Export 38 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Azar J, Darazi R, Habib C, Makhoul A, Demerjian J.  2018.  Using DWT Lifting Scheme for Lossless Data Compression in Wireless Body Sensor Networks. 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
Awada A, Bou Issa Y, Tekli J, Chbeir R.  2013.  Evaluation of Touch Screen Vibration Accessibility for Blind Users. Proceedings of the 15th International ACM SIGACCESS Conference on Computers and Accessibility.
Awada A., Bou Issa Y, Ghannam C., Tekli J., Chbeir R..  2012.  Towards Digital Image Accessibility for Blind Users Via Vibrating Touch Screen: A Feasibility Test Protocol. Signal Image Technology and Internet Based Systems (SITIS), 2012 Eighth International Conference on.
Atechian T, Torbey Z, Bennani N, Brunie L.  2009.  CoFFee: Cooperative and inFrastructure-Free peer-to-peer system for VANET. Intelligent Transport Systems Telecommunications,(ITST), 2009 9th International Conference on.
Atechian T, Brunie L.  2008.  DG-CastoR for query packets dissemination in VANET. 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
Atechian T.  2010.  Protocole de routage géo-multipoint hybride et mécanisme d’acheminement de données pour les réseaux ad hoc de véhicules (VANETs).
Asmar JAL, Kouta R, Chaccour K, Assad JEL, Laghrouche S, Eid E, Wack M.  2015.  Power Generation and Cogeneration Management Algorithm with Renewable Energy Integration. Energy Procedia. 74:1394–1401.
Aoun R, Abosi CE, Doumith E A, Nejabati R, Gagnaire M, Simeonidou D.  2013.  Towards an optimized abstracted topology design in cloud environment. Future Generation Computer Systems. 29:46–60.
Aoun R, Doumith E A, Gagnaire M.  2010.  Resource provisioning for enriched services in cloud environment. Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on.
Alkhalifeh K, Sarkis R, Craeye C.  2012.  Design of a novel 3D circular Vivaldi antennas array for ultra-wideband near-field radar imaging. 2012 6th European Conference on Antennas and Propagation (EUCAP).
Alkhalifeh K, Sarkis R, Craeye C.  2013.  Wheel-of-time array devoted to near-field imaging applications. Electromagnetics in Advanced Applications (ICEAA), 2013 International Conference on.
Al-Rifai A, Boyajian T.  2015.  Characterization of thin magnetic materials for high frequency applications. Digital Information and Communication Technology and its Applications (DICTAP), 2015 Fifth International Conference on. :190–194.
Al Zahr S, Doumith E A, Gagnaire M.  2011.  An exact approach for translucent WDM network design considering scheduled lightpath demands. Telecommunications (ICT), 2011 18th International Conference on.
Al Zahr S, Doumith E A, Forestier P.  2017.  Advanced Demand Response Considering Modular and Deferrable Loads Under Time-Variable Rates. IEEE Global Communications Conference (GLOBECOM).
AL Bouna B, Raad EJ, Elia C, Chbeir R, Haraty R.  2013.  De-linkability: A privacy-preserving constraint for safely outsourcing multimedia documents. Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems. :68–75.
AL Bouna B, Chbeir R, Gabillon A.  2011.  The image protector-a flexible security rule specification toolkit. Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on. :345–350.
AL Bouna B, Chbeir R.  2008.  MC SE: a multimedia context-based security engine. Proceedings of the 11th international conference on Extending database technology: Advances in database technology. :705–709.
AL Bouna B, Chbeir R, Gabillon A, Capolsini P.  2013.  A Flexible Image-Based Access Control Model for Social Networks. Security and Privacy Preserving in Social Networks. :337–364.
AL Bouna B, Chbeir R.  2008.  Content-based policy specification for multimedia authorization and access control model. Cyber Warfare and Cyber Terrorism. :345–357.
AL Bouna B, Chbeir R, Miteran J.  2007.  Mca2cm: Multimedia context-aware access control model. Intelligence and Security Informatics, 2007 IEEE. :115–123.
AL Bouna B, Clifton C, Malluhi Q.  2013.  Using safety constraint for transactional dataset anonymization. Data and Applications Security and Privacy XXVII. :164–178.
AL Bouna B, Chbeir R, Marrara S.  2007.  A multimedia access control language for virtual and ambient intelligence environments. Proceedings of the 2007 ACM workshop on Secure web services. :111–120.
AL Bouna B, Clifton C, Malluhi QM.  2015.  Efficient Sanitization of Unsafe Data Correlations. Proceedings of the Workshops of the {EDBT/ICDT} 2015 Joint Conference (EDBT/ICDT), Brussels, Belgium, March 27th, 2015.. :278–285.
AL Bouna B, Chbeir R, Marrara S.  2009.  Enforcing role based access control model with multimedia signatures. Journal of Systems Architecture. 55:264–274.
AL Bouna B, Chbeir R, Gabillon A, Capolsini P.  2012.  A fine-grained image access control model. Signal Image Technology and Internet Based Systems (SITIS), 2012 Eighth International Conference on. :603–612.

Pages