Search the dblp DataBase
Sheikh Iqbal Ahamed :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sheikh Iqbal Ahamed , Mohammad Zulkernine , Suresh Anamanamuri A Dependable Device Discovery Approach for Pervasive Computing Middleware. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:66-73 [Conf ] Darrel A. Mazzari , Patrick Seraphine , Sheikh Iqbal Ahamed , Sreekanth G. Balasubramanian Design and Implementation of EPARK Wireless Parking Payment System Using Pervasive Computing. [Citation Graph (0, 0)][DBLP ] AINA Workshops (2), 2007, pp:219-224 [Conf ] Anahita Vyas , Sheikh Iqbal Ahamed , Munirul M. Haque , Madhavi V. S. Jayanthi A Robust Lightweight Solution for RFID Security. [Citation Graph (0, 0)][DBLP ] AINA Workshops (2), 2007, pp:182-187 [Conf ] Shameem Ahmed , Moushumi Sharmin , Sheikh Iqbal Ahamed PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:17-18 [Conf ] Sheikh Iqbal Ahamed Model for Global Software Engineering Project Life Cycle and How to Use it in Classroom for Preparing Our Students for the Globalization. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:59-60 [Conf ] Moushumi Sharmin , Sheikh Iqbal Ahamed , Shameem Ahmed , Haifeng Li SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:67-70 [Conf ] Sheikh Iqbal Ahamed , Avinash Vyas Challenges in Monitoring Sensor Networks and a Solution Framework. [Citation Graph (0, 0)][DBLP ] ESA/VLSI, 2004, pp:106-112 [Conf ] Shameem Ahmed , Moushumi Sharmin , Sheikh Iqbal Ahamed Knowledge Usability and its Characteristics for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] PSC, 2005, pp:206-0 [Conf ] Sheikh Iqbal Ahamed , Avinash Vyas , Mohammad Zulkernine Towards Developing Sensor Networks Monitoring as a Middleware Service. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2004, pp:465-471 [Conf ] Munirul M. Haque , Sheikh Iqbal Ahamed m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2006, pp:189-195 [Conf ] Mohammad M. Molla , Sheikh Iqbal Ahamed A Survey of Middleware for Sensor Network and Challenges. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2006, pp:223-228 [Conf ] Sheikh Iqbal Ahamed , Sanjay Vallecha Towards the Design and Implementation of Embedded Database for Pervasive Computing Applications. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2004, pp:862-870 [Conf ] Paula Stroud , Sheikh Iqbal Ahamed A Survey on Current and Future Pervasive Computing Devices and Applications. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2004, pp:887-890 [Conf ] Stephen S. Yau , Sheikh Iqbal Ahamed An Approach to Developing Information Dissemination Service for Ubiquitous Computing Applications. [Citation Graph (0, 0)][DBLP ] ISADS, 2003, pp:240-0 [Conf ] Sheikh Iqbal Ahamed Experiences in Teaching an Object-oriented Design and Data Structure Course. [Citation Graph (0, 0)][DBLP ] ITCC, 2003, pp:48-52 [Conf ] Sheikh Iqbal Ahamed A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping Experience. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:218-222 [Conf ] Sheikh Iqbal Ahamed , Alex Pezewski , Al Pezewski Towards Framework Selection Criteria and Suitability for an Application Framework. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:424-0 [Conf ] Sheikh Iqbal Ahamed , Sanjay Vallecha Component-based Embedded Database for Mobile Embedded Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:534-538 [Conf ] Pradeep Kannadiga , Mohammad Zulkernine , Sheikh Iqbal Ahamed Towards an Intrusion Detection System for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:277-282 [Conf ] Moushumi Sharmin , Shameem Ahmed , Sheikh Iqbal Ahamed SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) inPervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:271-276 [Conf ] Moushumi Sharmin , Shameem Ahmed , Sheikh Iqbal Ahamed MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:306-313 [Conf ] Sheikh Iqbal Ahamed , Munirul M. Haque , K. M. Ibrahim Asif S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:303-310 [Conf ] Moushumi Sharmin , Shameem Ahmed , Sheikh Iqbal Ahamed An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] PerCom, 2006, pp:258-263 [Conf ] Moushumi Sharmin , Shameem Ahmed , Sheikh Iqbal Ahamed Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing). [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:1013-1017 [Conf ] Sheikh Iqbal Ahamed , Munirul M. Haque , Karl Stamm , Ahmed J. Khan Wellness assistant: a virtual wellness assistant using pervasive computing. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:782-787 [Conf ] Shameem Ahmed , Sheikh Iqbal Ahamed , Moushumi Sharmin , Munirul M. Haque Self-healing for autonomic pervasive computing. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:110-111 [Conf ] Shameem Ahmed , Moushumi Sharmin , Sheikh Iqbal Ahamed A Smart Meeting Room with Pervasive Computing Technologies. [Citation Graph (0, 0)][DBLP ] SNPD, 2005, pp:366-371 [Conf ] Sheikh Iqbal Ahamed , Moushumi Sharmin , Shameem Ahmed , Munirul M. Haque , Ahmed J. Khan Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies. [Citation Graph (0, 0)][DBLP ] Elektrotechnik und Informationstechnik, 2006, v:123, n:4, pp:112-120 [Journal ] K. M. Ibrahim Asif , Sheikh Iqbal Ahamed , Nilothpal Talukder Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2007, pp:269-274 [Conf ] Munirul M. Haque , Sheikh Iqbal Ahamed , Haifeng Li , K. M. Ibrahim Asif An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2007, pp:57-64 [Conf ] Munirul M. Haque , Sheikh Iqbal Ahamed An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2007, pp:49-56 [Conf ] Vaibhav Tyagi , Sheikh Iqbal Ahamed Co-learn: Collaborative Learning Engine a Vision for Pervasive Collaboration in E-Learning. [Citation Graph (0, 0)][DBLP ] HCI (7), 2007, pp:833-842 [Conf ] Rezwan Islam , Sheikh Iqbal Ahamed , Nilothpal Talukder , Ian Obermiller Usability of Mobile Computing Technologies to Assist Cancer Patients. [Citation Graph (0, 0)][DBLP ] USAB, 2007, pp:227-240 [Conf ] Sheikh Iqbal Ahamed , Mohammad Zulkernine , Steve Wolfe A software-based trust framework for distributed industrial management systems. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:10, pp:1621-1630 [Journal ] Privacy in Pervasive Computing and Open Issues. [Citation Graph (, )][DBLP ] Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. [Citation Graph (, )][DBLP ] A Trust Framework for Pervasive Computing Environments. [Citation Graph (, )][DBLP ] WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive Environment. [Citation Graph (, )][DBLP ] FPCS: A Formal Approach for Privacy-Aware Context-Based Services. [Citation Graph (, )][DBLP ] STPSA 2008 Workshop Organization. [Citation Graph (, )][DBLP ] Message from the STPSA 2008 Workshop Organizers. [Citation Graph (, )][DBLP ] ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. [Citation Graph (, )][DBLP ] A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. [Citation Graph (, )][DBLP ] Towards Secure Trust Bootstrapping in Pervasive Computing Environment. [Citation Graph (, )][DBLP ] Towards Universal Access to Home Monitoring for Assisted Living Environment. [Citation Graph (, )][DBLP ] Smart Tracker: Light Weight Infrastructure-less Assets Tracking solution for Ubiquitous Computing Environment. [Citation Graph (, )][DBLP ] Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment. [Citation Graph (, )][DBLP ] A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing. [Citation Graph (, )][DBLP ] An XML Based Access Control Architecture for Pervasive Computing. [Citation Graph (, )][DBLP ] An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments. [Citation Graph (, )][DBLP ] Message from the Workshop Co-Organizers. [Citation Graph (, )][DBLP ] CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. [Citation Graph (, )][DBLP ] Ubicomp secretary: a web service based ubiquitous computing application. [Citation Graph (, )][DBLP ] Secured tag identification using EDSA (enhanced distributed scalable architecture). [Citation Graph (, )][DBLP ] CAT: a context-aware trust model for open and dynamic systems. [Citation Graph (, )][DBLP ] Special track on Middleware Engineering (ME): editorial message. [Citation Graph (, )][DBLP ] Service sharing with trust in pervasive environment: now it's time to break the jinx. [Citation Graph (, )][DBLP ] Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. [Citation Graph (, )][DBLP ] Towards a landmark influence framework to protect location privacy. [Citation Graph (, )][DBLP ] Towards developing a trust-based security solution. [Citation Graph (, )][DBLP ] S-search: finding RFID tags using scalable and secure search protocol. [Citation Graph (, )][DBLP ] Mobile intelligent interruptions management (MIIM): a context aware unavailability system. [Citation Graph (, )][DBLP ] Computational thinking for the sciences: a three day workshop for high school science teachers. [Citation Graph (, )][DBLP ] Preventing multi-query attack in location-based services. [Citation Graph (, )][DBLP ] A trust-based secure service discovery (TSSD) model for pervasive computing. [Citation Graph (, )][DBLP ] Search in 0.045secs, Finished in 0.050secs