Date


School

Themes

Download Available

51 results

A scalable plane-based broadcast algorithm for 3D-Mesh networks

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
A scalable plane-based broadcast algorithm for 3D-Mesh networks. In Proceedings of the Eleventh Euromicro Conference on Parallel,Distributed and Network-Based Processing (Euro-PDP’03), 149-156. doi:10.1109/empdp.2003.1183581
Broadcast algorithms for wormhole–switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and do...

Towards a scalable broadcast in wormhole-switched mesh networks

Conference Proceeding
Al-Dubai, A. Y., Ould-Khaoua, M., & Mackenzie, L. M. (2002)
Towards a scalable broadcast in wormhole-switched mesh networks. In Proceedings of the 2002 ACM symposium on Applied computing, 840-844. https://doi.org/10.1145/508791.508955
Broadcast algorithms for wormhole--switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and d...

Cross layer neighbourhood load routing for wireless mesh networks.

Conference Proceeding
Zhao, L., Al-Dubai, A., & Min, G. (2010)
Cross layer neighbourhood load routing for wireless mesh networks. In Proceedings of IEEE IPDPS 2010, (1-7). https://doi.org/10.1109/IPDPSW.2010.5470790
Wireless Mesh Network (WMN) has been considered as a key emerging technology to construct next generation wireless communication networks. It combines the advantages of both m...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

A Simulation Study of Scalable Broadcast in High-Performance Regular Networks

Journal Article
Al-Dubai, A. Y., Ould-Khaoua, M., & Obaidat, M. S. (2004)
A Simulation Study of Scalable Broadcast in High-Performance Regular Networks. SIMULATION, 80(4-5), 207-220. https://doi.org/10.1177/0037549704044325
Broadcast is an important communication operation required by many real-world applications encountered in parallel, cluster, and grid computing environments. Broadcasting on r...

Embedding programming skills to support the student journey in networking, security and digital forensics.

Presentation / Conference
Lawson, A., & Macfarlane, R. (2014, April)
Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh, Edinburgh
The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in acade...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...

A new scalable broadcast algorithm for multiport meshes with minimum communication steps

Journal Article
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003)
A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. doi:10.1016/s0141-9331(02)00094-7
Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size i...