default search action
S. Kami Makki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j13]Saman Izadpanah, S. Kami Makki:
An enhanced users' similarity computation utilising one-class collaborative filtering. Int. J. Big Data Intell. 3(4): 250-256 (2016) - 2015
- [j12]Chang-Wu Yu, Qin Xin, Naveen K. Chilamkurti, Shengming Jiang, S. Kami Makki, Guowei Wu:
Algorithm and Theory for Robust Wireless Sensor Networks 2014. Int. J. Distributed Sens. Networks 11: 489718:1 (2015) - 2014
- [j11]Theerasak Thapngam, Shui Yu, Wanlei Zhou, S. Kami Makki:
Distributed Denial of Service (DDoS) detection by traffic pattern analysis. Peer-to-Peer Netw. Appl. 7(4): 346-358 (2014) - 2013
- [j10]S. Kami Makki, Keenan B. Bonds:
Enhancing Node Cooperation in Mobile Ad Hoc Network. J. Networks 8(3): 645-649 (2013) - [c28]Nicholas Dzugan, Lance Fannin, S. Kami Makki:
A recommendation scheme utilizing Collaborative Filtering. ICITST 2013: 96-100 - 2012
- [j9]Majid Khojastehpour, S. Kami Makki, Bo Sun:
A delineated R-tree indexing method for managing moving objects. Int. J. Inf. Decis. Sci. 4(2/3): 182-198 (2012) - [j8]Vinayak Ganapathy, Niki Pissinou, S. Kami Makki, Qutub Bakhtiar Ali:
An epistemic event-based correlation approach for managing pervasive networks. Int. J. Netw. Manag. 22(1): 81-94 (2012) - [c27]Ramon Sandoval, S. Kami Makki, Bo Sun:
Utilizing silent negative voting and sleep/wakeup method for power efficient data fusion. ICNC 2012: 1000-1004 - [c26]Shui Yu, Wanlei Zhou, Wanchun Dou, S. Kami Makki:
Why it is Hard to Fight against Cyber Criminals? ICDCS Workshops 2012: 537-541 - [c25]Audie Sumaray, S. Kami Makki:
A comparison of data serialization formats for optimal efficiency on a mobile platform. ICUIMC 2012: 48:1-48:6 - [c24]S. Kami Makki, Charles Williams:
Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone Environment. ITNG 2012: 686-689 - 2011
- [j7]S. Kami Makki, Bo Sun, Ricky Guidry, Jeffery Hill:
Efficient Monitoring Strategy for Active Environments. J. Softw. 6(4): 536-543 (2011) - [c23]James Carnley, Bo Sun, S. Kami Makki:
TORP: TinyOS Opportunistic Routing Protocol for Wireless Sensor Networks. CCNC 2011: 111-115 - [c22]Manoj K. Joshi, Lawrence Osborne, Bo Sun, S. Kami Makki:
Hot spot aware energy efficient clustering approach for Wireless Sensor Networks. CCNC 2011: 585-589 - [c21]Amir Husain, S. Kami Makki, Lawrence Osborne, Bo Sun:
A Highly Adaptable Information Dissemination Strategy. DEIS 2011: 331-338 - [c20]S. Kami Makki, Stefan Andrei, Yanwen Guan, Mattie Sue Judd:
Performance Evaluation of Query Trimming Strategies in Semantic Caching Environment. ICEIS (1) 2011: 169-176 - [c19]S. Kami Makki, Narasimha Bharadwaj Srirangam, Venkata Susheel Aiswarya, Shui Yu:
Utilizing Intelligent Middleware for Reconfiguration of Applications on Android. ICHIT (1) 2011: 81-89 - [c18]Stephen Ashmore, S. Kami Makki:
IMISSAR: an intelligent, mobile middleware solution for secure automatic reconfiguration of applications, utilizing a feature model approach. ICUIMC 2011: 58 - 2010
- [c17]Scott Loper, S. Kami Makki:
Data Filtering Utilizing Window Indexing. AINA Workshops 2010: 121-126 - [c16]S. Kami Makki, Matthew Rockey:
Query Visualization for Query Trimming in Semantic Caching. AINA Workshops 2010: 443-448 - [c15]Justin Barrios, S. Kami Makki, Masoumeh Karimi:
An Indexing Structure for Mobile Objects Utilizing Late Update. ITNG 2010: 162-167 - [c14]Jeffery Hill, Ricky Guidry, S. Kami Makki, Bo Sun:
Intelligent Sensor Independent Decisions for Entropic Targets. ITNG 2010: 660-665
2000 – 2009
- 2009
- [j6]Kaleb Brasee, S. Kami Makki, Sherali Zeadally:
A secure two-factor authentication scheme for single sign-on services. Secur. Commun. Networks 2(4): 315-323 (2009) - [c13]S. Kami Makki:
A collective transaction processing scheme for mobile environment. ICHIT 2009: 3-7 - [c12]S. Kami Makki, Bo Sun, Majid Khojastehpour:
An Efficient Information Access Scheme for Mobile Objects. IRI 2009: 312-317 - [c11]S. Kami Makki, Stefan Andrei:
Utilizing semantic caching in ubiquitous environment. IWCMC 2009: 1213-1217 - 2008
- [c10]S. Kami Makki, Jaina Sangtani:
Data Mashups & Their Applications in Enterprises. ICIW 2008: 445-450 - [c9]Kaleb Brasee, S. Kami Makki, Sherali Zeadally:
A Novel Distributed Authentication Framework for Single Sign-On Services. SUTC 2008: 52-58 - [c8]S. Kami Makki, Xunhang Zhou:
Novel cache management strategy for semantic caching in mobile environment. CSTST 2008: 192-197 - 2007
- [j5]S. Kami Makki, Seema Jani, Xiaohua Jia, Wuxu Peng:
Preference-Function Algorithm: a novel approach for selection of the users' preferred websites. Int. J. Bus. Intell. Data Min. 2(3): 328-346 (2007) - [j4]S. Kami Makki:
Distributed Systems: An Effective Information Sharing Approach for Legacy Systems. J. Convergence Inf. Technol. 2(3): 22-28 (2007) - [j3]Guoliang Xue, S. Kami Makki:
Multiconstrained QoS Routing: A Norm Approach. IEEE Trans. Computers 56(6): 859-863 (2007) - [j2]Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih-Wei Yi, S. Kami Makki, Niki Pissinou:
Maximizing lifetime of sensor surveillance systems. IEEE/ACM Trans. Netw. 15(2): 334-345 (2007) - [c7]Xiwei Zhao, Niki Pissinou, S. Kami Makki:
The Optimization of Location Management. CCNC 2007: 380-384 - 2006
- [c6]David A. Heitbrink, Sam Kami Makki:
Distribution of a World Space for Real-Time 3D Applications. CCGRID 2006: 225-232 - [c5]S. Kami Makki, David A. Heitbrink, Xiaohua Jia:
Flooding isolated region reassignment. GrC 2006: 361-364 - [c4]Sam Kami Makki, Greg Leppert:
Factors of usability design for multilingual and multicultural websites. IRI 2006: 6-10 - [c3]Xiwei Zhao, S. Kami Makki, Niki Pissinou:
An Efficient and Robust Routing Protocol for Data Aggregation. WASA 2006: 175-186 - 2005
- [j1]Tirthankar Ghosh, Niki Pissinou, S. Kami Makki:
Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mob. Networks Appl. 10(6): 985-995 (2005) - 2004
- [c2]Madhujit Ghosh, Sam Kami Makki:
A Secure Framework for Electronic Payment System. International Conference on Internet Computing 2004: 605-609 - 2002
- [c1]Gang Feng, Christos Douligeris, Sam Kami Makki, Niki Pissinou:
Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation. ICC 2002: 2273-2278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint