Export 182 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Makdissy T, Gillard R, Fourn E, Girard E, Legay H.  2013.   Phase-Shifting Cell for Dual Linearly Polarized Reflectarrays With Reconfigurable Potentialities.
Makdissy T, Gillard R, Fourn E, Girard E, Legay H.  2012.   Phase-shifting cell loaded with variable capacitances for dual linearly polarised reflectarrays.
Makdissy T, Gillard R, Fourn E, Ferrando-Rocher M, Girard E, Legay H, Le Coq L.  2016.  Phoenix' reflectarray unit cell with reduced size and inductive loading.
Valerio G, Ettorre M, Makdissy T, Sauleau R.  2015.  Physical optics modeling of a pillbox as a beam forming network for a large imaging system in satellite communications. Radio Science Meeting (Joint with AP-S Symposium), 2015 USNC-URSI.
Asmar JAL, Kouta R, Chaccour K, Assad JEL, Laghrouche S, Eid E, Wack M.  2015.  Power Generation and Cogeneration Management Algorithm with Renewable Energy Integration. Energy Procedia. 74:1394–1401.
Youssef M, Doumith E A, Gagnaire M.  2011.  Power-aware multi-rate WDM network design under static/dynamic traffic. Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE.
AL Bouna B, Clifton C, Malluhi Q.  2011.  Preserving Privacy from Unsafe Data Correlation. Qatar Foundation Annual Research Forum Proceedings. :CSP9.
Raad E, AL Bouna B, Chbeir R.  2015.  Preventing sensitive relationships disclosure for better social media preservation. International Journal of Information Security. :1–22.
Saad S, AL Bouna B, Chbeir R.  2011.  Privacy preserving via tree augmented na{\"ıve Bayesian classifier in multimedia database. Proceedings of the International Conference on Management of Emergent Digital EcoSystems. :297–304.
Abdo JBou, Demerjian J, Chaouchi H, Atechian T, Bassil C.  2015.  Privacy using mobile cloud computing. Digital Information and Communication Technology and its Applications (DICTAP), 2015 Fifth International Conference on. :178–182.
[Anonymous].  2015.  Proceedings of the Workshops of the {EDBT/ICDT} 2015 Joint Conference (EDBT/ICDT), Brussels, Belgium, March 27th, 2015. {CEUR} Workshop Proceedings. 1330
Atechian T.  2010.  Protocole de routage géo-multipoint hybride et mécanisme d’acheminement de données pour les réseaux ad hoc de véhicules (VANETs).
Q
Roullard J., Capraro S., Eid E, Cadix L., Bermond C., Lacrevaz T., Farcy A., Flechet B..  2011.  Quality factor and frequency bandwidth of 2D self-inductors in 3D integration stacks. Microelectronic Engineering. 88:734-738.
R
Habib C, Makhoul A, Darazi R, Couturier R.  2017.  Real-time sampling rate adaptation based on continuous risk level evaluation in wireless body sensor networks. 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
Koussaifi M, Habib C, Makhoul A.  2018.  Real-time stress evaluation using wireless body sensor networks. Wireless Days (WD), 2018.
Legay H, Girard E, Bresciani D, Gillard R, Salti H, Makdissy T, Fourn E.  2013.  Reconfigurable radiating phase-shifter cell based on resonances, slots and complementary microstrips.
Legay H, Girard E, Bresciani D, Gillard R, Salti H, Makdissy T, Fourn E.  2017.  Reconfigurable radiating phase-shifting cell based on complementary slot and microstrip resonances.
Ghobril P, Atechian T, Darazi R.  2013.  Recyclage Logique. Pertinence. :35–49.
Aoun R, Doumith E A, Gagnaire M.  2010.  Resource provisioning for enriched services in cloud environment. Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on.
Foulonneau M, Ras E, E Zeid A, Atechian T.  2013.  Reusing textual resources in educational assessment: adding text readability metrics to learning metadata. Dublin Core conference.
Zeid EAbou, Foulonneau M, Atechian T.  2012.  Réutiliser des textes dans un contexte éducatif. Document numérique. 15:119–142.
Weng L, Darazi R, Preneel B, Macq B\^ıt, Dooms A.  2012.  Robust image content authentication using perceptual hashing and watermarking. Pacific-Rim Conference on Multimedia.
S
Darazi R, Callau P, Macq B\^ıt.  2009.  Secure and HVS-adaptive exhibition spread transform dither modulation watermarking for digital cinema. 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
Nassar M, AL Bouna B, Malluhi Q.  2013.  Secure outsourcing of network flow data analysis. Big Data (BigData Congress), 2013 IEEE International Congress On. :431–432.
Chbeir R, AL Bouna B.  2013.  Security and privacy preserving in social networks.

Pages