Year |
Citation |
Score |
2016 |
Njilla LY, Echual P, Pissinou N, Makki K. A game-theoretic approach on resource allocation with colluding nodes in MANETs 10th Annual International Systems Conference, Syscon 2016 - Proceedings. DOI: 10.1109/SYSCON.2016.7490630 |
0.402 |
|
2015 |
Nguyen H, Wahman E, Pissinou N, Iyengar SS, Makki K. Mobile learning object authoring tool and management system for mobile ad hoc wireless networks International Journal of Communication Systems. 28: 2180-2196. DOI: 10.1002/Dac.2996 |
0.349 |
|
2012 |
Ali BQ, Pissinou N, Makki K. Belief based data cleaning for wireless sensor networks Wireless Communications and Mobile Computing. 12: 406-419. DOI: 10.1002/wcm.970 |
0.414 |
|
2011 |
Chen K, Pissinou N, Makki K. Cellular network location estimation via RSS-based data clean enhanced scheme Proceedings - Ieee Symposium On Computers and Communications. 924-930. DOI: 10.1109/ISCC.2011.5983960 |
0.394 |
|
2011 |
Kamhoua CA, Pissinou N, Makki K. Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5962511 |
0.414 |
|
2010 |
Kamhoua CA, Pissinou N, Busovaca A, Makki K. Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 315-324. DOI: 10.1109/PCCC.2010.5682295 |
0.394 |
|
2009 |
Mo Z, Zhu H, Makki K, Pissinou N, Karimi M. On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks International Journal of Interdisciplinary Telecommunications and Networking. 1: 28-45. DOI: 10.4018/Jitn.2009040103 |
0.462 |
|
2009 |
Chen K, Makki K, Pissinou N. A real-time wireless route guidance system for urban traffic management and its performance evaluation Ieee Vehicular Technology Conference. DOI: 10.1109/VETECF.2009.5378786 |
0.322 |
|
2009 |
Chen X, Makki K, Yen K, Pissinou N. Sensor network security: A survey Ieee Communications Surveys and Tutorials. 11: 52-73. DOI: 10.1109/Surv.2009.090205 |
0.675 |
|
2009 |
Ali BQ, Pissinou N, Makki K. Identification and validation of spatio-temporal associations in wireless sensor networks Proceedings - 2009 3rd International Conference On Sensor Technologies and Applications, Sensorcomm 2009. 496-501. DOI: 10.1109/SENSORCOMM.2009.83 |
0.464 |
|
2009 |
Punjala SS, Makki K. Wireless powering of sensors in free space and concrete medium Proceedings - 2009 13th International Symposium On Antenna Technology and Applied Electromagnetics and the Canadian Radio Sciences Meeting, Antem/Ursi 2009. DOI: 10.1109/ANTEMURSI.2009.4805101 |
0.301 |
|
2009 |
Punjala SS, Makki K. Wireless powering of sensors inside concrete using a reconfigurable sierpinski gasket antenna European Conference On Antennas and Propagation, Eucap 2009, Proceedings. 3742-3743. |
0.307 |
|
2008 |
Chen X, Makki K, Yen K, Pissinou N. Attack distribution modeling and its applications in sensor network security Eurasip Journal On Wireless Communications and Networking. 2008. DOI: 10.1155/2008/754252 |
0.647 |
|
2008 |
El Moutia A, Makki K, Pissinou N. Space division multiple access for wireless sensor networks 2008 Ieee International Conference On Technologies For Homeland Security, Hst'08. 453-458. DOI: 10.1109/THS.2008.4534495 |
0.662 |
|
2008 |
Chen X, Makki K, Yen K, Pissinou N, Liu Z. A proactive secure routing algorithm defense against node compromise in sensor networks Proceedings - Conference On Local Computer Networks, Lcn. 557-559. DOI: 10.1109/LCN.2008.4664235 |
0.634 |
|
2008 |
Ali BQ, Pissinou N, Makki K. Approximate replication of data using adaptive filters in wireless sensor networks 3rd International Symposium On Wireless Pervasive Computing, Iswpc 2008, Proceedings. 365-369. DOI: 10.1109/ISWPC.2008.4556231 |
0.422 |
|
2008 |
Zhao X, Ganapathy V, Pissinou N, Makki K. Self-organized forensic support in MANETs Ipdps Miami 2008 - Proceedings of the 22nd Ieee International Parallel and Distributed Processing Symposium, Program and Cd-Rom. DOI: 10.1109/IPDPS.2008.4536127 |
0.313 |
|
2008 |
Wang Q, Chen Z, Makki K, Pissinou N, Chen C. Inferring internet worm temporal characteristics Globecom - Ieee Global Telecommunications Conference. 2007-2012. DOI: 10.1109/GLOCOM.2008.ECP.387 |
0.31 |
|
2008 |
Fan S, Fan J, Makki K, Pissinou N. Communications via systems-on-chips clustering in large-scaled sensor networks Proceedings of the 5th International Conference On Embedded and Ubiquitous Computing, Euc 2008. 2: 549-552. DOI: 10.1109/EUC.2008.184 |
0.483 |
|
2008 |
El Moutia A, Makki K. Time and power based positioning scheme for indoor location aware services 2008 5th Ieee Consumer Communications and Networking Conference, Ccnc 2008. 868-872. DOI: 10.1109/ccnc08.2007.203 |
0.695 |
|
2008 |
Zhao X, Ganapathy V, Pissinou N, Makki K. Evaluation of time synchronization over mobile ad hoc networks Lecture Notes in Electrical Engineering. 7: 221-235. DOI: 10.1007/978-0-387-77320-9-11 |
0.301 |
|
2008 |
Makki SK, Rezgui A, Peng W, Makki K, Lung CH, Pissinou N, Makki S, Karimi M, Eltowiessy M. Establishing new research initiatives for theoretical and algorithmic aspects of sensor and ad hoc networks Lecture Notes in Electrical Engineering. 7: 1-18. DOI: 10.1007/978-0-387-77320-9-1 |
0.358 |
|
2008 |
Makki SK, Li XY, Makki K, Pissinou N, Makki S, Karimi M. Sensor and Ad Hoc Networks: Theoretical and Algorithmic Aspects - Preface Lecture Notes in Electrical Engineering. 7. |
0.384 |
|
2008 |
Mo Z, Zhu H, Makki K, Pissinou N. Mobility-assisted location management for Vehicular Ad hoc Networks Ieee Wireless Communications and Networking Conference, Wcnc. 2224-2228. |
0.625 |
|
2008 |
Wan Z, Zhang J, Zhu H, Makki K, Pissinou N. On energy-efficient and low-latency medium access control in wireless sensor networks Ieee Wireless Communications and Networking Conference, Wcnc. 1905-1910. |
0.489 |
|
2007 |
Liu C, Zhou C, Pissinou N, Makki K. Resource management in the next-generation integrated WLAN / 3G cellular networks Ieee Wireless Communications and Networking Conference, Wcnc. 3343-3348. DOI: 10.1109/WCNC.2007.615 |
0.393 |
|
2007 |
El Moutia A, Makki K, Pissinou N. TPLS: A time and power based localization scheme for indoor WLAN using sensor networks 2007 Ieee Conference On Technologies For Homeland Security: Enhancing Critical Infrastructure Dependability. 117-122. DOI: 10.1109/THS.2007.370031 |
0.7 |
|
2007 |
Gadze J, Pissinou N, Makki K, Crosby G. On optimal slot allocation for reservation TDMA MAC protocol in shadow fading environment Proceedings of 4th Ieee Internatilonal Symposium On Wireless Communication Systems 2007, Iswcs. 809-813. DOI: 10.1109/ISWCS.2007.4392453 |
0.303 |
|
2007 |
Aguilar A, Ege RK, Makki K, Bustos R. Enabling peer cooperation in private local area networks using BitTorrent Proceedings - Ieee Symposium On Computers and Communications. 615-620. DOI: 10.1109/ISCC.2007.4381545 |
0.318 |
|
2007 |
Chen X, Makki K, Yen K, Pissinou N. Node compromise modeling and its applications in sensor networks Proceedings - Ieee Symposium On Computers and Communications. 575-582. DOI: 10.1109/ISCC.2007.4381514 |
0.626 |
|
2007 |
Chen X, Makki K, Yen K, Pissinou N. Modeling attack distribution in sensor networks 4th International Conference On Networked Sensing Systems, Inss. 98-101. DOI: 10.1109/INSS.2007.4297398 |
0.615 |
|
2007 |
Gadze J, Pissinou N, Makki K. Wireless networked -based sensing for protection and decentralized control of critical infrastructures 2007 Ieee International Conference On Networking, Sensing and Control, Icnsc'07. 644-649. DOI: 10.1109/ICNSC.2007.372855 |
0.349 |
|
2007 |
Chen X, Makki K, Yen K, Pissinou N. A new network topology evolution generator based on traffic increase and distribution model Proceedings of the Sixth International Conference On Networking, Icn'07. DOI: 10.1109/ICN.2007.5 |
0.591 |
|
2007 |
Ali BQ, Pissinou N, Makki K. Estimated replication of data in wireless sensor networks 3rd Ieee/Create-Net International Conference On Communication System Software and Middleware, Comsware. 107-110. DOI: 10.1109/COMSWA.2008.4554389 |
0.498 |
|
2007 |
Drakatos S, Pissinou N, Makki K, Douligeris C. A context-aware cache structure for mobile computing environments Journal of Systems and Software. 80: 1102-1119. DOI: 10.1016/J.Jss.2006.10.027 |
0.353 |
|
2007 |
Ghosh T, Pissinou N, Makki K, Farhat A. A framework for computing trust in mobile Ad-Hoc networks Mobile and Wireless Network Security and Privacy. 67-83. DOI: 10.1007/978-0-387-71058-7_4 |
0.376 |
|
2007 |
Reiher P, Makki SK, Pissinou N, Makki K, Burmester M, Van TL, Ghosh T. Research directions in security and privacy for mobile and wireless networks Mobile and Wireless Network Security and Privacy. 1-22. DOI: 10.1007/978-0-387-71058-7_1 |
0.455 |
|
2007 |
Peng W, Wang Y, Park EK, Makki K. Dynamic key management for secure routing in MANET Wireless Communications and Mobile Computing. 7: 1233-1241. DOI: 10.1002/Wcm.567 |
0.409 |
|
2006 |
Huang SCH, Makki K, Pissinou N. On optimizing compatible security policies in wireless networks Eurasip Journal On Wireless Communications and Networking. 2006. DOI: 10.1155/Wcn/2006/23728 |
0.387 |
|
2006 |
Mo Z, Zhu H, Makki K, Pissinou N. MURU: A multi-hop routing protocol for urban vehicular ad hoc networks 2006 3rd Annual International Conference On Mobile and Ubiquitous Systems: Networking and Services, Mobiquitous. DOI: 10.1109/MOBIQ.2006.340406 |
0.36 |
|
2006 |
Zhao X, Makki K, Pissinou N. An efficient and robust routing protocol for data aggregation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4138: 175-186. |
0.398 |
|
2005 |
Ghosh T, Pissinou N, Makki K. Towards designing a trusted routing solution in mobile ad hoc networks Mobile Networks and Applications. 10: 985-995. DOI: 10.1007/S11036-005-4454-4 |
0.393 |
|
2005 |
Jasani H, Yen K, Makki K. Performance analysis of DSR using cached route replies for multihop wireless networks Proceedings of the 2005 International Conference On Wireless Networks, Icwn'05. 203-209. |
0.433 |
|
2004 |
Ghosh T, Pissinou N, Makki K. Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks Proceedings - Conference On Local Computer Networks, Lcn. 224-231. DOI: 10.1109/LCN.2004.36 |
0.414 |
|
2004 |
Peng W, Wang Y, Makki K. Dynamic key management for secure routing in LCMRMG MANET Proceedings - International Conference On Computer Communications and Networks, Icccn. 227-232. DOI: 10.1109/ICCCN.2004.1401633 |
0.306 |
|
2004 |
Pissinou N, Ghosh T, Makki K. Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks Lecture Notes in Computer Science. 1446-1451. DOI: 10.1007/978-3-540-24693-0_133 |
0.501 |
|
2004 |
Pissinou N, Ghosh T, Makki K. Collaborative trust-based secure routing in multihop Ad Hoc networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3042: 1446-1451. |
0.406 |
|
2004 |
Zhou C, Qian D, Pissinou N, Makki K. Resource allocation based on pricing for wireless multimedia networks 2004 Ieee Wireless Communications and Networking Conference, Wcnc 2004. 1: 477-482. |
0.306 |
|
2003 |
