|
2013 |
Dirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair, and Ahmad Zmily,"An application security framework for near field communication",12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on ,Melbourne, Australia,2013 |
|
2013 |
A. Zmily, D. Abu-Saymeh, DeDI Abou-Tair,"Identity Hopping Based Security Framework for Social Media Applications",International Conference on Soft Computing and Software Engineering,San Francisco, USA,2013 |
|
2013 |
Feras Al-Hawari, Taranjit Kukal, Dennis Nagle, Raymond Komow, and Jilin Tan,"System and method for adapting behavioral models to fluctuations in parametrically integrated environment",U.S. Patent 8,452,582,issued May 28,2013 [View] |
|
2013 |
Feras Al-Hawari, Jilin Tan, and Jose Schutt-Aine,"Method and system for adaptive modeling and simulation of lossy transmission lines",U.S. Patent 8,386,216,issued February 26,2013 [View] |
|
2013 |
Mohamed Bourimi, Dogan Kesdogan, Marcel Heupel, Dhiah el Diehn I. Abou-Tair, and Niki Lambropoulos,"Pets at CSCL service: Underutilised potentials for privacy enhancing distance education",J. UCS, 19(7):912-931,2013 |
|
2013 |
Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Mazen Kharbutli ,"An Efficient Backup Technique for Database Systems Based on Threshold Sharing",Journal of Computers,Vol 8,2013 |
|
2013 |
DeDI Abou-Tair, M. Bourimi, R. Tesoriero, D. Kesdgoan, M. Heupel, B. Ueberschaer ,"An end-user tailorable generic framework for privacy-preserving location-based mobile applications",Journal of Applied Mathematics & Information Sciences,Vol 7, PP:2137-2148,2013 |
|
2013 |
M. Bourimi, D. Kesdogan, M. Heupel, DeDI Abou-Tair, N. Lambropoulos ,"PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education",Journal of Universal Computer Science,Vol. 19, No. 7. PP:912-931,2013 |
|
2013 |
Barghash A, & Helms V,"Transferring functional annotations of membrane transporters on the basis of sequence similarity and sequence motifs.",BMC bioinformatics,2013 |
|
2013 |
A. Zmily, C. Class, Y. Mowafi, D. Abu-Saymeh,"An Interactive Educational Environment for Preschool Children",15th Intl. Conf. on Enterprise Information Systems,Angers, France,2013 |
|
2013 |
Dr. Ismail Hababeh, Dr. Issa Khalil, Dr. Abdallah Khreishah, Dr. Samir Bataineh,"Promoting Wormhole Security Approaches For Ad-Hoc Networks",Proceedings of the International Conference on Computational & Network Technologies,December 2-4,Adelaide, South Australia, Australia,2013 |
|
2013 |
Seon Ho Kim, Ying Lu, Junyuan Shi, Abdullah Alfarrarjeh, Cyrus Shahabi, Guanfeng Wang, Roger Zimmermann,"Frame Selection Algorithms for Automatic Generation of Panoramic Images from Crowdsourced Geo-tagged Videos",In Proceedings of the 13th International Symposium on Web and Wireless Geographical Information Systems (W2GIS),pp. 67 - 84, Seoul, South Korea, May 29-30,2013 |
|
2013 |
Dhiah el Diehn I. Abou-Tair, M. Bourimi, R. Tesoriero, D. Kesdgoan, M. Heupel. B. Ueberschaer,"An end-user tailorable generic framework for privacy-preserving location-based mobile applications",Journal of Applied Mathematics & Information Sciences. ,Volume 7, No. 6 , PP:2137-2148,2013 |
|
2012 |
M. Bourimi M, Barth T, D. Kesdogan, Dhiah el Diehn I. Abou-Tair, F. Hermann, S. Thiel,"Using distributed user interfaces in collaborative, secure and privacy-preserving software environments",International Journal of Human-Computer Interaction 28(11), 748-753,2012 |
|
2012 |
Rami Alazrai and C. S. George Lee,"Connectionist-Based Approach for Human Action Identification", IEEE International Conference of Robotics and Automation, St. Paul, Minnesota,2012 |