The SCEAS System
Navigation Menu

Search the dblp DataBase


Farid Naït-Abdesselam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Farid Naït-Abdesselam, Hend Koubaa
    Enhanced Routing-Aware Adaptive MAC with Traffic Differentiation and Smoothed Contention Window in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:690-695 [Conf]
  2. Farid Naït-Abdesselam
    Intelligent Agents for QoS Control and Adaptation in Distributed Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    ICEIS, 1999, pp:501-508 [Conf]
  3. Anastasios Kasiolas, Farid Naït-Abdesselam, Dimitrios Makrakis
    Cooperative Adaptation to Quality of Service Using Distributed Agents. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:502-507 [Conf]
  4. Farid Naït-Abdesselam, Nazim Agoulmine
    Qos Control and Adaptation in Distributed Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    IPPS/SPDP Workshops, 1999, pp:375-383 [Conf]
  5. Hend Koubaa, Farid Naït-Abdesselam
    Achieving Routing Based Medium Access Fairness in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IWDC, 2003, pp:245-254 [Conf]
  6. Farid Naït-Abdesselam, Anastasios Kasiolas, Dimitrios Makrakis, Abdelhakim Hafid
    Cooperative Adaptation to Quality of Servive Using Active Software Agents. [Citation Graph (0, 0)][DBLP]
    Networking and Information Systems, 1999, v:2, n:3, pp:283-304 [Journal]
  7. Mahmoud Taifour, Farid Naït-Abdesselam, David Simplot-Ryl
    RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:195-202 [Conf]
  8. Tarik Taleb, Farid Naït-Abdesselam, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto
    Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  9. Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. [Citation Graph (, )][DBLP]

  10. Avoiding virtual link attacks in wireless ad hoc networks. [Citation Graph (, )][DBLP]

  11. Performance evaluation of TCP handoffs over mobile IP connections. [Citation Graph (, )][DBLP]

  12. DPS-MAC: An Asynchronous MAC Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  13. An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol. [Citation Graph (, )][DBLP]

  14. O-MAC: An Organized Energy-Aware MAC Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  15. On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  16. Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]

  17. A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN. [Citation Graph (, )][DBLP]

  18. Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks. [Citation Graph (, )][DBLP]

  19. F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks. [Citation Graph (, )][DBLP]

  20. Performance Analysis of an Energy Efficient MAC Protocol for Sensor Networks. [Citation Graph (, )][DBLP]

  21. 802.11 Qos Cross-Layer Protocol Based Propagation Conditions Adaptation. [Citation Graph (, )][DBLP]

  22. R-MAC: Reservation Medium Access Control Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  23. A collaborative peer-to-peer architecture to defend against DDoS attacks. [Citation Graph (, )][DBLP]

  24. Maximum Data Collection Least-Cost Routing in Energy Constrained Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  25. Neighbor based channel hopping coordination: Practical against jammer? [Citation Graph (, )][DBLP]

  26. A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless networks. [Citation Graph (, )][DBLP]

  27. The 2nd IEEE Workshop on Wireless and Internet Services (WISe 2009). [Citation Graph (, )][DBLP]

  28. Performance modelling of the o-mac protocol. [Citation Graph (, )][DBLP]

  29. PPN 2007 PC Co-chairs' Message. [Citation Graph (, )][DBLP]

  30. A model-based semi-quantitative approach for evaluating security of enterprise networks. [Citation Graph (, )][DBLP]

  31. Route Optimization for Large Scale Network Mobility Assisted by BGP. [Citation Graph (, )][DBLP]

  32. Logical Wormhole Prevention in Optimized Link State Routing Protocol. [Citation Graph (, )][DBLP]

  33. On Physical-Aware Directional MAC Protocol for Indoor Wireless Networks. [Citation Graph (, )][DBLP]

  34. An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks. [Citation Graph (, )][DBLP]

  35. RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. [Citation Graph (, )][DBLP]

  36. Rate-lifetime tradeoff for reliable communication in wireless sensor networks. [Citation Graph (, )][DBLP]

Search in 0.019secs, Finished in 0.021secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002