Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ali
    Last name: Chehab
    DBLP: 88/5173
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 116  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab.
    Modulation Classification via Subspace Detection in MIMO Systems.
    IEEE Communications Letters 2017, Volume 21 (0) 2017
    Journal article
    Khodor Hamandi, Jacques Bou Abdo, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    A privacy-enhanced computationally-efficient and comprehensive LTE-AKA.
    Computer Communications 2017, Volume 98 (0) 2017
    Conference paper
    Lama Shaer, Rouwaida Kanj, Rajiv V. Joshi, Maria Malik, Ali Chehab.
    Regularized logistic regression for fast importance sampling based SRAM yield analysis.
    18th International Symposium on Quality Electronic Design, ISQED 2017, Santa Clara, CA, USA, March 14-15, 2017 2017 (0) 2017
    Conference paper
    Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab.
    Efficient near optimal joint modulation classification and detection for MU-MIMO systems.
    2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016, Shanghai, China, March 20-25, 2016 2016 (0) 2016
    Conference paper
    Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab.
    Efficient subspace detection for high-order MIMO systems.
    2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016, Shanghai, China, March 20-25, 2016 2016 (0) 2016
    Conference paper
    Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi, Wassim Itani.
    NCaaS: network configuration as a service in SDN-driven cloud architectures.
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    A crowdsourcing game-theoretic intrusion detection and rating system.
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Farah Saab, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab.
    Solving sybil attacks using evolutionary game theory.
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    SDN Security Plane: An Architecture for Resilient Security Services.
    2016 IEEE International Conference on Cloud Engineering Workshop, IC2E Workshops, Berlin, Germany, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach.
    2016 IEEE International Conference on Cloud Engineering Workshop, IC2E Workshops, Berlin, Germany, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Ola Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Identity-based authentication scheme for the Internet of Things.
    IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016 2016 (0) 2016
    Conference paper
    Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    SDN verification plane for consistency establishment.
    IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016 2016 (0) 2016
    Conference paper
    Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab.
    Low-complexity joint modulation classification and detection in MU-MIMO.
    IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, April 3-6, 2016 2016 (0) 2016
    Conference paper
    Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab.
    Efficient near-optimal 8×8 MIMO detector.
    IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, April 3-6, 2016 2016 (0) 2016
    Journal article
    Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab.
    Modulation Classification via Subspace Detection in MIMO Systems.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Saleh Usman, Mohammad M. Mansour, Ali Chehab.
    Interlaced Column-Row Message-Passing Schedule for Decoding LDPC Codes.
    2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016 2016 (0) 2016
    Journal article
    Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    Energy-Efficient Security for Voice over IP.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj.
    G-Route: an energy-aware service routing protocol for green cloud computing.
    Cluster Computing 2015, Volume 18 (0) 2015
    Conference paper
    Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab.
    Efficient Implementation of a Recognition System using the Cortex Ventral Stream Model.
    VISAPP 2015 - Proceedings of the 10th International Conference on Computer Vision Theory and Applications, Volume 2, Berlin, Germany, 11-14 March, 2015. 2015 (0) 2015
    Conference paper
    Riwa Mouawi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Comparison of in-app ads traffic in different ad networks.
    11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015, Abu Dhabi, United Arab Emirates, October 19-21, 2015 2015 (0) 2015
    Conference paper
    Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    Edge computing enabling the Internet of Things.
    WF-IoT 2015 (0) 2015
    Conference paper
    Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab.
    Algorithmic Optimizations in the HMAX Model Targeted for Efficient Object Recognition.
    Computer Vision, Imaging and Computer Graphics Theory and Applications - 10th International Joint Conference, VISIGRAPP 2015, Berlin, Germany, March 11-14, 2015, Revised Selected Papers 2016 (0) 2015
    Conference paper
    Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab.
    Low-complexity MIMO detector with 1024-QAM.
    2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, USA, December 14-16, 2015 2015 (0) 2015
    Conference paper
    Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab.
    Likelihood-based modulation classification for MU-MIMO systems.
    2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, USA, December 14-16, 2015 2015 (0) 2015
    Journal article
    Khodor Hamandi, Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Messaging Attacks on Android: Vulnerabilities and Intrusion Detection.
