92 results on '"Haqiq, Abdelkrim"'
Search Results
2. A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism
3. Performance evaluation and tuning of an IEEE 802.11 audio video multicast collision prevention mechanism
4. Toward an integrated dynamic defense system for strategic detecting attacks in cloud networks using stochastic game
5. Perform sensing and transmission in parallel in cognitive radio systems: Spectrum and energy efficiency
6. Continuous transmit in cognitive radio systems: outage performance of selection decode-and-forward relay networks over Nakagami-m fading channels
7. A Stochastic Game Analysis of the Binary Exponential Backoff Algorithm with Multi-Power Diversity and Transmission Cost
8. Smart Farming System Based on Intelligent Internet of Things and Predictive Analytics.
9. Accurate Analytical Model and Evaluation of Wi-Fi Halow Based IoT Networks under a Rayleigh-Fading Channel with Capture.
10. Enhancing the Effectiveness of COVID-19 Bluetooth-Based Contact Tracing Apps: A Modeling Study.
11. Blind Handover Detection based on KLD: Channel Capacity and Outage Probability Estimations for Rice and Nakagami Models.
12. Dynamic resource allocation for service in mobile cloud computing with Markov modulated arrivals.
13. Feature matching for 3D AR: Review from handcrafted methods to deep learning.
14. Three-dimensional Markov Chain Model to Help Reduce the Spread of COVID-19 in IoT Environment.
15. Enhanced Pricing Strategy for Slotted ALOHA with ZigZag Decoding: A Stochastic Game Approach.
16. Enhanced Solid-Flow: An Enhanced Flow Rules Security Mechanism for SDN.
17. Predicting the Route of the Longest Lifetime and the Data Packet Delivery Time between Two Vehicles in VANET.
18. Solving the travelling salesman problem using fuzzy and simplified variants of ant supervised by PSO with local search policy, FAS-PSO-LS, SAS-PSO-LS.
19. Contribution of New Technologies in the Relationship Between the Governance and the Social Responsibility at the Moroccan University.
20. An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing.
21. Mathematical Model based on Game Theory and Markov Chains for Analysing the Transmission Cost in SA-ZD Mechanism.
22. Predicting the longest route lifetime as the most stable route between two vehicles in VANET.
23. SDN-based SYN Flooding Defense in Cloud.
24. Beyond Dynamic Programming: Performance Evaluation and Enhancement of Multi-tenant Cloud Infrastructures.
25. Modeling a Sandbox Security Mechanism in Cloud Computing Environment using Bayesian Game.
26. Information system at the Moroccan University: A business intelligence tool for management and communication of scientific research.
27. Defining and Evaluating A Novel Penalty Model for Managing Violations in the Cloud Computing.
28. Comparative study of simulators for cloud computing.
29. Adopting a clustering approach toward a scalable IaaS cloud datacenters.
30. Combining multi-agent systems and MDE approach for monitoring SLA violations in the Cloud Computing.
31. Fairness and differentiation of services in wireless mesh network.
32. Practical modeling of the SLA life cycle in Cloud Computing.
33. Security modeling and analysis of a self-cleansing intrusion tolerance technique.
34. MASAT: Model-based automated security assessment tool for cloud computing.
35. Continuous-transmit in cognitive radio systems: Spectrum and energy efficiency.
36. An efficient pricing mechanism of random access in wireless network with self-interested mobile users.
37. Security modeling and analysis of an intrusion tolerant cloud data center.
38. Comparative of developed VoLTE AC algorithm with existing one using G.711, G.723 and G.729.
39. A novel penalty model for managing and applying penalties in Cloud Computing.
40. A review of SLA specification languages in the cloud computing.
41. Towards a Trusted third party based on Multi-agent systems for automatic control of the quality of service contract in the Cloud Computing.
42. Cloud Computing Security Modeling and Analysis based on a Self-Cleansing Intrusion Tolerance Technique.
43. Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization.
44. Towards a MDE Approach for the Establishment of a Contract Service Level Monitoring by Third Party in the Cloud Computing.
45. MarUnivCloud: Towards a Moroccan inter-University Cloud.
46. Automatic control of the quality of service contract by a third party in the Cloud Computing.
47. A QoE-based scheduling solution for UGS and rtPS service classes in WiMAX network.
48. GoodPut estimation in wireless mesh networks based IEEE 802.11s.
49. CBF evaluation through simulation.
50. A Markov model to evaluate system performances under slotted Aloha protocol.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.