College of Information Technology - UAEU
College of Information Technology - UAEU
UAEU
No verified email
TitleCited byYear
Middleware: Middleware challenges and approaches for wireless sensor networks
S Hadim, N Mohamed
IEEE distributed systems online, 1, 2006
6492006
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
A Fahad, N Alshatri, Z Tari, A Alamri, I Khalil, AY Zomaya, S Foufou, ...
IEEE transactions on emerging topics in computing 2 (3), 267-279, 2014
5612014
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16 (4), 507-521, 2007
4172007
Framework for role-based delegation models
E Barka, R Sandhu
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
3952000
Framework for role-based delegation models
E Barka, R Sandhu
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
3952000
Applications of big data to smart cities
E Al Nuaimi, H Al Neyadi, N Mohamed, J Al-Jaroodi
Journal of Internet Services and Applications 6 (1), 25, 2015
3892015
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
3732005
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
3732005
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (6), 859-874, 2010
3242010
The adoption of eCommerce communications and applications technologies in small businesses in New Zealand
N Al-Qirim
Electronic Commerce Research and Applications 6 (4), 462-473, 2007
3182007
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
3172005
Handbook of neural computation
E Fiesler, R Beale
CRC Press, 1996
3041996
A survey of load balancing in cloud computing: Challenges and algorithms
K Al Nuaimi, N Mohamed, M Al Nuaimi, J Al-Jaroodi
2012 Second Symposium on Network Cloud Computing and Applications, 137-142, 2012
2852012
A hierarchical and topological classification of linear sensor networks
I Jawhar, N Mohamed
2009 Wireless Telecommunications Symposium, 1-8, 2009
2722009
A role-based delegation model and some extensions
E Barka, R Sandhu
Proceedings of the 23rd National Information Systems Security Conference 4 …, 2000
2722000
A QoS broker based architecture for efficient web services selection
MA Serhani, R Dssouli, A Hafid, H Sahraoui
IEEE International Conference on Web Services (ICWS'05), 113-120, 2005
2482005
VLSI implementations of threshold logic-a comprehensive survey
V Beiu, JM Quintana, MJ Avedillo
IEEE Transactions on Neural Networks 14 (5), 1217-1243, 2003
2482003
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2332011
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2332011
A survey of indoor positioning systems and algorithms
K Al Nuaimi, H Kamel
2011 international conference on innovations in information technology, 185-190, 2011
2042011
The system can't perform the operation now. Try again later.
Articles 1–20