    Mobile Information Systems 2015, Volume 2015 (0) 2015
    Conference paper
    Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    An architecture for the Internet of Things with decentralized data and centralized control.
    12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015 2015 (0) 2015
    Conference paper
    Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj, Wassim Itani.
    CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks.
    Sensors 2015, Volume 15 (0) 2015
    Conference paper
    Wassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab.
    ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud.
    Future Generation Comp. Syst. 2014, Volume 32 (0) 2014
    Conference paper
    Sabine Francis, Rouwaida Kanj, Rajiv V. Joshi, Ayman I. Kayssi, Ali Chehab.
    Statistical methodology for modeling non-IID memory fails events.
    Fifteenth International Symposium on Quality Electronic Design, ISQED 2014, Santa Clara, CA, USA, March 3-5, 2014 2014 (0) 2014
    Journal article
    Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Decentralised malicious node detection in WSN.
    IJSSC 2014, Volume 4 (0) 2014
    Conference paper
    Jacques Bou Abdo, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Application-Aware Fast Dormancy in LTE.
    28th IEEE International Conference on Advanced Information Networking and Applications, AINA 2014, Victoria, BC, Canada, May 13-16, 2014 2014 (0) 2014
    Conference paper
    Ayman Mukaddam, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    IP Spoofing Detection Using Modified Hop Count.
    28th IEEE International Conference on Advanced Information Networking and Applications, AINA 2014, Victoria, BC, Canada, May 13-16, 2014 2014 (0) 2014
    Journal article
    Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab.
    Fast dynamic internet mapping.
    Future Generation Comp. Syst. 2014, Volume 39 (0) 2014
    Conference paper
    Wassim Itani, Ayman I. Kayssi, Ali Chehab.
    ALPS: The Accountable Cloud Protocol Stack.
    CLOSER 2014 - Proceedings of the 4th International Conference on Cloud Computing and Services Science, Barcelona, Spain, April 3-5, 2014. 2014 (0) 2014
    Conference paper
    Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    DAIDS: An Architecture for Modular Mobile IDS.
    28th International Conference on Advanced Information Networking and Applications Workshops, AINA 2014 Workshops, Victoria, BC, Canada, May 13-16, 2014 2014 (0) 2014
    Conference paper
    Mehiar Dabbagh, Hazem M. Hajj, Wassim El-Hajj, Mohammad M. Mansour, Ayman I. Kayssi, Ali Chehab.
    An energy-aware design methodology based on kernel optimisations.
    IJAACS 2014, Volume 7 (0) 2014
    Conference paper
    Vahe Seferian, Rouwaida Kanj, Ali Chehab, Ayman I. Kayssi.
    PUF and ID-based key distribution security framework for advanced metering infrastructures.
    2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014, Venice, Italy, November 3-6, 2014 2014 (0) 2014
    Conference paper
    Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    CrowdApp: Crowdsourcing for application rating.
    11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014 2014 (0) 2014
    Conference paper
    Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Mobile malware exposed.
    11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014 2014 (0) 2014
    Conference paper
    Joseph Loutfi, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi.
    Smartphone sensors as random bit generators.
    11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014 2014 (0) 2014
    Conference paper
    Khaled Bakhit, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    DAGGER: Distributed architecture for granular mitigation of mobile based attacks.
    11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014 2014 (0) 2014
    Conference paper
    Khaled Bakhit, Chantal Chalouhi, Sabine Francis, Sara Mourad, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    3G to Wi-Fi offloading on Android.
    11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014 2014 (0) 2014
    Conference paper
    Khaled Bakhit, Sirine Taleb, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab.
    CAVE: Hybrid Approach for In-Network Content Caching.
    2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 2014 (0) 2014
    Conference paper
    Gerard Touma, Rouwaida Kanj, Rajiv V. Joshi, Ayman I. Kayssi, Ali Chehab.
    Robust bias temperature instability refresh design and methodology for memory cell recovery.
    2014 IEEE International Conference on IC Design Technology, ICICDT 2014, Austin, TX, USA, May 28-30, 2014 2014 (0) 2014
    Conference paper
    Faisal Hamady, Ayman I. Kayssi, Ali Chehab, Mohammad M. Mansour.
    Evaluation of Low-Power Computing when Operating on Subsets of Multicore Processors.
    Signal Processing Systems 2013, Volume 70 (0) 2013
    Conference paper
    Ramzi Bassil, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Effects of Signaling Attacks on LTE Networks.
    27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013 2013 (0) 2013
    Conference paper
    Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Malicious Node Detection in Wireless Sensor Networks.
    27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013 2013 (0) 2013
    Conference paper
    Khodor Hamandi, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi.
    Android SMS Malware: Vulnerability and Mitigation.
    27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013 2013 (0) 2013
    Conference paper
    Khodor Hamandi, Imad Sarji, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi.
    Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme.
    27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013 2013 (0) 2013
    Conference paper
    Jalal Awed, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Perception-aware packet-loss resilient compression for networked haptic systems.
    Computer Communications 2012, Volume 36 (0) 2013
    Conference paper
    Faisal Hamady, Ayman I. Kayssi, Ali Chehab, Nitin Gupte.
    Effects of workload variation on the energy distribution in a mobile platform.
    Microprocessors and Microsystems - Embedded Hardware Design 2013, Volume 37 (0) 2013
    Conference paper
    Wassim Itani, Ayman I. Kayssi, Ali Chehab.
    SNUAGE: an efficient platform-as-a-service security framework for the cloud.
    Cluster Computing 2013, Volume 16 (0) 2013
    Conference paper
    Ibrahim Abdelghany, Wajeb Saab, Tarek Sakakini, Abdul-Amir Yassine, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj.
    Energy-efficient truncated multipliers with scaling.
    8th International Design and Test Symposium, IDT 2013, Marrakesh, Morocco, 16-18 December, 2013 2013 (0) 2013
    Conference paper
    Khodor Hamandi, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi.
    2013 Wireless Telecommunications Symposium, WTS 2013, Phoenix, AZ, USA, April 17-19, 2013 2013 (0) 2013
    Conference paper
    Faisal Hamady, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi.
    User experience-based mechanism for preserving energy in graphics-intensive applications.
    IEEE 11th International New Circuits and Systems Conference, NEWCAS 2013, Paris, France, June 16-19, 2013 2013 (0) 2013
    Conference paper
    Wassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab.
    BGP-inspired autonomic service routing for the cloud.
    Proceedings of the ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy, March 26-30, 2012 2012 (0) 2012
    Conference paper
    Mostafa Dikmak, Zahraa Sabra, Ayman I. Kayssi, Ali Chehab.
    Optimized conditional privacy preservation in VANETs.
    19th International Conference on Telecommunications, ICT 2012, Jounieh, Lebanon, April 23-25, 2012 2012 (0) 2012
    Conference paper
    Ramzi Bassil, Roula Hobeica, Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab.
    Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System.
    19th International Conference on Telecommunications, ICT 2012, Jounieh, Lebanon, April 23-25, 2012 2012 (0) 2012
    Conference paper
    Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab.
    CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks.
    Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012 2012 (0) 2012
    Conference paper
    Khodor Hamandi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Android SMS botnet: a new perspective.
    Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, MOBIWAC '12, Paphos, Cyprus, October 21-22, 2012 2012 (0) 2012
    Conference paper
    Ramzi Bassil, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi.
    Signaling oriented denial of service on LTE networks.
    Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, MOBIWAC '12, Paphos, Cyprus, October 21-22, 2012 2012 (0) 2012
    Conference paper
    Sarah Abdallah, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi.
    Stochastic hardware architectures: A survey.
    International Conference on Energy Aware Computing, ICEAC 2012, Guzelyurt, Cyprus, December 3-5, 2012 2012 (0) 2012
    Conference paper
    Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Energy efficient JPEG using stochastic processing.
    International Conference on Energy Aware Computing, ICEAC 2012, Guzelyurt, Cyprus, December 3-5, 2012 2012 (0) 2012
    Journal article
    Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail.
    Fuzzy reputation-based trust model.
    Appl. Soft Comput. 2011, Volume 11 (0) 2011
    Conference paper
    Farah B. Yahya, Mohammad Mansour, Ali Chehab.
