and Techniques to Achieve Dynamic Stories. T. Edutainment 1: 118-134 (2008)
2007
52EEShih-Hao Chang, Madjid Merabti, Hala M. Mokhtar: Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. AINA Workshops (1) 2007: 846-851
51EEFaycal Bouhafs, Madjid Merabti, Hala M. Mokhtar: Mobile Event Monitoring Protocol for Wireless Sensor Networks. AINA Workshops (1) 2007: 864-869
50EETarag Fahad, Djamel Djenouri, Robert Askwith, Madjid Merabti: A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. AINA Workshops (1) 2007: 882-887
49EEE. C. L. Watts, Madjid Merabti, A. Taleb-Bendiab: A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. AINA Workshops (1) 2007: 923-928
48EEPaul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi: Bridging the Gap between Networked Appliances and Virtual Worlds. AINA Workshops (1) 2007: 935-940
47EEKashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones: Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49
46EERozaida Ghazali, Abir Jaafar Hussain, Dhiya Al-Jumeily, Madjid Merabti: Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting. ICANNGA (2) 2007: 123-132
45EEBo Zhou, Qi Shi, Madjid Merabti: Towards Energy-Efficient Intrusion Detection in Pervasive Computing. ICC 2007: 1417-1422
44EEFaycal Bouhafs, Madjid Merabti, Hala M. Mokhtar: A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks. ICC 2007: 3876-3881
43EEDeepa Kundur, Zhu Liu, Madjid Merabti, Heather Yu: Advances in Peer-to-Peer Content Search. ICME 2007: 404-407
42EEHeather Yu, John Buford, Madjid Merabti: Improving Messaging Security in Structured P2P Overlay Networks. ICME 2007: 408-411
41 Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar: Spider-Net Zone Routing Protocol for Mobile Sink Wireless Sensor Networks. ICWN 2007: 209-215
2006
40EEAbdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen: AoIM in peer-to-peer multiplayer online games. Advances in Computer Entertainment Technology 2006: 71
39 Rozaida Ghazali, Abir Jaafar Hussain, Madjid Merabti: Higher order neural networks and their applications to financial time series prediction. Artificial Intelligence and Soft Computing 2006: 120-125
38EEBo Zhou, Qi Shi, Madjid Merabti: Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. COMPSAC (2) 2006: 203-208
37EEAbdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen: Improving Game Processing in Multithreading and Multiprocessor Architecture. Edutainment 2006: 669-679
36EEBo Zhou, Qi Shi, Madjid Merabti: Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. ICCSA (4) 2006: 352-359
35EEZhu Liu, Heather Yu, Deepa Kundur, Madjid Merabti: On Peer-to-Peer Multimedia Content Access and Distribution. ICME 2006: 557-560
34EENing Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Practical and efficient fair document exchange over networks. J. Network and Computer Applications 29(1): 46-61 (2006)
33EEMarco Roccetti, Gary Chan, Madjid Merabti, Stan Moyer, Mehmet Ulema, Heather Yu: Special issue on advances in consumer communications and networking. Multimedia Tools Appl. 29(3): 209-210 (2006)
32EEAnirach Mingkhwan, Paul Fergus, O. Abuelma'atti, Madjid Merabti, Bob Askwith, M. B. Hanneghan: Dynamic service composition in home appliance networks. Multimedia Tools Appl. 29(3): 257-284 (2006)
2005
31EEAbdennour El Rhalibi, Nick Baker, Madjid Merabti: Emotional agent model and architecture for NPCs group control and interaction to facilitate leadership roles in computer entertainment. Advances in Computer Entertainment Technology 2005: 156-163
30EEDavid Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith: Buffer Overrun Prevention Through Component Composition Analysis. COMPSAC (1) 2005: 156-163
29 John Haggerty, Qi Shi, Madjid Merabti: Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. SEC 2005: 327-342
28EEAbdennour El Rhalibi, Madjid Merabti: Agents-based modeling for a peer-to-peer MMOG architecture. Computers in Entertainment 3(2): 3 (2005)
27EEG. Arora, Martin Hanneghan, Madjid Merabti: P2P commercial digital content exchange. Electronic Commerce Research and Applications 4(3): 250-263 (2005)
26EEJohn Haggerty, Qi Shi, Madjid Merabti: Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE Journal on Selected Areas in Communications 23(10): 1994-2002 (2005)
25EENing Zhang, Qi Shi, Madjid Merabti: Revocation of privacy-enhanced public-key certificates. Journal of Systems and Software 75(1-2): 205-214 (2005)
2004
24EEDavid Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith: An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. ITCC (1) 2004: 112-117
23EENing Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Autonomous mobile agent based fair exchange. Computer Networks 46(6): 751-770 (2004)
22EENing Zhang, Qi Shi, Madjid Merabti: A unified approach to a fair document exchange system. Journal of Systems and Software 72(1): 83-96 (2004)
2003
21EEHala M. Mokhtar, Rubem Pereira, Madjid Merabti: An Effective Bandwidth Model for Deterministic QoS Guarantees of VBR Traffic. ISCC 2003: 1318-1323
20EEAbiola Abimbola, Qi Shi, Madjid Merabti: NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. ISCC 2003: 232-237
19EEPaul Fergus, Anirach Mingkhwan, Madjid Merabti, Martin Hanneghan: DiSUS: Mobile Ad Hoc Network Unstructured Services. PWC 2003: 484-491
18EENing Zhang, Qi Shi, Madjid Merabti: An efficient protocol for anonymous and fair document exchange. Computer Networks 41(1): 19-28 (2003)
17EEBob Askwith, Madjid Merabti, Qi Shi: MNPA: A basis for privacy-enhanced QoS in mobile networks. Microprocessors and Microsystems 27(2): 93-100 (2003)
2002
16EEJohn Haggerty, Qi Shi, Madjid Merabti: Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. ACSAC 2002: 413-422
15EEChris Bewick, Rubem Pereira, Madjid Merabti: Network constrained smoothing: enhanced multiplexing of MPEG-4 video. ISCC 2002: 114-119
14EEHala M. Mokhtar, Rubem Pereira, Madjid Merabti: Fair-rate GPS: a new class for decoupling delay and bandwidth properties. ISCC 2002: 583-588
13 John Haggerty, Qi Shi, Madjid Merabti: The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146
2001
12EED. W. Gresty, Qi Shi, Madjid Merabti: Requirements for a General Framework for Response to Distributed Denial-of-Service. ACSAC 2001: 422-432
11EEHala M. Mokhtar, Rubem Pereira, Madjid Merabti: Cell-by-Cell Round Robin Service Discipline for ATM Networks. ICN (2) 2001: 507-516
10EEHala M. Mokhtar, Rubem Pereira, Madjid Merabti: Resource Allocation Scheme for Deterministic Services of Video Streams. ISCC 2001: 353-358
2000
9EEMadjid Merabti, Qi Shi, Rolf Oppliger: Advanced security techniques for network protection. Computer Communications 23(17): 1581-1583 (2000)
8EEBob Askwith, Madjid Merabti, Qi Shi: MNPA: a mobile network privacy architecture. Computer Communications 23(18): 1777-1788 (2000)
1999
7 Ning Zhang, Qi Shi, Madjid Merabti: A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999)
6 Putra Sumari, Madjid Merabti, Rubem Pereira: Video-on-demand server: Strategies for improving performance. IEE Proceedings - Software 146(1): 33-38 (1999)
1998
5EEEwan Smith, Adil Al-Yasiri, Madjid Merabti: A Multi-Tiered Classification Scheme for Component Retrieval. EUROMICRO 1998: 20882-20889
1997
4EEBob Askwith, Madjid Merabti, Qi Shi, K. Whiteley: Achieving User Privacy in Mobile Networks. ACSAC 1997: 108-
1996
3 Martin Hanneghan, Madjid Merabti, Gary Colquhoun: The World-Wide Web as Platform for Supporting Interactive Concurrent Engineering. CAiSE 1996: 301-318
1995
2 Andrew Symons, Madjid Merabti, Carl Bamford: Dynamically Re-configurable Distributed Multimedia Systems: An Object Based Framework. OOIS 1995: 173-188
1 Martin Hanneghan, Madjid Merabti, Gary Colquhoun: The Design of an Object-Oriented Repository to Support Concurrent Engineering. OOIS 1995: 200-215

Coauthor Index

1Abiola Abimbola [20]
2O. Abuelma'atti [32]
3Dhiya Al-Jumeily [46]
4Adil Al-Yasiri [5]
5G. Arora [27]
6Robert Askwith (Bob Askwith) [4] [8] [17] [23] [24] [30] [32] [34] [50]
7Nick Baker [31]
8Carl Bamford [2]
9Chris Bewick [15]
10Faycal Bouhafs [44] [51]
11John Buford [42]
12Gary Chan [33]
13Shih-Hao Chang [41] [52]
14Tong-Tai Chiang [57]
15Gary Colquhoun [1] [3]
16Jorge Daniel [53]
17Djamel Djenouri [50]
18Tarag Fahad [50]
19Paul Fergus [19] [32] [48] [56]
20Rozaida Ghazali [39] [46]
21D. W. Gresty [12]
22John Haggerty [13] [16] [26] [29]
23M. B. Hanneghan [32]
24Martin Hanneghan [1] [3] [19] [27]
25Abir Jaafar Hussain [39] [46]
26Kashif Kifayat [47]
27Deepa Kundur [35] [43]
28Zhu Liu [35] [43]
29David Llewellyn-Jones [24] [30] [47] [48]
30Alcantara Melendez [53]
31Anirach Mingkhwan [19] [32]
32Hala M. Mokhtar [10] [11] [14] [21] [41] [44] [51] [52] [54]
33Stan Moyer [33]
34Rolf Oppliger [9]
35Lin-Yi Peng [57]
36Rubem Pereira [6] [10] [11] [14] [15] [21]
37Marc Price [53] [56]
38Abdennour El Rhalibi [28] [31] [37] [40] [48] [53] [56]
39Marco Roccetti [33]
40Amjad Shaheed [56]
41Yuanyuan Shen [37] [40] [53]
42Qi Shi [4] [7] [8] [9] [12] [13] [16] [17] [18] [20] [22] [23] [24] [25] [26] [29] [30] [34] [36] [38] [45] [47] [55]
43Ewan Smith [5]
44Putra Sumari [6]
45Andrew Symons [2]
46A. Taleb-Bendiab [49]
47Mehmet Ulema [33]
48Kenvi Wang [57]
49E. C. L. Watts [49]
50K. Whiteley [4]
51Heather Yu [33] [35] [42] [43]
52Mengjie Yu [54]
53Ning Zhang [7] [18] [22] [23] [25] [34]
54Bo Zhou [36] [38] [45] [55]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)