Export 38 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Azar J, Darazi R, Habib C, Makhoul A, Demerjian J.  2018.  Using DWT Lifting Scheme for Lossless Data Compression in Wireless Body Sensor Networks. 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
Awada A., Bou Issa Y, Ghannam C., Tekli J., Chbeir R..  2012.  Towards Digital Image Accessibility for Blind Users Via Vibrating Touch Screen: A Feasibility Test Protocol. Signal Image Technology and Internet Based Systems (SITIS), 2012 Eighth International Conference on.
Awada A, Bou Issa Y, Tekli J, Chbeir R.  2013.  Evaluation of Touch Screen Vibration Accessibility for Blind Users. Proceedings of the 15th International ACM SIGACCESS Conference on Computers and Accessibility.
Atechian T, Brunie L.  2008.  DG-CastoR for query packets dissemination in VANET. 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
Atechian T.  2010.  Protocole de routage géo-multipoint hybride et mécanisme d’acheminement de données pour les réseaux ad hoc de véhicules (VANETs).
Atechian T, Torbey Z, Bennani N, Brunie L.  2009.  CoFFee: Cooperative and inFrastructure-Free peer-to-peer system for VANET. Intelligent Transport Systems Telecommunications,(ITST), 2009 9th International Conference on.
Asmar JAL, Kouta R, Chaccour K, Assad JEL, Laghrouche S, Eid E, Wack M.  2015.  Power Generation and Cogeneration Management Algorithm with Renewable Energy Integration. Energy Procedia. 74:1394–1401.
Aoun R, Doumith E A, Gagnaire M.  2010.  Resource provisioning for enriched services in cloud environment. Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on.
Aoun R, Abosi CE, Doumith E A, Nejabati R, Gagnaire M, Simeonidou D.  2013.  Towards an optimized abstracted topology design in cloud environment. Future Generation Computer Systems. 29:46–60.
Alkhalifeh K, Sarkis R, Craeye C.  2013.  Wheel-of-time array devoted to near-field imaging applications. Electromagnetics in Advanced Applications (ICEAA), 2013 International Conference on.
Alkhalifeh K, Sarkis R, Craeye C.  2012.  Design of a novel 3D circular Vivaldi antennas array for ultra-wideband near-field radar imaging. 2012 6th European Conference on Antennas and Propagation (EUCAP).
Al-Rifai A, Boyajian T.  2015.  Characterization of thin magnetic materials for high frequency applications. Digital Information and Communication Technology and its Applications (DICTAP), 2015 Fifth International Conference on. :190–194.
Al Zahr S, Doumith E A, Gagnaire M.  2011.  An exact approach for translucent WDM network design considering scheduled lightpath demands. Telecommunications (ICT), 2011 18th International Conference on.
Al Zahr S, Doumith E A, Forestier P.  2017.  Advanced Demand Response Considering Modular and Deferrable Loads Under Time-Variable Rates. IEEE Global Communications Conference (GLOBECOM).
AL Bouna B, Clifton C, Malluhi QM.  2015.  Efficient Sanitization of Unsafe Data Correlations. Proceedings of the Workshops of the {EDBT/ICDT} 2015 Joint Conference (EDBT/ICDT), Brussels, Belgium, March 27th, 2015.. :278–285.
AL Bouna B, Chbeir R, Marrara S.  2009.  Enforcing role based access control model with multimedia signatures. Journal of Systems Architecture. 55:264–274.
AL Bouna B, Chbeir R, Gabillon A, Capolsini P.  2012.  A fine-grained image access control model. Signal Image Technology and Internet Based Systems (SITIS), 2012 Eighth International Conference on. :603–612.
AL Bouna B, Couchot J-F, Couturier R, Fadil YAhmed, Guyeux C.  2015.  Performance Study of Steganalysis Techniques. Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on.
AL Bouna B, Chbeir R.  2006.  Multimedia-based authorization and access control policy specification. Proceedings of the 3rd ACM workshop on Secure web services. :61–68.
AL Bouna B, Raad EJ, Chbeir R, Elia C, Haraty R.  2015.  Anonymizing multimedia documents. World Wide Web. :1–21.
AL Bouna B, Clifton C, Malluhi Q.  2011.  Preserving Privacy from Unsafe Data Correlation. Qatar Foundation Annual Research Forum Proceedings. :CSP9.
AL Bouna B, Clifton C, Malluhi Q.  2015.  Anonymizing transactional datasets. Journal of Computer Security. 23:89–106.
AL Bouna B, Chbeir R.  2009.  Detecting inference channels in private multimedia data via social networks. Data and Applications Security XXIII. :208–224.
AL Bouna B, Raad EJ, Elia C, Chbeir R, Haraty R.  2013.  De-linkability: A privacy-preserving constraint for safely outsourcing multimedia documents. Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems. :68–75.
AL Bouna B, Chbeir R, Gabillon A.  2011.  The image protector-a flexible security rule specification toolkit. Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on. :345–350.

Pages