    A novel technique to measure data retention voltage of large SRAM arrays.
    International Symposium on Circuits and Systems (ISCAS 2011), May 15-19 2011, Rio de Janeiro, Brazil 2011 (0) 2011
    Conference paper
    Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab.
    TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks.
    Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4-8 July, 2011 2011 (0) 2011
    Conference paper
    Mehiar Dabbagh, Hazem M. Hajj, Ali Chehab, Wassim El-Hajj, Ayman I. Kayssi, Mohammad Mansour.
    A design methodology for energy aware neural networks.
    Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4-8 July, 2011 2011 (0) 2011
    Conference paper
    Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab.
    Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
    CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, Netherlands, 7-9 May, 2011 2011 (0) 2011
    Conference paper
    Wassim Itani, Ayman I. Kayssi, Ali Chehab.
    Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing.
    SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2011 (0) 2011
    Conference paper
    Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    E
    Computers Security 2011, Volume 30 (0) 2011
    Conference paper
    Ihab Nahlus, Lama Shaer, Ali Chehab, Ayman I. Kayssi, Mohammad M. Mansour.
    Low-power adder design techniques for noise-tolerant applications.
    Proceedings of the IEEE Workshop on Signal Processing Systems, SiPS 2011, October 4-7, 2011, Beirut, Lebanon 2011 (0) 2011
    Conference paper
    Ahmed Fawaz, Ameen Jaber, Ali Kassem, Ali Chehab, Ayman I. Kayssi.
    Assessing testing techniques for resistive-open defects in nanometer CMOS adders.
    18th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2011, Beirut, Lebanon, December 11-14, 2011 2011 (0) 2011
    Conference paper
    Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali.
    Secure delay-tolerant communications in the presence of oppressive governments.
    6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011 2011 (0) 2011
    Conference paper
    Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab.
    A PUF-based ultra-lightweight mutual-authentication RFID protocol.
    6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011 2011 (0) 2011
    Conference paper
    Salwa Adriana Saab, Ayman I. Kayssi, Ali Chehab.
    A decentralized energy-aware key management scheme for Wireless Sensor Networks.
    6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011 2011 (0) 2011
    Conference paper
    Layla Hamieh, Nader Mehdi, Ghazalah Omeirat, Ali Chehab, Ayman I. Kayssi.
    The effectiveness of delay and IDDT tests in detecting resistive open defects for nanometer CMOS adder circuits.
    6th IEEE International Design and Test Workshop, IDT 2011, Beirut, Lebanon, 11-14 December 2011 2011 (0) 2011
    Conference paper
    Wassim Itani, Ali Chehab, Ayman I. Kayssi.
    Energy-efficient platform-as-a-service security provisioning in the cloud.
    International Conference on Energy Aware Computing, ICEAC 2011, Istanbul, Turkey, November 30 - December 2, 2011 2011 (0) 2011
    Conference paper
    Ayman Tajeddine, Ali Chehab, Ayman I. Kayssi.
    H-TRACE: A hybrid energy-aware routing scheme for mobile ad hoc networks.
    International Conference on Energy Aware Computing, ICEAC 2011, Istanbul, Turkey, November 30 - December 2, 2011 2011 (0) 2011
    Conference paper
    Faisal Hamady, Ali Chehab, Ayman I. Kayssi.
    Energy consumption breakdown of a modern mobile platform under various workloads.
    International Conference on Energy Aware Computing, ICEAC 2011, Istanbul, Turkey, November 30 - December 2, 2011 2011 (0) 2011
    Conference paper
    Imad Sarji, Cesar Ghali, Ali Chehab, Ayman I. Kayssi.
    CloudESE: Energy efficiency model for cloud computing environments.
    International Conference on Energy Aware Computing, ICEAC 2011, Istanbul, Turkey, November 30 - December 2, 2011 2011 (0) 2011
    Conference paper
    Cesar Ghali, Ali Chehab, Ayman I. Kayssi.
    CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services.
    10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010 2010 (0) 2010
    Conference paper
    Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab.
    A Privacy-Preserving Trust Model for VANETs.
