The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ayman I. Kayssi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. V. Chandramouli, Karem A. Sakallah, Ayman I. Kayssi
    Signal Delay in Coupled, Distributed RC Lines in the Presence of Temporal Proximity. [Citation Graph (0, 0)][DBLP]
    ARVLSI, 1997, pp:32-46 [Conf]
  2. Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail
    PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:205-216 [Conf]
  3. Jian Liu, Rafic Z. Makki, Ayman I. Kayssi
    Dynamic Power Supply Current Testing of SRAMs. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 1998, pp:348-353 [Conf]
  4. Najwa Aaraj, Anis Nazer, Ali Chehab, Ayman I. Kayssi
    Transient Current Testing of Dynamic CMOS Circuits. [Citation Graph (0, 0)][DBLP]
    DFT, 2004, pp:264-271 [Conf]
  5. Ayman I. Kayssi
    Macromodeling C- and RC-loaded CMOS inverters for timing analysis. [Citation Graph (0, 0)][DBLP]
    Great Lakes Symposium on VLSI, 1996, pp:272-276 [Conf]
  6. Ghada Derbas, Ayman I. Kayssi, Hassan Artail, Ali Chehab
    TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation. [Citation Graph (0, 0)][DBLP]
    ICPS, 2004, pp:113-120 [Conf]
  7. Ayman I. Kayssi, Karem A. Sakallah
    Macromodel Simplification Using Dimensional Analysis. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:335-338 [Conf]
  8. Ayman I. Kayssi, Houda Karaki, Wissam Abu-Khraybeh
    RTP-Based Caching of Streaming Media. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1067-1071 [Conf]
  9. Ayman I. Kayssi, Ali El-Haj-Mahmoud
    EmuNET: a real-time network emulator. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:357-362 [Conf]
  10. Mohamad Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab
    Trends in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2005, v:37, n:4, pp:- [Journal]
  11. Wassim Itani, Ayman I. Kayssi
    SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:18, pp:1825-1839 [Journal]
  12. Trevor N. Mudge, Richard B. Brown, William P. Bimingham, Jeffrey A. Dykstra, Ayman I. Kayssi, Ronald J. Lomax, Kunle Olukotun, Karem A. Sakallah, Raymond A. Milano
    The Design of a Microsupercomputer. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1991, v:24, n:1, pp:57-64 [Journal]
  13. Joseph Samaha, Ayman I. Kayssi, Ralph Achkar, Mark Azar
    G3 Integrates Three System Technologies. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:10, pp:107-110 [Journal]
  14. Ayman I. Kayssi, Karem A. Sakallah
    Timing models for gallium arsenide direct-coupled FET logic circuits. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1995, v:14, n:3, pp:384-393 [Journal]
  15. Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab
    SmartSSL: Efficient Policy-Based Web Security. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:833-839 [Conf]
  16. Lara Srour, Ayman I. Kayssi, Ali Chehab
    Personalized Web Page Ranking Using Trust and Similarity. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:454-457 [Conf]
  17. S. Itani, Najwa Aaraj, D. Abdelahad, Ayman I. Kayssi
    Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:95- [Conf]
  18. Wassim Itani, Ayman I. Kayssi, Ali Chehab
    An enterprise policy-based security protocol for protecting relational database network objects. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:343-348 [Conf]
  19. Wassim Itani, Camille Gaspard, Ayman I. Kayssi, Ali Chehab
    PRIDE: Policy-Driven Web Security for Handheld Wireless Devices. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  20. Wassim Itani, Ayman I. Kayssi
    J2ME application-layer end-to-end security for m-commerce. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2004, v:27, n:1, pp:13-32 [Journal]

  21. CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services. [Citation Graph (, )][DBLP]


  22. A Privacy-Preserving Trust Model for VANETs. [Citation Graph (, )][DBLP]


  23. Automated device for determination of skin lesion regions. [Citation Graph (, )][DBLP]


  24. XPRIDE: Policy-Driven Web Services Security Based on XML Content. [Citation Graph (, )][DBLP]


  25. Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain. [Citation Graph (, )][DBLP]


  26. Fuzzy reputation-based trust model. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.301secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002