Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Abid, Mohamed Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  DPMP: a software pattern for real-time tasks merge
Mzid R., Mraidha C., Mehiaoui A., Tucci-Piergiovanni S., Babau J., Abid M.  ECMFA 2013 (Proceedings of the 9th European Conference on Modelling Foundations and Applications, Montpellier, France, Jul 1-5, 2013) 101-117, 2013.  Type: Proceedings

When creating a real-time software system, developers will typically spend a substantial amount of time performing model validation. Performing such validation in a platform-independent way is not only less complicated with device abst...
...
Dec 5 2013  
  RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks
Cheikhrouhou O., Koubâa A., Dini G., Abid M. Personal and Ubiquitous Computing 15(8): 783-797, 2011.  Type: Article

A number of wireless sensor network applications require secure communication (with confidentiality and authentication) among the group of sensor nodes sensing the same physical phenomena. Motivated by this requirement, the authors of ...
...
May 15 2012  
  Design of a multimedia processor based on metrics computation
Amor N., Le Moullec Y., Diguet J., Philippe J., Abid M. Advances in Engineering Software 36(7): 448-458, 2005.  Type: Article

A novel approach for the creation of a multimedia processor is presented in this paper. Three steps to customize a general-purpose processor (GPP) based on the detailed analysis of a target application are described, and these steps ar...
...
Jan 5 2006  
  TCP flow control technique for an interworking interface: hardware implementation
Ouni R., Soudani A., Nasri S., Torki K., Abid M., Tourki R. Computer Standards & Interfaces 23(5): 383-397, 2001.  Type: Article

The growth of the Internet and the World Wide Web has increased the diversity of the situations in which transmission control protocol (TCP) connections are used. Wireless networks, asymmetric networks, and Web traffic are characteriz...
...
Dec 18 2002  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy