A Performance Study of Path Based Multicast Communication Algorithms
Al-Dubai, A., & Romdhani, I. (2006)
A Performance Study of Path Based Multicast Communication Algorithms. In International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2006), 245-250. doi:10.1109/parelec.2006.7
Multicast communication?s history has been driven by many schemes; however, a few have shown their efficiency on interconnection networks. Among these schemes, path based mult...
A new efficient distributed route discovery for wireless mobile ad hoc networks.
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012)
A new efficient distributed route discovery for wireless mobile ad hoc networks. In Wireless Telecommunications Symposium (WTS), 2012, (1-6). https://doi.org/10.1109/WTS.2012.6266129
High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MAN...
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...
Requirements for 5G based telemetric cardiac monitoring
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018)
Requirements for 5G based telemetric cardiac monitoring. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/WiMOB.2018.8589139
Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information...
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing
Migas, N., & Buchanan, W. J. (2005)
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. In The 2005 IEEE Congress on Evolutionary Computation. , (147-154). https://doi.org/10.1109/ecbs.2005.51
Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is n...
Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services
Lim, A. K., Thuemmler, C., Paulin, A., Jell, T., & Keow Lim, A. K. (2017)
Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. In S. Latifi (Ed.), Information Technology-Next Generation. , (811-817). https://doi.org/10.1007/978-3-319-54978-1_100
As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals includin...
Enhancing network management using mobile agents.
Buchanan, W. J., Naylor, M., & Scott, A. (2000)
Enhancing network management using mobile agents. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the, 218-226. https://doi.org/10.1109/ECBS.2000.839880
Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balanci...
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2017)
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/ISPA, (178-184). https://doi.org/10.1109/trustcom.2016.0061
The firewalls were invented since 1990s  and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate pac...
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report
Al-Dubai, A., & Ould-Khaoua, M. (2002)
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. In Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), 155-162. https://doi.org/10.1109/IPCCC.2001.918648
Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) a...