    10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010 2010 (0) 2010
    Conference paper
    Wassim Itani, Cesar Ghali, Ahmad El Hajj, Ayman I. Kayssi, Ali Chehab.
    SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks.
    Proceedings of the Global Communications Conference, 2010. GLOBECOM 2010, 6-10 December 2010, Miami, Florida, USA 2010 (0) 2010
    Journal article
    Rima Deghaili, Ali Chehab, Ayman I. Kayssi, Wassim Itani.
    STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments.
    IJDTIS 2010, Volume 1 (0) 2010
    Conference paper
    Mohammad Fawaz, Nader Kobrosli, Ahmad Chkeir, Ali Chehab, Ayman I. Kayssi.
    Transient current and delay analysis for resistive-open defects in future 16 nm CMOS circuits.
    17th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2010, Athens, Greece, 12-15 December, 2010 2010 (0) 2010
    Conference paper
    Mohammad Fawaz, Nader Kobrosli, Ali Chehab, Ayman I. Kayssi.
    Testing techniques for resistive-open defects in future CMOS technologies.
    IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2010, Kuala Lumpur, Malaysia, December 6-9, 2010 2010 (0) 2010
    Conference paper
    Wassim Itani, Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab.
    Slow but certain wins the race: authenticated bundle communication in delay tolerant networks.
    Q2SWinet'10, Proceedings of the Sixth ACM Symposium on QoS and Security for Wireless and Mobile Networks, Bodrum, Turkey, October 20-21, 2010 2010 (0) 2010
    Journal article
    Wassim Itani, Ali Chehab, Ayman Kayssi.
    PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES
    (0) 2010
    Journal article
    Hovig Denkilkian, Agop Koulakezian, Rostom Ohannessian, Milad S. Chalfoun, Mohamad Khaled Joujou, Ali Chehab, Imad H. Elhajj.
    Wireless Sensor for Continuous Real-Time Oil Spill Thickness and Location Measurement.
    IEEE T. Instrumentation and Measurement 2009, Volume 58 (0) 2009
    Conference paper
    Wassim Itani, Ayman I. Kayssi, Ali Chehab.
    Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures.
    Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, Chengdu, China, 12-14 December, 2009 2009 (0) 2009
    Journal article
    Hassan Artail, Fahim Al-Halabi, Ali Chehab.
    The design and implementation of an ad hoc network of mobile devices using the LIME II tuple-space framework.
    IEEE Wireless Commun. 2009, Volume 16 (0) 2009
    Conference paper
    Wassim Itani, Ayman I. Kayssi, Ali Chehab.
    PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices.
    Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain - October 28-29, 2009 2009 (0) 2009
    Conference paper
    Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab.
    Policy-driven and Content-based Web Services Security Gateway.
    I. J. Network Security 2009, Volume 8 (0) 2009
    Conference paper
    Wassim Itani, Ayman I. Kayssi, Ali Chehab.
    Smart encryption channels for securing virtual machine-based networked applications.
    Security and Communication Networks 2009, Volume 2 (0) 2009
    Conference paper
    Saleem Wehbe, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj.
    Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain.
    NTMS 2009, 3rd International Conference on New Technologies, Mobility and Security, 20-23 December 2009, Cairo, Egypt 2009 (0) 2009
    Conference paper
    Tarek Hassan, Ayman I. Kayssi, Ali Chehab.
    Ring of Masters (ROM): A new ring structure for Bluetooth scatternets with dynamic routing and adaptive scheduling schemes.
    Pervasive and Mobile Computing 2008, Volume 4 (0) 2008
    Conference paper
    Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab.
    LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System.
    I. J. Network Security 2008, Volume 6 (0) 2008
    Conference paper
    Wassim Itani, Ayman I. Kayssi, Ali Chehab.
    An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures.
    Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007 2007 (0) 2007
    Conference paper
    Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab.
    SmartSSL: Efficient Policy-Based Web Security.
    2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan 2007 (0) 2007
    Conference paper
    Lara Srour, Ayman I. Kayssi, Ali Chehab.
    Personalized Web Page Ranking Using Trust and Similarity.
    2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan 2007 (0) 2007
    Show item 1 to 100 of 116  

    Your query returned 116 matches in the database.