|
2013 |
A. Zmily, D. Abu-Saymeh ,"Alzheimer’s Disease Rehabilitation using Smartphones to Improve Patients’ Quality of Life",7th Intl. Conf. on Pervasive Computing Technologies for Healthcare,Venice, Italy,2013 |
|
2013 |
Sahel Alouneh, Mazen Kharbutli, Rana Alqurem,"Stack Memory Buffer Overflow Protection Based on Duplication and Randomization",EUSPN-2013, Proceedings of Elsevier, ScienceDirect, Niagara Falls, Canada,2013 |
|
2013 |
D. Abu-Saymeh, DeDI Abou-Tair, A. Zmily,"An Application Security Framework for Near Field Communication",IEEE International Conference on Trust, Security and Privacy in Computing and Communications,Melbourne, Australia, 16-18 July, 2013,2013 |
|
2013 |
D. Abu-Saymeh, DeDI Abou-Tair, A. Zmily,"An Application Security Framework for Near Field Communication",IEEE International Conference on Trust, Security and Privacy in Computing and Communications,Melbourne, Australia,2013 |
|
2013 |
M.I. Daoud, P. Mousavi, F. Imani, R. Rohling, P. Abolmaesumi,"Tissue Classification Using Ultrasound-Induced Variations in Acoustic Backscattering Features",IEEE Transactions on Biomedical Engineering,vol. 60, pp. 310-320,2013 |
|
2013 |
Zmily, C. Class, Y. Mowafi, D. Abu-Saymeh,"An Interactive Educational Environment for Preschool Children",15th Intl. Conf. on Enterprise Information Systems,Angers,France,2013 |
|
2013 |
A. Zmily, D. Abu-Saymeh, DeDI Abou-Tair,"Identity Hopping Based Security Framework for Social Media Applications",International Conference on Soft Computing and Software Engineering,San Francisco, USA,2013 |
|
2013 |
Dirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair, and Ahmad Zmily,"An application security framework for near field communication",12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on ,Melbourne, Australia,2013 |
|
2013 |
Dr. Ismail Hababeh, Dr. Issa Khalil, Dr. Abdallah Khreishah, Dr. Samir Bataineh,"Promoting Wormhole Security Approaches For Ad-Hoc Networks",Proceedings of the International Conference on Computational & Network Technologies,December 2-4,Adelaide, South Australia, Australia,2013 |
|
2013 |
Seon Ho Kim, Ying Lu, Junyuan Shi, Abdullah Alfarrarjeh, Cyrus Shahabi, Guanfeng Wang, Roger Zimmermann,"Frame Selection Algorithms for Automatic Generation of Panoramic Images from Crowdsourced Geo-tagged Videos",In Proceedings of the 13th International Symposium on Web and Wireless Geographical Information Systems (W2GIS),pp. 67 - 84, Seoul, South Korea, May 29-30,2013 |
|
2013 |
Feras Al-Hawari, Taranjit Kukal, