Search Results - "AKL, Selim"

Refine Results
  1. 1

    Improved Recruitment Algorithms for Vehicular Crowdsensing Networks by Campioni, Fabio, Choudhury, Salimur, Salomaa, Kai, Akl, Selim G.

    Published in IEEE transactions on vehicular technology (01-02-2019)
    “…Vehicular crowdsensing aims to utilize the plethora of onboard sensors and resources on smart vehicles to gather sensing data in a large coverage area…”
    Get full text
    Journal Article
  2. 2

    How to encrypt a graph by Akl, Selim G.

    “…An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the…”
    Get full text
    Journal Article
  3. 3

    A computational journey in the true north by Akl, Selim G.

    “…This paper tells my recollections of half a century of computing in Canada and, briefly earlier, in two other corners of the world…”
    Get full text
    Journal Article
  4. 4

    Fully homomorphic encryption: a general framework and implementations by Akl, Selim G., Assem, Ibrahim

    “…Two data items a and b are stored on an untrusted database in their encrypted forms and , respectively. It is required that the encryption function be fully…”
    Get full text
    Journal Article
  5. 5

    Operational state complexity of unary NFAs with finite nondeterminism by Palioudakis, Alexandros, Salomaa, Kai, Akl, Selim G.

    Published in Theoretical computer science (11-01-2016)
    “…We study the state complexity of language operations for unary NFAs with limited nondeterminism. We consider the Boolean operations, concatenation, and Kleene…”
    Get full text
    Journal Article
  6. 6
  7. 7

    Nonuniversality explained by Akl, Selim G.

    “…The nonuniversality in computation theorem (NCT) states that no computer capable of a finite and fixed number of basic operations per time unit can be…”
    Get full text
    Journal Article
  8. 8

    Electromagnetic tracking in surgical and interventional environments: usability study by Lugez, Elodie, Sadjadi, Hossein, Pichora, David R., Ellis, Randy E., Akl, Selim G., Fichtinger, Gabor

    “…Purpose Electromagnetic (EM) tracking of instruments within a clinical setting is notorious for fluctuating measurement performance. Position location…”
    Get full text
    Journal Article
  9. 9

    What is computation? by Akl, Selim G.

    “…Three conditions are usually given that must be satisfied by a process in order for it to be called a computation, namely, there must exist a finite length…”
    Get full text
    Journal Article
  10. 10

    Improved electromagnetic tracking for catheter path reconstruction with application in high-dose-rate brachytherapy by Lugez, Elodie, Sadjadi, Hossein, Joshi, Chandra P., Akl, Selim G., Fichtinger, Gabor

    “…Purpose Electromagnetic (EM) catheter tracking has recently been introduced in order to enable prompt and uncomplicated reconstruction of catheter paths in…”
    Get full text
    Journal Article
  11. 11

    Cellular automaton-based algorithms for the dispersion of mobile wireless sensor networks by Choudhury, Salimur, Salomaa, Kai, Akl, Selim G.

    “…Due to the advent of sensor technology and its applications, mobile wireless sensor networks (MWSNs) have gained a significant amount of research interest. In…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Heart Rate Variability and Procedural Outcome in Catheter Ablation for Atrial Fibrillation by Seaborn, Geoffrey E.J., Todd, Keith, Michael, Kevin A., Baranchuk, Adrian, Abdollah, Hoshiar, Simpson, Christopher S., Akl, Selim G., Redfearn, Damian P.

    Published in Annals of noninvasive electrocardiology (01-01-2014)
    “…Introduction In patients with normal hearts, increased vagal tone is associated with onset of paroxysmal atrial fibrillation (AF). Vagal denervation of the…”
    Get full text
    Journal Article
  14. 14

    Some topological properties of star graphs: The surface area and volume by Imani, Navid, Sarbazi-Azad, Hamid, Akl, Selim G.

    Published in Discrete mathematics (28-02-2009)
    “…The star graph, as an interesting network topology, has been extensively studied in the past. In this paper, we address some of the combinatorial properties of…”
    Get full text
    Journal Article Conference Proceeding
  15. 15

    Computing with uncertainty and its implications to universality by Nagy, Naya, Akl, Selim G.

    “…It is known that there exist computational problems that can be solved on a parallel computer, yet are impossible to be solved sequentially. Specifically, no…”
    Get full text
    Journal Article
  16. 16

    Quantum security in wireless sensor networks by Nagy, Naya, Nagy, Marius, Akl, Selim G.

    Published in Natural computing (01-12-2010)
    “…Security in sensor networks, though an important issue for widely available wireless networks, has been studied less extensively than other properties of these…”
    Get full text
    Journal Article
  17. 17

    Validation of a novel algorithm for quantification of the percentage of signal fractionation in atrial fibrillation by Haley, Charlotte L, Gula, Lorne J, Miranda, Rodrigo, Michael, Kevin A, Baranchuk, Adrian M, Simpson, Christopher S, Abdollah, Hoshiar, West, Adam J, Akl, Selim G, Redfearn, Damian P

    Published in Europace (London, England) (01-03-2013)
    “…Catheter ablation for paroxysmal atrial fibrillation (AF) is rapidly becoming a standard practice. There is literature to support that catheter ablation of…”
    Get full text
    Journal Article
  18. 18

    Planar tree transformation: Results and counterexample by Akl, Selim G., Islam, Kamrul, Meijer, Henk

    Published in Information processing letters (16-12-2008)
    “…We consider the problem of planar spanning tree transformation in a two-dimensional plane. Given two planar trees T 1 and T 2 drawn on a set S of n points in…”
    Get full text
    Journal Article
  19. 19

    A local algorithm to compute multiple connected dominating sets in wireless sensor networks by Islam, Kamrul, Akl, Selim G.

    “…We investigate the problem of computing a family of connected dominating sets (CDSs) in wireless sensor networks (WSNs) in a distributed manner. Specifically,…”
    Get full text
    Journal Article
  20. 20

    Enhancing identity trust in cryptographic key management systems for dynamic environments by Kayem, Anne V. D. M., Martin, Patrick, Akl, Selim G.

    Published in Security and communication networks (01-01-2011)
    “…Cryptographic key management (CKM) schemes can be used to support identity management (IM) systems where linking users securely to data objects is important…”
    Get full text
    Journal Article