DSpace Repository

Browsing Scientific Published Papers by Title

Browsing Scientific Published Papers by Title

Sort by: Order: Results:

  • Arman, Nabil; Daghameen, Khalid (2010)
    The best time for teaching software engineering courses has been an issue of debate for a long time, in addition to the issue of how to teach software engineering courses. Some researchers are arguing that teaching in ...
  • Adm, Mohammad; Kittaneh, Fuad (Linear Algebra and its Applications, 2012-04-01)
    We apply several matrix inequalities to the derivative companion matrices of complex polynomials to establish new bounds and majorization relations for the critical points of these polynomials in terms of their zeros.
  • Salah, Hani; Strufe, Thorsten (IEEE ICDCS (HotPOST), 2013-07-08)
    Abstract: Measuring accurate graph snapshots of peer-to-peer (P2P) overlay networks is essential to understand these systems. Furthermore, the captured graph snapshots can be used, among other important purposes, as traces ...
  • El Assad, Safwan; Farajallah, Mousa; Vladeanu, Calin (The 10th International Conference on Communications (COMM), 2014-05-29)
    A variety of chaos-based cryptosystems have been investigated during the last decade. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by ...
  • Farajallah, Mousa (UNIVERSITE DE NANTES, 2015-06-30)
    The security of image and video data is important for many applications which require in real-time a high security level. In the first part of this work, four chaos-based cryptosystems, flexible, efficient, and more robust ...
  • AbuTaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-14)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Salah, Hani; Roos, Stefanie; Strufe, Thorsten (IEEE, 2014-06-23)
    The widely used distributed hash table (DHT) in KAD is commonly analyzed and optimized based on partial measurements and simulation results, which are limited in scope and subject to simplification. An accurate characterization, ...
  • Salah, Hani; Alfatafta, Mohammed; SayedAhmed, Saed; Strufe, Thorsten (IEEE (42nd IEEE Conference on Local Computer Networks, LCN), 2017)
    Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a ...
  • Salah, Hani; Schiller, Benjamin; Strufe, Thorsten (IEEE, 2014-04-27)
    Content-Centric Networking (CCN) promises to yield large efficiency gains for Internet content distribution. Its autonomous cache management, however, raises doubts about achieving the intended goals optimally. A coordinated ...
  • Salah, Hani; Strufe, Thorsten (IEEE, 2015-01-09)
    The autonomous cache management in Content-Centric Networking (CCN) results in suboptimal caching decisions and implies cache-ignorant routing. Cache coordination and similar improvements hence have been the subject of ...
  • Karama, Muneer Jebreel (2016)
    The present research, being one string of the Environmental Education (EE), aims to study, and analyze EE objectives in the Palestinian 10th grade textbook from an international point view , namely : to conduct a comparative ...
  • Khamayseh, Faisal; Arman, Nabil (Journal of Theoretical and Applied Information Technology JATIT & LLS, Vol. 83. No. 1, 2016-01-01)
    We study the different recent improvements on shortest path algorithms. We suggest improvements to the classical path computing algorithms and we implement them using random generated graphs with various sizes. Many attempts ...
  • Roos, Stefanie (arXiv, 2013-07-26)
    The family of Kademlia-type systems represents the most efficient and most widely deployed class of internet-scale distributed systems. Its success has caused plenty of large scale measurements and simulation studies, and ...
  • Nassar, Ibrahim; Khamayseh, Faisal (The 6th International Conference on Information and Communication Systems. ICICS 2015, Amman, Jordan, 2015-04-07)
    Automated software engineering is one of the most important current research problems especially when it comes to requirements analysis and modelling. The main advantage of this automation process is to improve the quality ...
  • Arman, Nabil; Jabbarin, Sari (International Conference on Requirements Engineering (ICRE’2014), 2014)
    Automated software engineering has attracted a large amount of research efforts. The use of object-oriented methodologies for software systems development has made it necessary to develop approaches that automate the ...
  • Salah, Hani; Wulfheide, Julian; Strufe, Thorsten (IEEE, 2015-10-26)
    Named-Data Networking (NDN) is a promising architecture for future Internet. Its design, however, can be misused to perform a new DDoS attack known as the Interest Flooding Attack (IFA). In IFA, the attacker issues ...
  • Hamamreh, Rushdi; Farajallah, Mousa (International Journal of Computer Science and Network Security, 2009-05-29)
    Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access.Hill cipher is a polygraph substitution cipher based ...
  • Roos, Stefanie; Salah, Hani; Strufe, Thorsten (IEEE, 2015-12-01)
    —The family of Kademlia-type systems represents the most efficient and most widely deployed class of Internetscale distributed systems. However, prior research on these systems has mainly been restricted to analyzing ...
  • Salah, Hani (IEEE P2P, 2014)
    Discovery of nodes and content in large-scale distributed systems is generally based on Kademlia, today. Understanding Kademlia-type systems to improve their performance is essential for maintaining a high service quality ...
  • Farajallah, Mousa; El Assad, Safwan; Chetto, Maryline (2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013-08-20)
    Wireless Sensor Networks (WSNs) are a growing field of research since they are used in many applications. Nevertheless, they are subject to many requirements such as real-time constraints, energy limitations, and security ...

Search DSpace


Browse

My Account