Search Results - "Pissinou, N."

Refine Results
  1. 1

    Sensor network security: a survey by Xiangqian Chen, Makki, K., Kang Yen, Pissinou, N.

    Published in IEEE Communications surveys and tutorials (01-01-2009)
    “…Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As…”
    Get full text
    Journal Article
  2. 2

    Maximizing Lifetime of Sensor Surveillance Systems by Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih-Wei Yi, Makki, S.K., Pissinou, N.

    Published in IEEE/ACM transactions on networking (01-04-2007)
    “…This paper addresses the maximal lifetime scheduling problem in sensor surveillance systems. Given a set of sensors and targets in an area, a sensor can watch…”
    Get full text
    Journal Article
  3. 3

    Maximal lifetime scheduling in sensor surveillance networks by Hai Liu, Wan, P., Yi, C.-W., Xiaohua Jia, Makki, S., Pissinou, N.

    “…This paper addresses the maximal lifetime scheduling problem in sensor surveillance networks. Given a set of sensors and targets in a Euclidean plane, a sensor…”
    Get full text
    Conference Proceeding
  4. 4

    Spatio-temporal composition of video objects: representation and querying in video database systems by Pissinou, N., Radev, I., Makki, K., Campbell, W.J.

    “…A key characteristic of video data is the associated spatial and temporal semantics. It is important that a video model models the characteristics of objects…”
    Get full text
    Journal Article
  5. 5

    Efficient detection and resolution of deadlocks in distributed databases by Makki, K, Pissinou, N

    Published in Computer communications (15-05-1999)
    “…Deadlock detection and resolution is one of the major components of a successful distributed database management system. In this article, we discuss deadlock…”
    Get full text
    Journal Article
  6. 6

    A new framework for handling mobile clients in a client–server database system by Pissinou, N, Dunu, C, Makki, K

    Published in Computer communications (01-05-2000)
    “…Mobile computing is a new emerging paradigm that enables mobile computers to access information regardless of their physical location. Data management in this…”
    Get full text
    Journal Article
  7. 7

    On optical communications networks and wideband network architecture by Makki, K, Broussard, J, Pissinou, N

    Published in Computer communications (01-05-2000)
    “…The optical networks of today are just beginning to realize their abilities to carry a tremendous amount of information in the forms of voice, data and video…”
    Get full text
    Journal Article
  8. 8

    An ECA object service to support active distributed objects by Pissinou, N, Makki, K, Krishnamurthy, R

    Published in Information sciences (1997)
    “…Existing Object Management Group (OMG) standards (such as the Common Object Request Broker Architecture specification) provide specific details on how to model…”
    Get full text
    Journal Article
  9. 9

    An efficient approximate algorithm for delay-cost-constrained QoS routing by Feng, Gang, Makki, K., Pissinou, N., Douligeris, C.

    “…The problem of finding a path with two additive constraints is called a multi-constrained path (MCP) problem in the literature. In this paper, we explore the…”
    Get full text
    Conference Proceeding
  10. 10

    On the design of a location and query management strategy for mobile and wireless environments by Pissinou, N, Makki, K, Campbell, W.J

    Published in Computer communications (15-05-1999)
    “…The rapid development of wireless digital communication technology led to a new computing environment known as mobile or nomadic computing. Mobile computing no…”
    Get full text
    Journal Article
  11. 11

    OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches by Hao Jin, Deng Pan, Liu, J., Pissinou, N.

    Published in IEEE transactions on computers (01-09-2013)
    “…Flow-level bandwidth provisioning (FBP) achieves fine-grained bandwidth assurance for individual flows. It is especially important for virtualization-based…”
    Get full text
    Journal Article
  12. 12

    A new routing algorithm for low Earth orbit satellite networks by Makki, S.A.M., Pissinou, N., Daroux, P.

    “…In the modern world of telecommunications, the concept of wireless global coverage is of the utmost importance. However, real global coverage can only be…”
    Get full text
    Conference Proceeding
  13. 13

    Waiting time of handoff calls for the wireless mobile networks with dependent calls arrival processes and impatient calls by Wei Li, Makki, K., Pissinou, N.

    “…This paper studies the quasi-waiting time, the actual waiting time of the handoff calls in the buffer and the actual call holding times of new calls for the…”
    Get full text
    Conference Proceeding
  14. 14

    Encapsulation of ATM cell connections by Liu, Wei, Park, E.K., Pissinou, N.

    Published in Computer communications (01-07-1996)
    “…The goal of this research is to provide a framing structure for a sequence of ATM cells which carry multimedia traffic. We will redefine the concept of a…”
    Get full text
    Journal Article
  15. 15

    Intelligent controller with cache for critical infrastructures by Weng, L, Niu, X, Liu, C, Pissinou, N

    “…Critical infrastructures require precise and swift response to a local disturbance before it would spread and accumulate. To meet the demand on response time,…”
    Get full text
    Conference Proceeding
  16. 16

    Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy by Kamhoua, C. A., Pissinou, N., Makki, K.

    “…Future applications will require autonomous devices to be interconnected to form a network. Such networks will not have a central manager; each node will…”
    Get full text
    Conference Proceeding
  17. 17

    Third generation wireless network: the integration of GSM and Mobile IP by Robert, L., Pissinou, N., Makki, S.

    “…Consumers are demanding world-wide cellular access to the Internet. This requires a global standard and effective means of accessing the Internet from wireless…”
    Get full text
    Conference Proceeding
  18. 18

    Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks by Ghosh, Tirthankar, Pissinou, Niki, Makki, Kami Sam

    Published in Mobile networks and applications (01-12-2005)
    “…Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels…”
    Get full text
    Journal Article
  19. 19

    A hybrid method to cellular traffic using optic beam interconnects by Makki, K., Pissinou, N., Gumaste, A.

    “…We propose a new type of wireless system, which is to provide for multimedia, bandwidth upon demand and quality of service (QoS) to the user. The system…”
    Get full text
    Conference Proceeding
  20. 20

    The secure model for enterprise connectivity by Makki, K., Pissinou, N., Bambawale, S.

    “…The need for implementing data security over enterprise networks has been brought to the forefront of the e-commerce marketplace by an increasing number of…”
    Get full text
    Conference Proceeding