Punde J, Pissinou N, Makki K. On quality of service routing in ad-hoc networks Proceedings - Conference On Local Computer Networks, Lcn. 2003: 276-278. DOI: 10.1109/LCN.2003.1243138 |
0.397 |
|
2003 |
Peng W, Zhang X, Makki K. Locality caching multiroot multigeneration routing algorithm in mobile ad hoc networks Proceedings - International Conference On Computer Communications and Networks, Icccn. 2003: 229-234. DOI: 10.1109/ICCCN.2003.1284175 |
0.381 |
|
2003 |
Pissinou N, Makki K, Konig-Ries B. Mobile users in heterogeneous environments with middleware platform Computer Communications. 26: 700-707. DOI: 10.1016/S0140-3664(02)00203-7 |
0.403 |
|
2003 |
Makki K, Pissinou N, Punde J, Yen K. Predictive Routing Extensions to AODV to support Quality of Service Proceedings of the International Conference On Wireless Networks. 343-349. |
0.41 |
|
2003 |
Wang J, Pissinou N, Makki K, Ghosh T, Punde J, D'Souza V, Doshi A, Agrawal S. Economic Modeling and Analysis of the Evolution Path in Current and Projected IP-Backbone Networks Conference On Optical Fiber Communication, Technical Digest Series. 86: 146-147. |
0.304 |
|
2002 |
König-Ries B, Makki K, Makki S, Perkins C, Pissinou N, Reiher P, Scheuermann P, Veijalainen J, Wolfson O. On building an infrastructure for mobile and wireless systems Sigmod Record. 31: 73-79. DOI: 10.1145/565117.565134 |
0.408 |
|
2002 |
Feng G, Makki K, Pissinou N. Efficient implementations of a delay-constrained least-cost multicast algorithm Journal of Communications and Networks. 4: 246-255. DOI: 10.1109/Jcn.2002.6596917 |
0.342 |
|
2002 |
Li W, Makki K, Pissinou N. Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls Computer Communications. 25: 507-515. DOI: 10.1016/S0140-3664(01)00373-5 |
0.449 |
|
2002 |
Li W, Makki K, Pissinou N. Waiting time of handoff calls for the wireless mobile networks with dependent calls arrival processes and impatient calls 2000 Ieee Wireless Communications and Networking Conference. 2: 845-849. |
0.381 |
|
2001 |
Pissinou N, Radev I, Makki K. Spatio-temporal modeling in video and multimedia geographic information systems Geoinformatica. 5: 375-409. DOI: 10.1023/A:1012749903497 |
0.309 |
|
2000 |
Moh WM, Yao D, Makki K. Analyzing the hidden-terminal effects and multimedia support for wireless LAN Computer Communications. 23: 998-1013. DOI: 10.1016/S0140-3664(99)00216-9 |
0.38 |
|
2000 |
Pissinou N, Bhagyavati, Makki K. Mobile agents to automate fault management in wireless and mobile networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1800: 1296-1300. |
0.301 |
|
1999 |
Pissinou N, Makki K, Campbell WJ. On the design of a location and query management strategy for mobile and wireless environments Computer Communications. 22: 651-666. DOI: 10.1016/S0140-3664(99)00013-4 |
0.337 |
|
1999 |
Stach JF, Park EK, Makki K. Performance of an enhanced GSM protocol supporting non-repudiation of service Computer Communications. 22: 675-680. DOI: 10.1016/S0140-3664(99)00010-9 |
0.365 |
|
1999 |
Jia X, Zhang Y, Pissinou N, Makki K. A distributed multicast routing protocol for real-time multicast applications Computer Networks. 31: 101-109. |
0.371 |
|
1997 |
Jia X, Pissinou N, Makki K. A real-time multicast routing algorithm for multimedia applications Computer Communications. 20: 1098-1106. |
0.321 |
|
1997 |
Jia X, Pissinou N, Makki K. Modeling and Simulations of Multicast Routing Algorithms for Advanced Network Applications Simulation. 68: 44-55. |
0.365 |
|
1996 |
Makki K. Efficient solutions to multicast routing in communication networks Mobile Networks and Applications. 1: 221-232. |
0.407 |
|
Show low-probability matches. |