The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sheikh Iqbal Ahamed: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri
    A Dependable Device Discovery Approach for Pervasive Computing Middleware. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:66-73 [Conf]
  2. Darrel A. Mazzari, Patrick Seraphine, Sheikh Iqbal Ahamed, Sreekanth G. Balasubramanian
    Design and Implementation of EPARK Wireless Parking Payment System Using Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:219-224 [Conf]
  3. Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi
    A Robust Lightweight Solution for RFID Security. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:182-187 [Conf]
  4. Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed
    PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:17-18 [Conf]
  5. Sheikh Iqbal Ahamed
    Model for Global Software Engineering Project Life Cycle and How to Use it in Classroom for Preparing Our Students for the Globalization. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:59-60 [Conf]
  6. Moushumi Sharmin, Sheikh Iqbal Ahamed, Shameem Ahmed, Haifeng Li
    SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:67-70 [Conf]
  7. Sheikh Iqbal Ahamed, Avinash Vyas
    Challenges in Monitoring Sensor Networks and a Solution Framework. [Citation Graph (0, 0)][DBLP]
    ESA/VLSI, 2004, pp:106-112 [Conf]
  8. Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed
    Knowledge Usability and its Characteristics for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    PSC, 2005, pp:206-0 [Conf]
  9. Sheikh Iqbal Ahamed, Avinash Vyas, Mohammad Zulkernine
    Towards Developing Sensor Networks Monitoring as a Middleware Service. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:465-471 [Conf]
  10. Munirul M. Haque, Sheikh Iqbal Ahamed
    m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2006, pp:189-195 [Conf]
  11. Mohammad M. Molla, Sheikh Iqbal Ahamed
    A Survey of Middleware for Sensor Network and Challenges. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2006, pp:223-228 [Conf]
  12. Sheikh Iqbal Ahamed, Sanjay Vallecha
    Towards the Design and Implementation of Embedded Database for Pervasive Computing Applications. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:862-870 [Conf]
  13. Paula Stroud, Sheikh Iqbal Ahamed
    A Survey on Current and Future Pervasive Computing Devices and Applications. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:887-890 [Conf]
  14. Stephen S. Yau, Sheikh Iqbal Ahamed
    An Approach to Developing Information Dissemination Service for Ubiquitous Computing Applications. [Citation Graph (0, 0)][DBLP]
    ISADS, 2003, pp:240-0 [Conf]
  15. Sheikh Iqbal Ahamed
    Experiences in Teaching an Object-oriented Design and Data Structure Course. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:48-52 [Conf]
  16. Sheikh Iqbal Ahamed
    A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping Experience. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:218-222 [Conf]
  17. Sheikh Iqbal Ahamed, Alex Pezewski, Al Pezewski
    Towards Framework Selection Criteria and Suitability for an Application Framework. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:424-0 [Conf]
  18. Sheikh Iqbal Ahamed, Sanjay Vallecha
    Component-based Embedded Database for Mobile Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:534-538 [Conf]
  19. Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed
    Towards an Intrusion Detection System for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:277-282 [Conf]
  20. Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed
    SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) inPervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:271-276 [Conf]
  21. Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed
    MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:306-313 [Conf]
  22. Sheikh Iqbal Ahamed, Munirul M. Haque, K. M. Ibrahim Asif
    S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:303-310 [Conf]
  23. Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed
    An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    PerCom, 2006, pp:258-263 [Conf]
  24. Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed
    Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing). [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1013-1017 [Conf]
  25. Sheikh Iqbal Ahamed, Munirul M. Haque, Karl Stamm, Ahmed J. Khan
    Wellness assistant: a virtual wellness assistant using pervasive computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:782-787 [Conf]
  26. Shameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque
    Self-healing for autonomic pervasive computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:110-111 [Conf]
  27. Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed
    A Smart Meeting Room with Pervasive Computing Technologies. [Citation Graph (0, 0)][DBLP]
    SNPD, 2005, pp:366-371 [Conf]
  28. Sheikh Iqbal Ahamed, Moushumi Sharmin, Shameem Ahmed, Munirul M. Haque, Ahmed J. Khan
    Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies. [Citation Graph (0, 0)][DBLP]
    Elektrotechnik und Informationstechnik, 2006, v:123, n:4, pp:112-120 [Journal]
  29. K. M. Ibrahim Asif, Sheikh Iqbal Ahamed, Nilothpal Talukder
    Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:269-274 [Conf]
  30. Munirul M. Haque, Sheikh Iqbal Ahamed, Haifeng Li, K. M. Ibrahim Asif
    An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:57-64 [Conf]
  31. Munirul M. Haque, Sheikh Iqbal Ahamed
    An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:49-56 [Conf]
  32. Vaibhav Tyagi, Sheikh Iqbal Ahamed
    Co-learn: Collaborative Learning Engine a Vision for Pervasive Collaboration in E-Learning. [Citation Graph (0, 0)][DBLP]
    HCI (7), 2007, pp:833-842 [Conf]
  33. Rezwan Islam, Sheikh Iqbal Ahamed, Nilothpal Talukder, Ian Obermiller
    Usability of Mobile Computing Technologies to Assist Cancer Patients. [Citation Graph (0, 0)][DBLP]
    USAB, 2007, pp:227-240 [Conf]
  34. Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steve Wolfe
    A software-based trust framework for distributed industrial management systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:10, pp:1621-1630 [Journal]

  35. Privacy in Pervasive Computing and Open Issues. [Citation Graph (, )][DBLP]


  36. Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  37. A Trust Framework for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  38. WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive Environment. [Citation Graph (, )][DBLP]


  39. FPCS: A Formal Approach for Privacy-Aware Context-Based Services. [Citation Graph (, )][DBLP]


  40. STPSA 2008 Workshop Organization. [Citation Graph (, )][DBLP]


  41. Message from the STPSA 2008 Workshop Organizers. [Citation Graph (, )][DBLP]


  42. ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. [Citation Graph (, )][DBLP]


  43. A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. [Citation Graph (, )][DBLP]


  44. Towards Secure Trust Bootstrapping in Pervasive Computing Environment. [Citation Graph (, )][DBLP]


  45. Towards Universal Access to Home Monitoring for Assisted Living Environment. [Citation Graph (, )][DBLP]


  46. Smart Tracker: Light Weight Infrastructure-less Assets Tracking solution for Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]


  47. Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment. [Citation Graph (, )][DBLP]


  48. A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing. [Citation Graph (, )][DBLP]


  49. An XML Based Access Control Architecture for Pervasive Computing. [Citation Graph (, )][DBLP]


  50. An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments. [Citation Graph (, )][DBLP]


  51. Message from the Workshop Co-Organizers. [Citation Graph (, )][DBLP]


  52. CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. [Citation Graph (, )][DBLP]


  53. Ubicomp secretary: a web service based ubiquitous computing application. [Citation Graph (, )][DBLP]


  54. Secured tag identification using EDSA (enhanced distributed scalable architecture). [Citation Graph (, )][DBLP]


  55. CAT: a context-aware trust model for open and dynamic systems. [Citation Graph (, )][DBLP]


  56. Special track on Middleware Engineering (ME): editorial message. [Citation Graph (, )][DBLP]


  57. Service sharing with trust in pervasive environment: now it's time to break the jinx. [Citation Graph (, )][DBLP]


  58. Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. [Citation Graph (, )][DBLP]


  59. Towards a landmark influence framework to protect location privacy. [Citation Graph (, )][DBLP]


  60. Towards developing a trust-based security solution. [Citation Graph (, )][DBLP]


  61. S-search: finding RFID tags using scalable and secure search protocol. [Citation Graph (, )][DBLP]


  62. Mobile intelligent interruptions management (MIIM): a context aware unavailability system. [Citation Graph (, )][DBLP]


  63. Computational thinking for the sciences: a three day workshop for high school science teachers. [Citation Graph (, )][DBLP]


  64. Preventing multi-query attack in location-based services. [Citation Graph (, )][DBLP]


  65. A trust-based secure service discovery (TSSD) model for pervasive computing. [Citation Graph (, )][DBLP]


Search in 0.045secs, Finished in 0.050secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002