.

Browsing by Subject "Telecommunication -- Data processing -- Congresses"

LAUR Repository

Browsing by Subject "Telecommunication -- Data processing -- Congresses"

Sort by: Order: Results:

  • Islambouli, Rania; Sharafeddine, Sanaa (IEEE, 2019-12-10)
    Unmanned aerial vehicles (UAVs) have recently emerged as enablers for multitude use cases in 5G networks, one of which utilizes them as aerial base stations to intermittently serve mobile users in emergency situations or ...
  • Sharafeddine, Sanaa; Dawy, Zaher (IEEE, 2018-06-29)
    IP network planning based on a given traffic demand becomes obsolete as soon as the actual traffic slightly deviates from the given values. It is highly probable that this be the case in IP networks with no deployed resource ...
  • Haraty, Ramzi A. (IEEE, 2018-02-07)
    As communication becomes more and more an integral part of our daily lives, so does our need to access more and more information. Mobility is currently one of the most important factors to consider in our aim to achieve ...
  • Abbas, Nadine; Sharafeddine, Sanaa; Hajj, Hazem; Dawy, Zaher (2019-12-10)
    The vision towards 5G and beyond is to provide remarkable performance enhancements that enable the launch of new services and markets in different industry verticals. Example scenarios of those services include indoor ...
  • Sharafeddine, Sanaa (IEEE, 2018-07-04)
    As a basis for planning integrated QoS-enabled IP networks, proper evaluation of link capacities is needed to provide the desired level of quality for all supported classes in the network. As traffic characteristics and ...
  • Sharafeddine, Sanaa; Riedl, Anton; Glasmann, Josef; Totzke, Jurgen (IEEE Computer Society, 2018-06-21)
    Voice over IP (VoIP) services will play an important role in future IP networks, promising cost savings and new revenue sources to operators and service providers. To provide quality of service guarantees, certain mechanisms ...
  • Itani, M.; Sharafeddine, S.; ElKabbani, I. (IEEE, 2018-07-02)
    As multiple node failures are becoming so frequent in distributed storage systems, many erasure coding techniques are emerging to handle such failures. In this paper we use the fractional repetition code to apply as a ...
  • Haraty, Ramzi A.; Naous, Mirna (IEEE, 2018-02-01)
    Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. In this work, ...
  • Haraty, Ramzi A.; Khan, M.; Saddique, M.; Pirzada, U.; Zohaib, M.; Ali, A.; Wadud, B.; Ahmad, Imran (Institut Jozef Stefan, 2018-02-23)
  • Haraty, Ramzi A.; Zantout, Bassam (IEEE, 2018-02-27)
    Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a ...