The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bilal Khan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kiran R. Bhutani, Bilal Khan
    Minimizing Communication Costs in Hierarchical Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:1435-1442 [Conf]
  2. Bilal Khan, Dardo D. Kleiner, David Talmage
    Towards an Agent-Based Distributed Hierarchical Network Management System for All-Optical Networks. [Citation Graph (0, 0)][DBLP]
    MATA, 2001, pp:103-113 [Conf]
  3. Kiran R. Bhutani, Bilal Khan, B. Roy
    Minimizing Computational Load and Communication Costs in Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2002, pp:363-368 [Conf]
  4. Kiran R. Bhutani, Bilal Khan
    Distance Between Graphs Using Graph Labelings. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2005, v:77, n:, pp:- [Journal]
  5. Abdella Battou, Bilal Khan, Sean Mountcastle
    PNNI and the Optimal Design of High-speed ATM Networks. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 1999, v:23, n:3, pp:- [Journal]
  6. Abdella Battou, Bilal Khan, Sean Mountcastle
    PNNI And The Optimal Design Of High-Speed ATM Networks. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 1999, v:23, n:4, pp:- [Journal]
  7. Kiran R. Bhutani, Bilal Khan
    Optimal distribution of a hierarchy of network management agents. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2003, v:149, n:4, pp:235-248 [Journal]
  8. Abdella Battou, Bilal Khan, Daniel C. Lee, Spencer Marsh, Sean Mountcastle, David Talmage
    CASiNO: component architecture for simulating network objects. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2002, v:32, n:11, pp:1099-1128 [Journal]
  9. Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, Mohsen Guizani, Dionysios Kountanis
    Surrendering Autonomy: Can Cooperative Mobility Help? [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2007, pp:901-910 [Conf]
  10. Ghassen Ben Brahim, Ala I. Al-Fuqaha, Bilal Khan
    Multigrid techniques for movement planning in manets with cooperative mobility. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:197-201 [Conf]
  11. Ghassen Ben Brahim, Ala I. Al-Fuqaha, Dionysios Kountanis, Bilal Khan
    A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:158-163 [Conf]
  12. Ghassen Ben Brahim, Bilal Khan
    Budgeting power: packet duplication and bit error rate reduction in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:293-298 [Conf]
  13. Delaram Kahrobaei, Bilal Khan
    A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  14. Bilal Khan, Ghassen Ben Brahim, Ala I. Al-Fuqaha, Mohsen Guizani
    Minimizing Wireless Connection BER through the Dynamic Distribution of Budgeted Power. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  15. Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, Mohsen Guizani
    Harnessing the Parity of Multiple Errors in End-to-End MAC Schemes. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  16. Using ES Based Automated Software Clustering Approach to Achieve Consistent Decompositions. [Citation Graph (, )][DBLP]


  17. Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications. [Citation Graph (, )][DBLP]


  18. Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments. [Citation Graph (, )][DBLP]


  19. Scheduling cooperative emergency response: or how the meek shall overcome the greedy. [Citation Graph (, )][DBLP]


  20. Using a secure permutational covert channel to detect local and wide area interposition attacks. [Citation Graph (, )][DBLP]


  21. Balancing power: tradeoffs between connection lifetime and control traffic in MANETS. [Citation Graph (, )][DBLP]


  22. Using connection expansion to reduce control traffic in MANETs. [Citation Graph (, )][DBLP]


  23. Reconstruction of malicious internet flows. [Citation Graph (, )][DBLP]


  24. Only the short die old: route optimization in MANETs by dynamic subconnection shrinking. [Citation Graph (, )][DBLP]


  25. Using MILP for Optimal Movement Planning in MANETs with Cooperative Mobility. [Citation Graph (, )][DBLP]


  26. A Model for Cooperative Mobility and Budgeted QoS in MANETs with Heterogenous Autonomy Requirements. [Citation Graph (, )][DBLP]


  27. Bayesian-Based Game Theoretic Model to Guarantee Cooperativeness in Hybrid RF/FSO Mesh Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002