Search

Your search keyword '"Chadi Assi"' showing total 106 results

Search Constraints

Start Over You searched for: Author "Chadi Assi" Remove constraint Author: "Chadi Assi" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
106 results on '"Chadi Assi"'

Search Results

1. An Energy-Efficient Cluster Formation Based on Optimal Node Distribution in Full Capacity Multi-Hop LoRa Networks

2. Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations

3. The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions

4. Reliability-Aware Multi-Source Multicast Hybrid Routing in Softwarized Networks

5. Unmanned Aerial Vehicles as Store-Carry-Forward Nodes for Vehicular Networks

7. A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security

12. UAV-Aided Ultra-Reliable Low-Latency Computation Offloading in Future IoT Networks

13. Guest Editors’ Introduction: Special Section on Design and Management of Reliable Communication Networks

14. Energy Consumption Optimization in RIS-Assisted Cooperative RSMA Cellular Networks

15. Optimizing Information Freshness Leveraging Multi-RISs in NOMA-based IoT Networks

16. Optimizing Age of Information Through Aerial Reconfigurable Intelligent Surfaces: A Deep Reinforcement Learning Approach

17. Measurements-Based Channel Models for Indoor LiFi Systems

18. CoMP Transmission in Downlink NOMA-Based Heterogeneous Cloud Radio Access Networks

19. Age of Information Aware Trajectory Planning of UAVs in Intelligent Transportation Systems: A Deep Learning Approach

20. Demand-Aware Provisioning of Electric Vehicles Fast Charging Infrastructure

21. A Framework for Unsupervised Planning of Cellular Networks Using Statistical Machine Learning

22. A Detailed Security Assessment of the EV Charging Ecosystem

23. Age Minimization in Outdoor and Indoor Communications with Relay-aided Dual RIS

24. CoMP-Assisted NOMA and Cooperative NOMA in Indoor VLC Cellular Systems

25. Joint Location and Beamforming Design for Cooperative UAVs With Limited Storage Capacity

26. A Spectrally Efficient Uplink Transmission Scheme Exploiting Similarity Among Short Bit Blocks

27. Modeling and Performance Analysis of UAV-Assisted Vehicular Networks

28. Workload Scheduling in Vehicular Networks With Edge Cloud Capabilities

29. Joint Optimization of Computational Cost and Devices Energy for Task Offloading in Multi-Tier Edge-Clouds

30. Energy-Aware Mapping and Scheduling of Network Flows With Deadlines on VNFs

31. RIS-Assisted UAV for Timely Data Collection in IoT Networks

32. Electric vehicle attack impact on power grid operation

33. Reconfigurable Intelligent Surface Enabled Vehicular Communication: Joint User Scheduling and Passive Beamforming

34. Reconfigurable Intelligent Surface Enabled Full-Duplex/Half-Duplex Cooperative Non-Orthogonal Multiple Access

35. Joint Resource Allocation and Phase Shift Optimization for RIS-Aided eMBB/URLLC Traffic Multiplexing

36. Physical Layer Security for Visible Light Communication Systems:A Survey

37. A Low-Complexity Framework for Joint User Pairing and Power Control for Cooperative NOMA in 5G and Beyond Cellular Networks

38. Global Communications Newsletter

39. Optimal Supercharge Scheduling of Electric Vehicles: Centralized Versus Decentralized Methods

40. Power jacking your station: In-depth security analysis of electric vehicle charging station management systems

41. UAV-Aided Cooperation for FSO Communication Systems

42. A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks

43. Multihop V2I Communications: A Feasibility Study, Modeling, and Performance Analysis

44. A Downlink Puncturing Scheme for Simultaneous Transmission of URLLC and eMBB Traffic by Exploiting Data Similarity

45. Invoking Deep Learning for Joint Estimation of Indoor LiFi User Position and Orientation

46. Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns

47. Delay-Aware Scheduling and Resource Optimization With Network Function Virtualization

48. Bidirectional Optical Spatial Modulation for Mobile Users: Toward a Practical Design for LiFi Systems

49. A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities

50. Survivable Cloud Network Mapping for Disaster Recovery Support

Catalog

Books, media, physical & digital resources