default search action
Emad Abd-Elrahman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Hatem Ibn-Khedher, Mohammed Laroui, Hassine Moungla, Hossam Afifi, Emad Abd-Elrahman:
Next-Generation Edge Computing Assisted Autonomous Driving Based Artificial Intelligence Algorithms. IEEE Access 10: 53987-54001 (2022) - [j6]Mahmoud Hussein, Yehia Sayed Mohammed, Ahmed I. Galal, Emad Abd-Elrahman, Mohamed Zorkany:
Smart Cognitive IoT Devices Using Multi-Layer Perception Neural Network on Limited Microcontroller. Sensors 22(14): 5106 (2022) - 2021
- [j5]Ibrahim A. Gomaa, Emad Abd-Elrahman, Alaa Hamdy, Elsayed M. Saad:
Automated Security Assessment for IDaaS Framework. Wirel. Pers. Commun. 116(4): 3465-3490 (2021) - 2020
- [c24]Abdelrahman Abdellah, Sherif M. Saif, Hesham E. ElDeeb, Emad Abd-Elrahman, Mohamed Taher:
A Survey of Using Blockchain Aspects in Information Centric Networks. AISI 2020: 292-301
2010 – 2019
- 2019
- [j4]Ibrahim A. Gomaa, Emad Abd-Elrahman, Elsayed M. Saad, Adlen Ksentini:
Virtual Identity Performance Evaluations of Anonymous Authentication in IDaaS Framework. IEEE Access 7: 34541-34554 (2019) - [c23]Emad Abd-Elrahman, Adel Mounir Sareh Said:
Two Dimensional Markov Chain Approximation for MPTCP over HetNets: Performance Evaluation. IWCMC 2019: 428-433 - 2018
- [c22]Shaimaa Badr, Ibrahim A. Gomaa, Emad Abd-Elrahman:
Multi-tier Blockchain Framework for IoT-EHRs Systems. EUSPN/ICTH 2018: 159-166 - 2017
- [j3]Virginia Pilloni, Emad Abd-Elrahman, Makhlouf Hadji, Luigi Atzori, Hossam Afifi:
IoT_ProSe: Exploiting 3GPP services for task allocation in the Internet of Things. Ad Hoc Networks 66: 26-39 (2017) - [j2]Hatem Ibn-Khedher, Emad Abd-Elrahman, Ahmed E. Kamal, Hossam Afifi:
OPAC: An optimal placement algorithm for virtual CDN. Comput. Networks 120: 12-27 (2017) - [c21]Ibrahim A. Gomaa, Adel Mounir Sareh Said, Emad Abd-Elrahman, Alaa Hamdy, Elsayed M. Saad:
Performance Evaluation of Virtual Identity Approaches for Anonymous Communication in Distributed Environments. ANT/SEIT 2017: 710-717 - [c20]Hatem Ibn-Khedher, Emad Abd-Elrahman:
CDNaaS Framework: TOPSIS as Multi-Criteria Decision Making for vCDN Migration. FNC/MobiSPC 2017: 274-281 - [c19]Hatem Ibn-Khedher, Emad Abd-Elrahman, Hossam Afifi, Michel Marot:
Optimal and Cost Efficient Algorithm for Virtual CDN Orchestration. LCN 2017: 61-69 - 2016
- [c18]Emad Abd-Elrahman, Hossam Afifi, Luigi Atzori, Makhlouf Hadji, Virginia Pilloni:
IoT-D2D task allocation: An award-driven game theory approach. ICT 2016: 1-6 - [c17]Hatem Ibn-Khedher, Emad Abd-Elrahman, Hossam Afifi:
OMAC: Optimal migration algorithm for virtual CDN. ICT 2016: 1-6 - [c16]Hatem Ibn-Khedher, Makhlouf Hadji, Emad Abd-Elrahman, Hossam Afifi, Ahmed E. Kamal:
Scalable and Cost Efficient Algorithms for Virtual CDN Migration. LCN 2016: 112-120 - [c15]Lyes Bouali, Emad Abd-Elrahman, Hossam Afifi, Samia Bouzefrane, Mehammed Daoui:
Virtualization Techniques: Challenges and Opportunities. MSPN 2016: 49-62 - [i6]Hatem Ibn-Khedher, Makhlouf Hadji, Emad Abd-Elrahman, Hossam Afifi, Ahmed E. Kamal:
Scalable and Cost Efficient Algorithms for Virtual CDN Migration. CoRR abs/1608.08365 (2016) - 2015
- [c14]Ibrahim A. Gomaa, Emad Abd-Elrahman:
