Search the dblp DataBase
Madjid Merabti :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John Haggerty , Qi Shi , Madjid Merabti Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:413-422 [Conf ] Bob Askwith , Madjid Merabti , Qi Shi , K. Whiteley Achieving User Privacy in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:108-0 [Conf ] D. W. Gresty , Qi Shi , Madjid Merabti Requirements for a General Framework for Response to Distributed Denial-of-Service. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:422-432 [Conf ] Shih-Hao Chang , Madjid Merabti , Hala M. Mokhtar Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:846-851 [Conf ] E. C. L. Watts , Madjid Merabti , A. Taleb-Bendiab A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:923-928 [Conf ] F. Bouhafs , Madjid Merabti , Hala M. Mokhtar Mobile Event Monitoring Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:864-869 [Conf ] Paul Fergus , David Llewellyn-Jones , Madjid Merabti , Abdennour El Rhalibi Bridging the Gap between Networked Appliances and Virtual Worlds. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:935-940 [Conf ] Tarag Fahad , Djamel Djenouri , Robert Askwith , Madjid Merabti A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:882-887 [Conf ] Rozaida Ghazali , Abir Jaafar Hussain , Madjid Merabti Higher order neural networks and their applications to financial time series prediction. [Citation Graph (0, 0)][DBLP ] Artificial Intelligence and Soft Computing, 2006, pp:120-125 [Conf ] Martin Hanneghan , Madjid Merabti , Gary Colquhoun The World-Wide Web as Platform for Supporting Interactive Concurrent Engineering. [Citation Graph (0, 0)][DBLP ] CAiSE, 1996, pp:301-318 [Conf ] David Llewellyn-Jones , Madjid Merabti , Qi Shi , Bob Askwith Buffer Overrun Prevention Through Component Composition Analysis. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:156-163 [Conf ] Bo Zhou , Qi Shi , Madjid Merabti Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:203-208 [Conf ] Abdennour El Rhalibi , Madjid Merabti , Yuanyuan Shen Improving Game Processing in Multithreading and Multiprocessor Architecture. [Citation Graph (0, 0)][DBLP ] Edutainment, 2006, pp:669-679 [Conf ] Ewan Smith , Adil Al-Yasiri , Madjid Merabti A Multi-Tiered Classification Scheme for Component Retrieval. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 1998, pp:20882-20889 [Conf ] Bo Zhou , Qi Shi , Madjid Merabti Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:352-359 [Conf ] Hala M. Mokhtar , Rubem Pereira , Madjid Merabti Cell-by-Cell Round Robin Service Discipline for ATM Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2001, pp:507-516 [Conf ] Paul Fergus , Anirach Mingkhwan , Madjid Merabti , Martin Hanneghan DiSUS: Mobile Ad Hoc Network Unstructured Services. [Citation Graph (0, 0)][DBLP ] PWC, 2003, pp:484-491 [Conf ] Abiola Abimbola , Qi Shi , Madjid Merabti NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:232-237 [Conf ] Chris Bewick , Rubem Pereira , Madjid Merabti Network constrained smoothing: enhanced multiplexing of MPEG-4 video. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:114-119 [Conf ] Hala M. Mokhtar , Rubem Pereira , Madjid Merabti Resource Allocation Scheme for Deterministic Services of Video Streams. [Citation Graph (0, 0)][DBLP ] ISCC, 2001, pp:353-358 [Conf ] Hala M. Mokhtar , Rubem Pereira , Madjid Merabti Fair-rate GPS: a new class for decoupling delay and bandwidth properties. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:583-588 [Conf ] Hala M. Mokhtar , Rubem Pereira , Madjid Merabti An Effective Bandwidth Model for Deterministic QoS Guarantees of VBR Traffic. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:1318-1323 [Conf ] David Llewellyn-Jones , Madjid Merabti , Qi Shi , Bob Askwith An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:112-117 [Conf ] Martin Hanneghan , Madjid Merabti , Gary Colquhoun The Design of an Object-Oriented Repository to Support Concurrent Engineering. [Citation Graph (0, 0)][DBLP ] OOIS, 1995, pp:200-215 [Conf ] Andrew Symons , Madjid Merabti , Carl Bamford Dynamically Re-configurable Distributed Multimedia Systems: An Object Based Framework. [Citation Graph (0, 0)][DBLP ] OOIS, 1995, pp:173-188 [Conf ] John Haggerty , Qi Shi , Madjid Merabti The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:133-146 [Conf ] John Haggerty , Qi Shi , Madjid Merabti Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:327-342 [Conf ] Abdennour El Rhalibi , Madjid Merabti Agents-based modeling for a peer-to-peer MMOG architecture. [Citation Graph (0, 0)][DBLP ] Computers in Entertainment, 2005, v:3, n:2, pp:3- [Journal ] Ning Zhang , Qi Shi , Madjid Merabti A Flexible Approach to Secure and Fair Document Exchange. [Citation Graph (0, 0)][DBLP ] Comput. J., 1999, v:42, n:7, pp:569-581 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti An efficient protocol for anonymous and fair document exchange. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:1, pp:19-28 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti , Robert Askwith Autonomous mobile agent based fair exchange. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:6, pp:751-770 [Journal ] Bob Askwith , Madjid Merabti , Qi Shi MNPA: a mobile network privacy architecture. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:18, pp:1777-1788 [Journal ] Madjid Merabti , Qi Shi , Rolf Oppliger Advanced security techniques for network protection. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:17, pp:1581-1583 [Journal ] G. Arora , Martin Hanneghan , Madjid Merabti P2P commercial digital content exchange. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research and Applications, 2005, v:4, n:3, pp:250-263 [Journal ] Putra Sumari , Madjid Merabti , Rubem Pereira Video-on-demand server: Strategies for improving performance. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 1999, v:146, n:1, pp:33-38 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti A unified approach to a fair document exchange system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:72, n:1, pp:83-96 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti Revocation of privacy-enhanced public-key certificates. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2005, v:75, n:1-2, pp:205-214 [Journal ] Marco Roccetti , Gary Chan , Madjid Merabti , Stan Moyer , Mehmet Ulema , Heather Yu Special issue on advances in consumer communications and networking. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2006, v:29, n:3, pp:209-210 [Journal ] Anirach Mingkhwan , Paul Fergus , O. Abuelma'atti , Madjid Merabti , Bob Askwith , M. B. Hanneghan Dynamic service composition in home appliance networks. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2006, v:29, n:3, pp:257-284 [Journal ] Bob Askwith , Madjid Merabti , Qi Shi MNPA: A basis for privacy-enhanced QoS in mobile networks. [Citation Graph (0, 0)][DBLP ] Microprocessors and Microsystems, 2003, v:27, n:2, pp:93-100 [Journal ] Abdennour El Rhalibi , Madjid Merabti , Yuanyuan Shen AoIM in peer-to-peer multiplayer online games. [Citation Graph (0, 0)][DBLP ] Advances in Computer Entertainment Technology, 2006, pp:71- [Conf ] Abdennour El Rhalibi , Nick Baker , Madjid Merabti Emotional agent model and architecture for NPCs group control and interaction to facilitate leadership roles in computer entertainment. [Citation Graph (0, 0)][DBLP ] Advances in Computer Entertainment Technology, 2005, pp:156-163 [Conf ] Rozaida Ghazali , Abir Jaafar Hussain , Dhiya Al-Jumeily , Madjid Merabti Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting. [Citation Graph (0, 0)][DBLP ] ICANNGA (2), 2007, pp:123-132 [Conf ] Ning Zhang , Qi Shi , Madjid Merabti , Robert Askwith Practical and efficient fair document exchange over networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2006, v:29, n:1, pp:46-61 [Journal ] A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance. [Citation Graph (, )][DBLP ] A Hierarchically Structured Worldwide Sensor Web Architecture. [Citation Graph (, )][DBLP ] Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). [Citation Graph (, )][DBLP ] Body Area Networks for Movement Analysis in Physiotherapy Treatments. [Citation Graph (, )][DBLP ] Peer-to-Peer Overlay Gateway Services for Home Automation and Management. [Citation Graph (, )][DBLP ] Virtual Environments with Content Sharing. [Citation Graph (, )][DBLP ] Towards Energy-Efficient Intrusion Detection in Pervasive Computing. [Citation Graph (, )][DBLP ] A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] On Peer-to-Peer Multimedia Content Access and Distribution. [Citation Graph (, )][DBLP ] Improving Messaging Security in Structured P2P Overlay Networks. [Citation Graph (, )][DBLP ] Advances in Peer-to-Peer Content Search. [Citation Graph (, )][DBLP ] Hybrid Client-Server, Peer-to-Peer framework for MMOG. [Citation Graph (, )][DBLP ] Spider-Net Zone Routing Protocol for Mobile Sink Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Monitoring connectivity in wireless sensor networks. [Citation Graph (, )][DBLP ] A new self-detection scheme for sensor network boundary recognition. [Citation Graph (, )][DBLP ] Remote physiotherapy treatments using wireless body sensor networks. [Citation Graph (, )][DBLP ] Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. [Citation Graph (, )][DBLP ] Sharing and Protecting Networked Digital Life Memories. [Citation Graph (, )][DBLP ] Homura and Net-Homura: The creation and web-based deployment of cross-platform 3D games. [Citation Graph (, )][DBLP ] Balancing intrusion detection resources in ubiquitous computing networks. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.454secs