Search the dblp DataBase
Ayman I. Kayssi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
V. Chandramouli , Karem A. Sakallah , Ayman I. Kayssi Signal Delay in Coupled, Distributed RC Lines in the Presence of Temporal Proximity. [Citation Graph (0, 0)][DBLP ] ARVLSI, 1997, pp:32-46 [Conf ] Ayman Tajeddine , Ayman I. Kayssi , Ali Chehab , Hassan Artail PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:205-216 [Conf ] Jian Liu , Rafic Z. Makki , Ayman I. Kayssi Dynamic Power Supply Current Testing of SRAMs. [Citation Graph (0, 0)][DBLP ] Asian Test Symposium, 1998, pp:348-353 [Conf ] Najwa Aaraj , Anis Nazer , Ali Chehab , Ayman I. Kayssi Transient Current Testing of Dynamic CMOS Circuits. [Citation Graph (0, 0)][DBLP ] DFT, 2004, pp:264-271 [Conf ] Ayman I. Kayssi Macromodeling C- and RC-loaded CMOS inverters for timing analysis. [Citation Graph (0, 0)][DBLP ] Great Lakes Symposium on VLSI, 1996, pp:272-276 [Conf ] Ghada Derbas , Ayman I. Kayssi , Hassan Artail , Ali Chehab TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation. [Citation Graph (0, 0)][DBLP ] ICPS, 2004, pp:113-120 [Conf ] Ayman I. Kayssi , Karem A. Sakallah Macromodel Simplification Using Dimensional Analysis. [Citation Graph (0, 0)][DBLP ] ISCAS, 1994, pp:335-338 [Conf ] Ayman I. Kayssi , Houda Karaki , Wissam Abu-Khraybeh RTP-Based Caching of Streaming Media. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:1067-1071 [Conf ] Ayman I. Kayssi , Ali El-Haj-Mahmoud EmuNET: a real-time network emulator. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:357-362 [Conf ] Mohamad Eid , Hassan Artail , Ayman I. Kayssi , Ali Chehab Trends in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP ] Journal of Research and Practice in Information Technology, 2005, v:37, n:4, pp:- [Journal ] Wassim Itani , Ayman I. Kayssi SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:18, pp:1825-1839 [Journal ] Trevor N. Mudge , Richard B. Brown , William P. Bimingham , Jeffrey A. Dykstra , Ayman I. Kayssi , Ronald J. Lomax , Kunle Olukotun , Karem A. Sakallah , Raymond A. Milano The Design of a Microsupercomputer. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1991, v:24, n:1, pp:57-64 [Journal ] Joseph Samaha , Ayman I. Kayssi , Ralph Achkar , Mark Azar G3 Integrates Three System Technologies. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:10, pp:107-110 [Journal ] Ayman I. Kayssi , Karem A. Sakallah Timing models for gallium arsenide direct-coupled FET logic circuits. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 1995, v:14, n:3, pp:384-393 [Journal ] Camille Gaspard , Batoul Haidar , Ayman I. Kayssi , Ali Chehab SmartSSL: Efficient Policy-Based Web Security. [Citation Graph (0, 0)][DBLP ] AICCSA, 2007, pp:833-839 [Conf ] Lara Srour , Ayman I. Kayssi , Ali Chehab Personalized Web Page Ranking Using Trust and Similarity. [Citation Graph (0, 0)][DBLP ] AICCSA, 2007, pp:454-457 [Conf ] S. Itani , Najwa Aaraj , D. Abdelahad , Ayman I. Kayssi Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:95- [Conf ] Wassim Itani , Ayman I. Kayssi , Ali Chehab An enterprise policy-based security protocol for protecting relational database network objects. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:343-348 [Conf ] Wassim Itani , Camille Gaspard , Ayman I. Kayssi , Ali Chehab PRIDE: Policy-Driven Web Security for Handheld Wireless Devices. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Wassim Itani , Ayman I. Kayssi J2ME application-layer end-to-end security for m-commerce. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2004, v:27, n:1, pp:13-32 [Journal ] CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services. [Citation Graph (, )][DBLP ] A Privacy-Preserving Trust Model for VANETs. [Citation Graph (, )][DBLP ] Automated device for determination of skin lesion regions. [Citation Graph (, )][DBLP ] XPRIDE: Policy-Driven Web Services Security Based on XML Content. [Citation Graph (, )][DBLP ] Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain. [Citation Graph (, )][DBLP ] Fuzzy reputation-based trust model. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.301secs