|
2011 |
Mohammad Al-Addous and Christina B. Class,"Design and Evaluation of an Instructional Solar Energy Technologies Lab",International Journal of Online Engineering (IJOE) 7(1):6-13,2011 |
|
2011 |
Dhiah el Diehn I. Abou-Tair, Ingo Koster, and Kathrin Hofke,"Security and privacy requirements in interactive TV",Multimedia Syst., 17(5):393{408,2011 |
|
2011 |
Sahel Alouneh, Sa’ed Abed, Ashraf Hasan Bqerat, Bassam Jamil Mohd,"A Methodology for Distributed Virtual Memory Improvement", proceeding of the international conference of Informatics Engineering and Information Science (ICIEIS), Lecture Notes in Computer Science LNCS, , Kuala Lumpur, Malaysia, Springer, Vol. 253, pp. 378–384,2011 |
|
2011 |
M. Al-Addous, C. Class,"Acquiring expertise in a lab for solar energy technologies",In IEEE EDUCON 2011 Learning Environments and Ecosystems in Engineering Education,2011 |
|
2010 |
C. Class, D. Zellhöfer,"Gewissensbits - Wie würden Sie urteilen? Fallbeispiel Anonymisierer",Informatik Spektrum,Vol. 33(4),2010 |
|
2010 |
Mohamed Bourimi, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan, Thomas Barth, and Kathrin Hofke,"Evaluating potentials of internet- and web-based socialtv in the light of privacy",In Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010,Minneapolis, Minnesota, USA,2010 |
|
2010 |
Feras Al-Hawari, Taranjit Kukal , Ambrish Varma, Wenliang Dai, and John Lin,"Extending/Leveraging IBIS Constructs to Model High-Speed I/Os and Packages using AMI, Spice, and S-Parameters",Asian IBIS Summit,Shenzhen, China, November,2010 |
|
2010 |
Dr. Ismail Hababeh,"Intelligent Network Communications for Distributed Database Systems",Proceedings of the Second International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2010),IEEE- DOI 10.1109/DBKDA.2010, April 11-16,Les Menuries, France,2010 |
|
2010 |
M. Bourimi, DeDI, Abou-Tair, D. Kesdogan, T. Barth, K. Höfke ,"Evaluating Potentials of Internet- and Web-based Socialtv in the Light of Privacy",Social Computing (SocialCom), 2010 IEEE Second International Conference on., aug., 2010. , pp. 1135 -1140.,2010 |
|
2010 |
C. Class, D. Zellhöfer,"Gewissensbits - Wie würden Sie urteilen? Fallbeispiel Online-Banking",Informatik Spektrum,Vol. 33(3),2010 |
|
2009 |
S. Alouneh, A. Agarwal, A. En-Nouaary ,"A novel path protection scheme for MPLS networks using multi-path routing",Comput. Netw.. New York, NY, USA, June, 2009. Vol. 53, pp. 1530-1545. Elsevier North-Holland, Inc..,2009 |
|
2009 |
Sa’ed Abed, Sahel Alouneh and Otmane Ait Mohamed,"Reliability of Recursive Concentrator Structure",In Proc. IEEE Symposium on Industrial Electronics & Applications (IEEE ISIEA'09),,pp. 209-211. ,Kuala Lumpur, Malaysia,2009 |
|
2009 |
S. Alouneh, A. En-Nouaary , A. Agarwal,"MPLS security: an approach for unicast and multicast environments",Annales des Télécommunications,Vol. 64(5-6), pp. 391-400,2009 |
|
2009 |
Mohamed Bourimi, Falk Kuhnel, Jorg M. Haake, Dhiah el Diehn I. Abou- Tair, and Dogan Kesdogan,"Tailoring collaboration according privacy needs in real-identity collaborative systems. In Groupware: Design, Implementation, and Use",15th International Workshop, CRIWG 2009,Peso da Regua,
Douro, Portugal,2009 |
|
2009 |
C. Class,"Ethical Issues related to the Use of E-Portfolios",In The Potential of E-Portfolios in Higher Education. Studienverlag,2009 |