A Novel Virtual Identity Implementation for Anonymous Communication in Cloud Environments. EUSPN/ICTH 2015: 32-39 - [c13]Emad Abd-Elrahman, Adel Mounir Sareh Said, Thouraya Toukabri, Hossam Afifi, Michel Marot:
A hybrid model to extend vehicular intercommunication V2V through D2D architecture. ICNC 2015: 754-759 - [c12]Hatem Ibn-Khedher, Emad Abd-Elrahman, Hossam Afifi, Jacky Forestier:
Network issues in virtual machine migration. ISNCC 2015: 1-6 - [c11]Emad Abd-Elrahman, Hatem Ibn-Khedher, Hossam Afifi, Thouraya Toukabri:
Fast group discovery and non-repudiation in D2D communications using IBE. IWCMC 2015: 616-621 - [c10]Adel Mounir Sareh Said, Ahmed Soua, Emad Abd-Elrahman, Hossam Afifi:
Context-aware multi-modal traffic management in ITS: A Q-learning based algorithm. IWCMC 2015: 674-679 - [c9]Anwar Fouad, Emad Abd-Elrahman, Ahmed Yehya:
Multi-Path approach for real-time service delivery optimization over HetNets. IWCMC 2015: 1504-1509 - [c8]Emad Abd-Elrahman, Hatem Ibn-Khedher, Hossam Afifi:
D2D group communications security. CFIP/NOTERE 2015: 1-6 - [c7]Thouraya Toukabri, Adel Mounir Sareh Said, Emad Abd-Elrahman, Hossam Afifi:
Distributed D2D Architecture for ITS Services in Advanced 4G Networks. VTC Fall 2015: 1-7 - [i5]Emad Abd-Elrahman, Tarek Rekik, Hossam Afifi:
Optimization of Quality of Experience through File Duplication in Video Sharing Servers. CoRR abs/1502.01120 (2015) - [i4]Emad Abd-Elrahman, Mohammed Boutabia, Hossam Afifi:
Hash Chain Links Resynchronization Methods in Video Streaming Security Performance Comparison. CoRR abs/1502.01122 (2015) - [i3]Emad Abd-Elrahman, Adel Mounir Sareh Said, Thouraya Toukabri, Hossam Afifi, Michel Marot:
Assisting V2V failure recovery using Device-to-Device Communications. CoRR abs/1502.01496 (2015) - [i2]Emad Abd-Elrahman, Adel Mounir Sareh Said, Thouraya Toukabri, Hossam Afifi, Michel Marot:
A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture. CoRR abs/1502.05817 (2015) - [i1]Hatem Ibn-Khedher, Emad Abd-Elrahman, Hossam Afifi, Jacky Forestier:
Network Issues in Virtual Machine Migration. CoRR abs/1508.02679 (2015) - 2014
- [c6]Thouraya Toukabri, Adel Mounir Sareh Said, Emad Abd-Elrahman, Hossam Afifi:
Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks. MASS 2014: 527-528 - [c5]Emad Abd-Elrahman, Adel Mounir Sareh Said, Thouraya Toukabri, Hossam Afifi, Michel Marot:
Assisting V2V failure recovery using Device-to-Device communications. Wireless Days 2014: 1-3 - 2011
- [j1]Emad Abd-Elrahman, Mohammed Boutabia, Hossam Afifi:
Hash Chain Links Resynchronization Methods in Video Streaming Security: Performance Comparison. J. Mobile Multimedia 7(1&2): 89-112 (2011) - 2010
- [c4]Mohammed Boutabia, Emad Abd-Elrahman, Hossam Afifi:
A hybrid mobility mechanism for heterogeneous networks in IMS. ICME 2010: 1570-1575 - [c3]Emad Abd-Elrahman, Mohamed Abid, Hossam Afifi:
Video Streaming Security: Window-Based Hash Chain Signature Combines with Redundancy Code - YouTube Scenario as an Internet Case Study. ISM 2010: 33-40 - [c2]Emad Abd-Elrahman, Mohammed Boutabia, Hossam Afifi:
Video streaming security: reliable hash chain mechanism using redundancy codes. MoMM 2010: 69-76
2000 – 2009
- 2009
- [c1]Emad Abd-Elrahman, Hossam Afifi:
Optimization of File Allocation for Video Sharing Servers. NTMS 2009: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint