A scalable plane-based broadcast algorithm for 3D-Mesh networks
Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
A scalable plane-based broadcast algorithm for 3D-Mesh networks. In Proceedings of the Eleventh Euromicro Conference on Parallel,Distributed and Network-Based Processing (Euro-PDP’03), 149-156. doi:10.1109/empdp.2003.1183581
Broadcast algorithms for wormhole–switched meshes
have been widely reported in the literature. However,
most of these algorithms handle broadcast in a sequential
manner and do...
An efficient path-based multicast algorithm for mesh networks
Conference Proceeding
Mackenzie, L., Ould-Khaoua, M., Al-Dubai, Y., Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
An efficient path-based multicast algorithm for mesh networks. In Proceedings International Parallel and Distributed Processing Symposium, 283-290. doi:10.1109/ipdps.2003.1213509
This paper presents a new multicast path-based algorithm, referred to here as the qualified groups (QG for short), which can achieve a high degree of parallelism and low commu...
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop
Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019)
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035
The unbroken amplfication of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for d...
Mastering Pascal and Delphi programming.
Book
Buchanan, W. J. (1997)
Mastering Pascal and Delphi programming. Macmillan Press
This work provides an introduction to programming with Pascal and extends this to show how Borland Delphi is used to develop Microsoft Windows programs. It provides real life ...
Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet
Conference Proceeding
Paulin, A., & Thuemmler, C. (2016)
Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, (245-248). https://doi.org/10.1109/HealthCom.2016.7749462
This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in tw...
Determinants of Next Generation e-Health Network and Architecture Specifications
Conference Proceeding
Thuemmler, C., Paulin, A., & Lim, A. K. (2016)
Determinants of Next Generation e-Health Network and Architecture Specifications. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), (233-238). https://doi.org/10.1109/HealthCom.2016.7749460
This paper summarizes the determinants for future e-Health network and IT infrastructures in the health care environment. The paper bases on observations conducted as part of ...
Mastering Delphi programming.
Book
Buchanan, W. J. (2001)
Mastering Delphi programming. Palgrave Publishers
This book provides an introduction to the use of Delphi Version 3/4 in developing programs, full of real-life applications including serial communications, internet programmin...
A social-technological alignment matrix.
Conference Proceeding
Thuemmler, C., Mival, O., Lim, A. K., Holanec, I., & Fricker, S. (2015)
A social-technological alignment matrix. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 200-205. https://doi.org/10.1109/healthcom.2014.7001841
This paper refers to the term " implementation " as the Especially in health care this has proven to be a very critical phase Although strategies such as requirements engineer...
Investigating false positive reduction in HTTP via procedure analysis.
Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...
Integrated many-to-many multicast addressing and access control method
Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...