Search
for Author
All Reviews
Abid, Mohamed
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
DPMP: a software pattern for real-time tasks merge
Mzid R., Mraidha C., Mehiaoui A., Tucci-Piergiovanni S., Babau J., Abid M. ECMFA 2013 (Proceedings of the 9th European Conference on Modelling Foundations and Applications, Montpellier, France, Jul 1-5, 2013) 101-117, 2013. Type: Proceedings
When creating a real-time software system, developers will typically spend a substantial amount of time performing model validation. Performing such validation in a platform-independent way is not only less complicated with device abst...
...
Dec 5 2013
RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks
Cheikhrouhou O., Koubâa A., Dini G., Abid M. Personal and Ubiquitous Computing 15(8): 783-797, 2011. Type: Article
A number of wireless sensor network applications require secure communication (with confidentiality and authentication) among the group of sensor nodes sensing the same physical phenomena. Motivated by this requirement, the authors of ...
...
May 15 2012
Design of a multimedia processor based on metrics computation
Amor N., Le Moullec Y., Diguet J., Philippe J., Abid M. Advances in Engineering Software 36(7): 448-458, 2005. Type: Article
A novel approach for the creation of a multimedia processor is presented in this paper. Three steps to customize a general-purpose processor (GPP) based on the detailed analysis of a target application are described, and these steps ar...
...
Jan 5 2006
TCP flow control technique for an interworking interface: hardware implementation
Ouni R., Soudani A., Nasri S., Torki K., Abid M., Tourki R. Computer Standards & Interfaces 23(5): 383-397, 2001. Type: Article
The growth of the Internet and the World Wide Web has increased the diversity of the situations in which transmission control protocol (TCP) connections are used. Wireless networks, asymmetric networks, and Web traffic are characteriz...
...
Dec 18 2002
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy