| Khah, Yashar Pourardebil ; Shirvani, Mirsaeid Hosseini ; Taheri, Javid |
A survey study on meta-heuristic-based feature selection approaches of intrusion detection systems in distributed networks
|
2026 |
| Alcala-Marin, Sergi (et al.) |
A Comparative Analysis of Global Mobile Network Aggregators
|
2025 |
| Chaudhary, Rajat (et al.) |
A comprehensive survey on software-defined networking for smart communities
|
2025 |
| Ferretti, Federico (et al.) |
Cross-City Validation and Refinement of a Path Loss Model for NB-IoT in Urban Scenarios
|
2025 |
| Rahal, Manal (et al.) |
Data-driven heat pump management: combining machine learning with anomaly detection for residential hot water systems
|
2025 |
| Abbas, Muhammad Tahir (et al.) |
Dynamic NB-IoT Configuration: A Machine Learning-Driven Optimization Framework
|
2025 |
| Ahmad, Muhammad Ovais |
Effective handling of large scale agile secure solution development teams
|
2025 |
| Rahal, Manal (et al.) |
Enhancing machine learning performance through intelligent data quality assessment: An unsupervised data-centric framework
|
2025 |
| Garshasbi Herabad, Mohammadsadeq (et al.) |
E-PSOGA: An Enhanced Hybrid Metaheuristic for Optimal Edge-to-Cloud Placement of Services with Multi-Version Components
|
2025 |
| Kimura, Bruno (et al.) |
Evaluating Adaptive Video Streaming over Multipath QUIC with Shared Bottleneck Detection
|
2025 |
| Ahmed, Iftikhar (et al.) |
Explainable AI for Depression Detection and Severity Classification From Activity Data: Development and Evaluation Study of an Interpretable Framework
|
2025 |
| Taghinezhad-Niar, Ahmad ; Taheri, Javid |
Fault-Tolerant Cost-Efficient Scheduling for Energy and Deadline-Constrained IoT Workflows in Edge-Cloud Continuum
|
2025 |
| Ahmad, Muhammad Ovais ; Al-Baik, Osama |
Fostering social sustainability in large-scale agile projects: insights from Swedish software companies
|
2025 |
| Zhu, Yuanwei (et al.) |
FPSelector: A Flexible Path Selector for Mobile Augmented Reality Offloading
|
2025 |
| Ergenç, Doğanalp (et al.) |
From design to recovery: Insights on resilient networks from RNDM 2023
|
2025 |
| Klima, Matej (et al.) |
Genetic algorithm for path-based testing of component outage situations in IoT system processes
|
2025 |
| Mahmoudi, Arezou ; Farzinvash, Leili ; Taheri, Javid |
GPTOR: Gridded GA and PSO-based task offloading and ordering in IoT-edge-cloud computing
|
2025 |
| Ahmad, Muhammad Ovais |
Illusion of Agile Scaling: LeSS and SAFeinsights from Two Swedish Companies
|
2025 |
| Samuelsson, Jörgen (et al.) |
Improved workflow for constructing machine learning models: Predicting retention times and peak widths in oligonucleotide separation
|
2025 |
| Gustavsson, Tomas ; Ahmad, Muhammad Ovais ; Saeeda, Hina |
Job satisfaction at risk: Measuring the role of process debt in agile software development
|
2025 |
| Garcia, Johan (et al.) |
Modeling and predicting starlink throughput with fine-grained burst characterization
|
2025 |
| Molaei, Sajjad ; Sabaei, Masoud ; Taheri, Javid |
MRM-PSO: An enhanced particle swarm optimization technique for resource management in highly dynamic edge computing environments
|
2025 |
| Kumar, Pattiwar Shravan ; Saxena, Paresh ; Alay, Özgü |
Next-generation DRL empowered actor-critic schedulers for multipath QUIC in 5G vehicular IoT
|
2025 |
| Iqbal, Muhammad Shahid (et al.) |
P4-QUPF: A P4-Based QoS Framework for 5G-UPF
|
2025 |
| Muhammad, Dost (et al.) |
Randomized Explainable Machine Learning Models for Efficient Medical Diagnosis
|
2025 |
| De Nardis, Luca (et al.) |
Range-Free Positioning in NB-IoT Networks by Machine Learning: Beyond WkNN
|
2025 |
| Ahmed, Bestoun S. (et al.) |
Smart manufacturing: MLOps-enabled event-driven architecture for enhanced control in steel production☆
|
2025 |
| Ahmad, Muhammad Ovais |
Strengthening Large-Scale Agile Teams: The Interplay of High-Quality Relationships, Psychological Safety, and Learning From Failures
|
2025 |
| Rana, Nripendra P. (et al.) |
The Role of Technical and Top Management Support in the Continuance of Intention to Use Business Analytics
|
2025 |
| Jagannathan, Srigoutam ; Sharma, Yogesh ; Taheri, Javid |
Towards Generic Failure-Prediction Models in Large-Scale Distributed Computing Systems
|
2025 |
| Bayram, Firas ; Ahmed, Bestoun S. |
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach
|
2025 |
| Wairimu, Samuel (et al.) |
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment
|
2025 |
| Ahmad, Muhammad Ovais (et al.) |
Unlocking citizen confidence: examining trust and continuance intentions in digital services
|
2025 |
| Ahmad, Muhammad Ovais (et al.) |
Unraveling the Organisational Debt Phenomenon in Software Companies
|
2025 |
| Svensson, Pontus ; Lin, Shuanglan ; Iwaya, Leonardo H |
Usability and accessibility in mHealth stroke apps: An empirical assessment
|
2025 |
| Ahmad, Muhammad Ovais |
A Deep Dive into Self-Regulated Learning: ReflectiveDiaries Role and Implementation Strategies
|
2024 |
| Kousias, Konstantinos (et al.) |
A Large-Scale Dataset of 4G, NB-IoT, and 5G Non-Standalone Network Measurements
|
2024 |
| Bayram, Firas ; Ahmed, Bestoun S. ; Hallin, Erik |
Adaptive data quality scoring operations framework using drift-aware mechanism for industrial applications
|
2024 |
| Mahjoubi, Ayeh ; Ramaswamy, Arunselvan ; Grinnemo, Karl-Johan |
An Online Simulated Annealing-based Task Offloading Strategy for a Mobile Edge Architecture
|
2024 |
| Shulman, Yefim (et al.) |
Conceal or Reveal: (non)disclosure choices in online information sharing
|
2024 |
| Xiang, Zhengzhe (et al.) |
Cost-Effective and Robust Service Provisioning in Multi-Access Edge Computing
|
2024 |
| Ahmad, Muhammad Ovais ; Ahmad, Iftikhar ; Qayum, Fawad |
Early career software developers and work preferences in software engineering
|
2024 |
| Kousias, Konstantinos (et al.) |
Empirical performance analysis and ML-based modeling of 5G non-standalone networks
|
2024 |
| Abbas, Muhammad Tahir (et al.) |
Evaluating the Impact of Pre-Configured Uplink Resources in Narrowband IoT
|
2024 |
| Fahlgren, Maria (et al.) |
Example-Generation Tasks for Computer-Aided Assessment in University Mathematics Education: Insights From A Study Conducted in Two Educational Contexts
|
2024 |
| Fernández, Fátima (et al.) |
Exploiting stream scheduling in QUIC: Performance assessment over wireless connectivity scenarios
|
2024 |
| Galletta, Antonino (et al.) |
Investigating the Applicability of Nested Secret Share for Drone Fleet Photo Storage
|
2024 |
| Kitkowska, Agnieszka ; Alaqra, Ala Sarah ; Wästlund, Erik |
Lockdown locomotion: the fast-forwarding effects of technology use on digital well-being due to COVID-19 restrictions
|
2024 |
| Pieskä, Marcus (et al.) |
Low-delay cost-aware multipath scheduling over dynamic links for access traffic steering, switching, and splitting
|
2024 |
| Saeeda, Hina ; Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Navigating social debt and its link with technical debt in large-scale agile software development projects
|
2024 |
| Sengupta, Jayasree (et al.) |
On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation and Dataset
|
2024 |
| Al-Baik, Osama (et al.) |
Organizational debt—Roadblock to agility in software engineering: Exploring an emerging concept and future research for software excellence
|
2024 |
| Pieskä, Marcus (et al.) |
Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling
|
2024 |
| Maqbool, Bilal ; Herold, Sebastian |
Potential effectiveness and efficiency issues in usability evaluation within digital health: A systematic literature review
|
2024 |
| Pallas, Frank (et al.) |
Privacy Engineering From Principles to Practice: A Roadmap
|
2024 |
| Iwaya, Leonardo H (et al.) |
Privacy impact assessments in the wild: A scoping review
|
2024 |
| Parastar, Paniz (et al.) |
Rethinking the mobile edge for vehicular services
|
2024 |
| Taghinezhad-Niar, Ahmad ; Taheri, Javid |
Security, Reliability, Cost, and Energy-Aware Scheduling of Real-Time Workflows in Compute-Continuum Environments
|
2024 |
| Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
The Pandora's box of social, process, and people debts in software engineering
|
2024 |
| Larsson, Emil ; Sigholm, Johan |
Towards econometric estimation of the cost of cyber conflict
|
2024 |
| Abbas, Muhammad Tahir (et al.) |
Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things
|
2024 |
| Risdianto, Aris Cahyadi ; Usman, Muhammad ; Rathore, Muhammad Ahmad |
Transforming Network Management: Intent-Based Flexible Control Empowered by Efficient Flow-Centric Visibility
|
2024 |
| Bayram, Firas ; Ahmed, Bestoun S. |
A domain-region based evaluation of ML performance robustness to covariate shift
|
2023 |
| Muhammad, Dost (et al.) |
A Generalized Deep Learning Approach to Seismic Activity Prediction
|
2023 |
| Chahed, Hamza (et al.) |
AIDA—Aholistic AI-driven networking and processing framework for industrial IoT applications
|
2023 |
| Ahmad, Muhammad Ovais (et al.) |
An Empirical Investigation on Business Analytics in Software and Systems Development Projects
|
2023 |
| Frattini, Julian (et al.) |
An initial theory to understand and manage requirements engineering debt in practice
|
2023 |
| Bayram, Firas (et al.) |
DA-LSTM: A dynamic drift-adaptive learning framework for interval load forecasting with LSTM networks
|
2023 |
| Kitkowska, Agnieszka (et al.) |
Designing for privacy: Exploring the influence of affect and individual characteristics on users’ interactions with privacy policies
|
2023 |
| Iwaya, Leonardo H (et al.) |
Early Labour App: Developing a practice-based mobile health application for digital early labour support
|
2023 |
| Sundberg, Simon (et al.) |
Efficient continuous latency monitoring with eBPF
|
2023 |
| HoseinyFarahabady, MohammadReza (et al.) |
Energy efficient resource controller for Apache Storm
|
2023 |
| Caso, Giuseppe (et al.) |
Experimentation in 5G and beyond Networks: State of the Art and the Way Forward
|
2023 |
| Saeeda, Hina ; Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Identifying and Categorizing Challenges in Large-Scale Agile Software Development Projects: Insights from Two Swedish Companies
|
2023 |
| Kitkowska, Agnieszka ; Ahlin, Karin |
Improving Well-Being in Schools - Lessons Learned from IoT Experts
|
2023 |
| Khan, Iqra Sadaf ; Ahmad, Muhammad Ovais ; Majava, Jukka |
Industry 4.0 innovations and their implications: An evaluation from sustainable development perspective
|
2023 |
| Shulman, Yefim ; Kitkowska, Agnieszka ; Meyer, Joachim |
Informing Users: Effects of Notification Properties and User Characteristics on Sharing Attitudes
|
2023 |
| Sharma, Yogesh (et al.) |
Intent Negotiation Framework for Intent-Driven Service Management
|
2023 |
| Nougnanke, Benoit (et al.) |
ML-Based Performance Modeling in SDN-Enabled Data Center Networks
|
2023 |
| Nobis, Harrison (et al.) |
Modal laminar–turbulent transition delay by means of topology optimization of superhydrophobic surfaces
|
2023 |
| Andersson, Kerstin |
Molecular properties of TCNQ and anions
|
2023 |
| Alizadeh Noghani, Kyoomars (et al.) |
Multi-Objective genetic algorithm for fast service function chain reconfiguration
|
2023 |
| Iwaya, Leonardo H (et al.) |
On the privacy of mental health apps: An empirical investigation and its implications for app development
|
2023 |
| Rico, Delia (et al.) |
Performance analysis of The Multi-connection Tactile Internet Protocol over 5G
|
2023 |
| Gokan Khan, Michel (et al.) |
PerfSim: A Performance Simulator for Cloud Native Microservice Chains
|
2023 |
| De Nardis, Luca (et al.) |
Positioning by Multicell Fingerprinting in UrbanNB-IoT Networks
|
2023 |
| Iwaya, Leonardo H ; Babar, Muhammad Ali ; Rashid, Awais |
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Aspects, and Current Practices
|
2023 |
| Afifi, Haitham ; Ramaswamy, Arunselvan ; Karl, Holger |
Reinforcement learning for autonomous vehicle movements in wireless multimedia applications
|
2023 |
| Taghinezhad-Niar, Ahmad ; Taheri, Javid |
Reliability, Rental-Cost and Energy-Aware Multi-Workflow Scheduling on Multi-Cloud Systems
|
2023 |
| Nammouchi, Amal (et al.) |
Robust opportunistic optimal energy management of a mixed microgrid under asymmetrical uncertainties
|
2023 |
| Chaudhary, Rajat ; Kumar, Neeraj |
SecGreen: Secrecy Ensured Power Optimization Scheme for Software-Defined Connected IoV
|
2023 |
| Klima, Matej (et al.) |
Specialized path-based technique to test Internet of Things system functionality under limited network connectivity
|
2023 |
| Alaqra, Ala Sarah ; Karegar, Farzaneh ; Fischer-Hübner, Simone |
Structural and functional explanations for informing lay and expert users: the case of functional encryption
|
2023 |
| Hoepman, Jaap-Henk |
Two faces of blindness
|
2023 |
| Hosseini, Ahmad ; Wadbro, Eddie |
A hybrid greedy randomized heuristic for designing uncertain transport network layout
|
2022 |
| Johansen, Johanna (et al.) |
A multidisciplinary definition of privacy labels
|
2022 |
| Usman, Muhammad (et al.) |
A Survey on Observability of Distributed Edge & Container-based Microservices
|
2022 |
| Samoaa, Hazem Peter (et al.) |
A systematic mapping study of source code representation for deep learning in software engineering
|
2022 |
| Islami, Lejla ; Fischer-Hübner, Simone ; Papadimitratos, Panos |
Capturing drivers’ privacy preferences for intelligent transportation systems: An intercultural perspective
|
2022 |
| Taghinezhad-Niar, Ahmad ; Pashazadeh, Saeid ; Taheri, Javid |
Energy-efficient workflow scheduling with budget-deadline constraints for cloud
|
2022 |
| Abbas, Muhammad Tahir (et al.) |
Energy-Saving Solutions for Cellular Internet of Things - A Survey
|
2022 |
| Kumar Singh, Suneet (et al.) |
Hybrid P4 Programmable Pipelines for 5G gNodeB and User Plane Functions
|
2022 |
| Taheri, Javid ; Dustdar, Schahram ; Villari, Massimo |
IEEE Transactions on Sustainable Computing Special Issue on Sustainability of Fog/Edge Computing Systems
|
2022 |
| Bhamare, Deval (et al.) |
IntOpt: In-band Network Telemetry optimization framework to monitor network slices using P4
|
2022 |
| Ali, Usman (et al.) |
Large-Scale Dataset for the Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks
|
2022 |
| Al-Dulaimy, Auday (et al.) |
MultiScaler: A Multi-Loop Auto-Scaling Approach for Cloud-Based Applications
|
2022 |
| Rechtberger, Vaclav (et al.) |
Novel Strategy Generating Variable-Length State Machine Test Paths
|
2022 |
| Redder, Adrian ; Ramaswamy, Arunselvan ; Karl, Holger |
Practical Network Conditions for the Convergence of Distributed Optimization
|
2022 |
| Taghinezhad-Niar, Ahmad ; Pashazadeh, Saeid ; Taheri, Javid |
QoS-aware online scheduling of multiple workflows under task execution time uncertainty in clouds
|
2022 |
| Haile, Habtegebreil Kassaye (et al.) |
RBBR: A Receiver-driven BBR in QUIC for Low-latency in Cellular Networks
|
2022 |
| Mesodiakaki, Agapi ; Zola, Enrica ; Kassler, Andreas |
Robust and energy-efficient user association and traffic routing in B5G HetNets
|
2022 |
| Klima, Matej (et al.) |
Selected Code-Quality Characteristics and Metrics for Internet of Things Systems
|
2022 |
| Aumayr, E. (et al.) |
Service-based Analytics for 5G open experimentation platforms
|
2022 |
| Venema, Marloes ; Alpár, Greg ; Hoepman, Jaap-Henk |
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
|
2022 |
| Santos, Ricardo (et al.) |
Towards the Optimal Orchestration of Steerable mmWave Backhaul Reconfiguration
|
2022 |
| Rabitsch, Alexander (et al.) |
Utilizing Multi-Connectivity to Reduce Latency and Enhance Availability for Vehicle to Infrastructure Communication
|
2022 |
| Sommestad, Teodor ; Holm, Hannes ; Steinvall, Daniel |
Variables influencing the effectiveness of signature-based network intrusion detection systems
|
2022 |
| Söderman, Pehr (et al.) |
A Comparative Analysis of Buffer Management Algorithms for Delay Tolerant Wireless Sensor Networks
|
2021 |
| Hatamian, Majid (et al.) |
A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps
|
2021 |
| Skorin-Kapov, Nina (et al.) |
A Randomized Greedy Heuristic for Steerable Wireless Backhaul Reconfiguration
|
2021 |
| Wu, Hongjia (et al.) |
A Survey on Multipath Transport Protocols Towards 5G Access Traffic Steering, Switching and Splitting
|
2021 |
| Kader, Md. Abdul ; Zamli, Kamal Z. ; Ahmed, Bestoun S. |
A systematic review on emperor penguin optimizer
|
2021 |
| Lindegren, Daniel (et al.) |
An evaluation of three designs to engage users when providing their consent on smartphones
|
2021 |
| Aslanpour, M. S. (et al.) |
AutoScaleSim: A simulation toolkit for auto-scaling Web applications in clouds
|
2021 |
| Min-Allah, Nasro (et al.) |
Deployment of real-time systems in the cloud environment
|
2021 |
| Sharma, Yogesh (et al.) |
Dynamic Resource Provisioning for Sustainable Cloud Computing Systems in the Presence of Correlated Failures
|
2021 |
| Caso, Giuseppe (et al.) |
Empirical Models for NB-IoT Path Loss in an Urban Scenario
|
2021 |
| Haile, Habtegebreil Kassaye (et al.) |
End-to-end congestion control approaches for high throughput and low delay in 4G/5G cellular networks
|
2021 |
| Nakamura, M. (et al.) |
Experimental verification of SDN/NFV in integrated mmwave access and mesh backhaul networks
|
2021 |
| Murmann, Patrick ; Karegar, Farzaneh |
From Design Requirements to Effective Privacy Notifications: Empowering mHealth Users to Make Informed Decisions
|
2021 |
| Zamli, K. Z. (et al.) |
Hybrid Henry gas solubility optimization algorithm with dynamic cluster-to-algorithm mapping
|
2021 |
| Khan, Iqra Sadaf ; Ahmad, Muhammad Ovais ; Majava, Jukka |
Industry 4.0 and Sustainable Development: A Systematic Mapping of Triple Bottom Line, Circular Economy and Sustainable Business Models Perspectives
|
2021 |
| Silva, Celso F. (et al.) |
IoT Traffic Offloading with MultiPath TCP
|
2021 |
| Sundberg, Simon ; Garcia, Johan |
Locating eNodeBs through sectorization inference: Sector fitting evaluated on a railway use case
|
2021 |
| Alaqra, Ala Sarah ; Kane, Bridget ; Fischer-Hübner, Simone |
Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives
|
2021 |
| Lutu, A. (et al.) |
Measuring Roaming in Europe: Infrastructure and Implications on Users QoE
|
2021 |
| Wu, Hongjia (et al.) |
Multipath Scheduling for 5G Networks: Evaluation and Outlook
|
2021 |
| Caso, Giuseppe (et al.) |
NB-IoT Random Access: Data-driven Analysis and ML-based Enhancements
|
2021 |
| Deng, Shuiguang (et al.) |
Optimal Application Deployment in Resource Constrained Distributed Edges
|
2021 |
| Murmann, Patrick (et al.) |
Reconciling the what, when and how of privacy notifications in fitness tracking scenarios
|
2021 |
| Zverev, Mihail (et al.) |
Robust QUIC: Integrating Practical Coding in a Low Latency Transport Protocol
|
2021 |
| Padovan, Diego ; Taheri, Javid ; d'Amore, Fabrizio |
Safeguarding Information in Service Science with Service Integration
|
2021 |
| Fischer-Hübner, Simone (et al.) |
Stakeholder perspectives and requirements on cybersecurity in Europe
|
2021 |
| Vestin, Jonathan (et al.) |
Towards in-network event detection and filtering for publish/subscribe communication using programmable data planes
|
2021 |
| Bawack, Ransome Epie ; Ahmad, Muhammad Ovais |
Understanding business analytics continuance in agile information system development projects: an expectation-confirmation perspective
|
2021 |
| Caso, Giuseppe (et al.) |
User-Centric Radio Access Technology Selection: A Survey of Game Theory Models and Multi-Agent Learning Algorithms
|
2021 |
| Ahmad, Iftikhar (et al.) |
Using algorithmic trading to analyze short term profitability of Bitcoin
|
2021 |
| Taghinezhad-Niar, A. ; Pashazadeh, S. ; Taheri, Javid |
Workflow scheduling of scientific workflows under simultaneous deadline and budget constraints
|
2021 |
| Diaz Zayas, Almudena (et al.) |
A Modular Experimentation Methodology for 5G Deployments: The 5GENESIS Approach
|
2020 |
| Ali Shah, Usman (et al.) |
Accelerating Revised Simplex Method using GPU-based Basis Update
|
2020 |
| Abbas, Muhammad Tahir (et al.) |
An adaptive approach to vehicle trajectory prediction using multimodel Kalman filter
|
2020 |
| Ahmed, Bestoun S. (et al.) |
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications
|
2020 |
| Al-Dulaimy, Auday (et al.) |
BWSLICER: A bandwidth slicing framework for cloud data centers
|
2020 |
| Kousias, Konstantinos (et al.) |
Coverage and Deployment Analysis of Narrowband Internet of Things in the Wild
|
2020 |
| Bhamare, Deval (et al.) |
Cybersecurity for industrial control systems: A survey
|
2020 |
| Yaseen, Azeema (et al.) |
Dimensionality Reduction for Internet of Things Using the Cuckoo Search Algorithm: Reduced Implications of Mesh Sensor Technologies
|
2020 |
| Deng, Shuiguang (et al.) |
Dynamical Resource Allocation in Edge for Trustable Internet-of-Things Systems: A Reinforcement Learning Method
|
2020 |
| Ahmad, Iftikhar (et al.) |
Fake News Detection Using Machine Learning Ensemble Methods
|
2020 |
| Hasan, Imad H. (et al.) |
Generation and Application of Constrained Interaction Test Suites Using Base Forbidden Tuples with a Mixed Neighborhood Tabu Search
|
2020 |
| Voronkov, Artem ; Martucci, Leonardo ; Lindskog, Stefan |
Measuring the Usability of Firewall Rule Sets
|
2020 |
| Persson, Lars-Erik ; Tephnadze, George ; Tutberidze, Georgi |
On the boundedness of subsequences of Vilenkin-Fejer means on the martingale hardy spaces
|
2020 |
| Ahmad, Muhammad Ovais |
On the Efficiency of Supernodal Factorization in Interior-Point Method Using CPU-GPU Collaboration
|
2020 |
| Ahmad, Iftikhar (et al.) |
Optimizing Pretrained Convolutional Neural Networks for Tomato Leaf Disease Detection
|
2020 |
| Wu, Hongjia (et al.) |
Peekaboo: Learning-Based Multipath Scheduling for Dynamic Heterogeneous Environments
|
2020 |
| Jibran, Muhammad Ali (et al.) |
Position prediction for routing in software defined internet of vehicles
|
2020 |
| Kitkowska, Agnieszka (et al.) |
Psychological Effects and Their Role in Online Privacy Interactions: A Review
|
2020 |
| Iwaya, Leonardo H ; Ahmad, Aakash ; Ali Babar, M. |
Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study
|
2020 |
| Khoshkholghi, Mohammad Ali (et al.) |
Service Function Chain Placement for Joint Cost and Latency Optimization
|
2020 |
| Nelson, Boel ; Reuben, Jenni |
SoK: Chasing Accuracy and Privacy, and Catching Both in Differentially Private Histogram Publication
|
2020 |
| Bures, Miroslav (et al.) |
Testing the Usability and Accessibility of Smart TV Applications Using an Automated Model-based Approach
|
2020 |
| Karegar, Farzaneh ; Pettersson, John Sören ; Fischer-Hübner, Simone |
The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention
|
2020 |
| Oljira, Dejene Boru (et al.) |
Validating the Sharing Behavior and Latency Characteristics of the L4S Architecture
|
2020 |
| Pulls, Tobias ; Dahlberg, Rasmus |
Website fingerprinting with website oracles
|
2020 |
| Salihu, Ibrahim-Anka (et al.) |
AMOGA: A Static-Dynamic Model Generation Strategy for Mobile Apps Testing
|
2019 |
| Ahmed, Bestoun S. (et al.) |
Aspects of Quality in Internet of Things (IoT) Solutions: A Systematic Mapping Study
|
2019 |
| Ahmed, Bestoun S. (et al.) |
Code-Aware Combinatorial Interaction Testing
|
2019 |
| Momen, Nurul ; Hatamian, Majid ; Fritsch, Lothar |
Did App Privacy Improve After the GDPR?
|
2019 |
| Murmann, Patrick |
Eliciting Design Guidelines for Privacy Notifications in mHealth Environments
|
2019 |
| Bures, Miroslav ; Ahmed, Bestoun S. |
Employment of multiple algorithms for optimal path-based test selection strategy
|
2019 |
| Mohideen, Althaff C. (et al.) |
Evaluating the impact of transport mechanisms on web performance for effective web access
|
2019 |
| Ahmed, Bestoun S. ; Bures, Miroslav |
EvoCreeper: Automated Black-Box Model Generation for Smart TV Applications
|
2019 |
| Lenhard, Jörg ; Blom, Martin ; Herold, Sebastian |
Exploring the suitability of source code metrics for indicating architectural inconsistencies
|
2019 |
| Fritsch, Lothar ; Fischer-Hübner, Simone |
Implications of Privacy & Security Research for the Upcoming Battlefield of Things
|
2019 |
| Hurtig, Per (et al.) |
Low-Latency Scheduling in MPTCP
|
2019 |
| Framner, Erik (et al.) |
Making secret sharing based cloud storage usable
|
2019 |
| Santos, Ricardo (et al.) |
mmWave Backhaul Testbed Configurability Using Software-Defined Networking
|
2019 |
| Iwaya, Leonardo H (et al.) |
Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats
|
2019 |
| Ahmad, Muhammad Ovais |
Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)
|
2019 |
| Mancuso, Vincenzo (et al.) |
Results from running an experiment as a service platform for mobile broadband networks in Europe
|
2019 |
| Abbas, Muhammad Tahir ; Muhammad, Afaq ; Song, Wang-Cheol |
SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach
|
2019 |
| Tegegne, Esubalew Workineh ; Seppänen, Pertti ; Ahmad, Muhammad Ovais |
Software development methodologies and practices in start-ups
|
2019 |
| Gupta, Lay (et al.) |
The P-ART framework for placement of virtual network services in a multi-cloud environment
|
2019 |
| Mahmoud, Thair Shakir ; Ahmed, Bestoun S. ; Hassan, Mohammed Y. |
The role of intelligent generation control algorithms in optimizing battery energy storage systems size in microgrids: A case study from Western Australia
|
2019 |
| Marotta, Antonio ; Avallone, Stefano ; Kassler, Andreas |
A Joint Power Efficient Server and Network Consolidation approach for virtualized data centers
|
2018 |
| Vromans, Arthur ; Muntean, Adrian ; van de Ven, Fons |
A mixture theory-based concrete corrosion model coupling chemical reactions, diffusion and mechanics
|
2018 |
| Fazio, Maria (et al.) |
A Note on the Convergence of IoT, Edge, and Cloud Computing in Smart Cities
|
2018 |
| Høiland-Jørgensen, Toke |
Analyzing the Latency of Sparse Flows in the FQ-CoDel Queue Management Algorithm
|
2018 |
| Ali, Nour (et al.) |
Architecture consistency: State of the practice, challenges and requirements
|
2018 |
| Ali, Nour (et al.) |
Architecture consistency: State of the practice, challenges and requirements (vol 23, pg 224, 2018)
|
2018 |
| Geiger, Matthias (et al.) |
BPMN2.0: The state of support and implementation
|
2018 |
| Deng, Shuiguang (et al.) |
Composition-Driven IoT Service Provisioning in Distributed Edges
|
2018 |
| Tran, Gia Khanh (et al.) |
Context-based dynamic meshed backhaul construction for 5G heterogeneous networks
|
2018 |
| Alaqra, Ala Sarah ; Fischer-Hübner, Simone ; Framner, Erik |
Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients
|
2018 |
| Ciallellla, Alessandro (et al.) |
Free to move or trapped in your group: Mathematical modeling of information overload and coordination in crowded populations
|
2018 |
| Casas, Israel (et al.) |
GA-ETI: An enhanced genetic algorithm for the scheduling of scientific workflows in cloud environments
|
2018 |
| Garcia, Johan ; Korhonen, Topi |
On Runtime and Classification Performance of the Discretize-Optimize (DISCO) Classification Approach
|
2018 |
| Atxutegi, Eneko (et al.) |
On the use of TCP BBR in cellular networks
|
2018 |
| Mesodiakaki, Agapi (et al.) |
Optimal User Association, Backhaul Routing and Switching off in 5G Heterogeneous Networks with Mesh Millimeter Wave Backhaul Links
|
2018 |
| Nasim, Robayet ; Zola, Enrica ; Kassler, Andreas |
Robust Optimization for Energy-Efficient Virtual Machine Consolidation in Modern Datacenters
|
2018 |
| Dobell, Elaine ; Herold, Sebastian ; Buckley, Jim |
Spreadsheet Error Types and Their Prevalence in a Healthcare Context
|
2018 |
| Voronkov, Artem (et al.) |
Systematic Literature Review on Usability of Firewall Configuration
|
2018 |
| Eklund, Johan ; Grinnemo, Karl-Johan ; Brunström, Anna |
Using multiple paths in SCTP to reduce latency for signaling traffic
|
2018 |
| Casas, Israel (et al.) |
A balanced scheduler with data reuse and replication for scientific workflows in cloud computing systems
|
2017 |
| Marotta, Antonio (et al.) |
A fast robust optimization-based heuristic for the deployment of green virtual network functions
|
2017 |
| Ramezani, Fahimeh (et al.) |
A Multi-Objective Load Balancing System for Cloud Environments
|
2017 |
| Kulyk, Oksana (et al.) |
Coercion-resistant proxy voting
|
2017 |
| Papastergiou, Giorgos (et al.) |
De-Ossifying the Internet Transport Layer: A Survey and Future Perspectives
|
2017 |
| Mesodiakaki, Agapi (et al.) |
Energy- and Spectrum-Efficient User Association in Millimeter-Wave Backhaul Small-Cell Networks
|
2017 |
| Anwar, Adnan (et al.) |
HPC-Based Intelligent Volt/VAr Control of Unbalanced Distribution Smart Grid in the Presence of Noise
|
2017 |
| Khademi, Naeem (et al.) |
NEAT: A Platform- and Protocol-Independent Internet Transport API
|
2017 |
| Marotta, Antonio (et al.) |
On the energy cost of robustness for green virtual network function placement in 5G virtualized infrastructures
|
2017 |
| Zola, Enrica ; Kassler, Andreas |
Optimising for Energy or Robustness? Trade-off for VM Consolidation under Uncertainty
|
2017 |
| Sharif, Shaghahyegh (et al.) |
Privacy-Aware Scheduling SaaS in High Performance Computing Environments
|
2017 |
| Mayer, Peter (et al.) |
Productivity vs security: mitigating conflicting goals in organizations
|
2017 |
| Casas, Israel (et al.) |
PSO-DS: a scheduling engine for scientific workflow managers
|
2017 |
| Nguyen, Van-Giang (et al.) |
SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey
|
2017 |
| Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen |
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
|
2017 |
| Murmann, Patrick ; Fischer-Hübner, Simone |
Tools for Achieving Usable Ex Post Transparency: A Survey
|
2017 |
| Volkamer, Melanie (et al.) |
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
|
2017 |
| Taheri, Javid ; Zomaya, Albert Y. ; Kassler, Andreas |
vmBBProfiler: A BlackBox Profiling Approach to Quantify Sensitivity of Virtual Machines to Shared Cloud Resources
|
2017 |
| Deng, Shuiguang (et al.) |
Cost Performance Driven Service Mashup: A Developer Perspective
|
2016 |
| Sá, João (et al.) |
Georeferenced and Secure Mobile Health System for Large Scale Data Collection in Primary Care
|
2016 |
| Curado, Marilia (et al.) |
Guest editorial: Special issue on mobile wireless networks
|
2016 |
| Yedugundla, Venkata Kiran (et al.) |
Is Multi-Path Transport Suitable for Latency Sensitive Traffic?
|
2016 |
| Zola, Enrica ; Kassler, Andreas |
Minimizing the impact of the handover for mobile users in WLAN: A study on performance optimization
|
2016 |
| Deng, Shuiguang (et al.) |
Mobility-Aware Service Composition in Mobile Communities
|
2016 |
| Lenhard, Jörg ; Wirz, Guido |
Portability of executable service-oriented processes: Metrics and validation
|
2016 |
| Hernandez Benet, Cristian ; Kassler, Andreas ; Zola, Enrica |
Predicting expected TCP throughput using genetic algorithm
|
2016 |
| Briscoe, Bob (et al.) |
Reducing Internet Latency: A Survey of Techniques and Their Merits
|
2016 |
| Neumann, Stephan (et al.) |
SecIVo: a quantitative security evaluation framework for internet voting schemes
|
2016 |
| Deng, Shuiguang (et al.) |
Toward Mobile Service Computing: Opportunities and Challenges
|
2016 |
| Kristensson, Per ; Brunström, Anna ; Pedersen, Tore |
Affective forecasting of value creation: Professional nurses’ ability to predict and remember the experienced value of a telemedicine diagnostics ICT service
|
2015 |
| Rajiullah, Mohammad (et al.) |
An Evaluation of Tail Loss Recovery Mechanisms for TCP
|
2015 |
| Coutinho, Nuno (et al.) |
Dynamic Dual-Reinforcement-Learning Routing Strategies for Quality of Experience-aware Wireless Mesh Networking
|
2015 |
| Popova, Antoaneta (et al.) |
Finding URLs in images by text extraction in DCT domain, recognition and matching in dictionary
|
2015 |
| Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie |
Nudging Bank Account Holders Towards More Secure PIN Management
|
2015 |
| Pulls, Tobias ; Slamanig, Daniel |
On the Feasibility of (Practical) Commercial Anonymous Cloud Storage
|
2015 |
| Høiland-Jørgensen, Toke ; Hurtig, Per ; Brunstrom, Anna |
The Good, the Bad and the WiFi: Modern AQMs in a residential setting
|
2015 |
| Dely, Peter (et al.) |
BEST-AP: Non-intrusive estimation of available bandwidth and its application for dynamic access point selection
|
2014 |
| Andersson, Kerstin |
Exact Probability Distribution versus Entropy
|
2014 |
| Zola, Enrica ; Barcelo, Francisco ; Kassler, Andreas |
Multi-objective Optimization of WLAN Associations with Improved Handover Costs
|
2014 |
| Eldh, Sigrid (et al.) |
Towards a Test Automation Improvement Model (TAIM)
|
2014 |
| Dely, Peter (et al.) |
A software-defined networking approach for handover management with real-time video in WLANs
|
2013 |
| Dely, Peter ; Vestin, Jonathan ; Kassler, Andreas |
CloudMAC - Using OpenFlow to Process 802.11 MAC Frames in the Cloud
|
2013 |
| Budzisz, Łukasz (et al.) |
A taxonomy and survey of SCTP research
|
2012 |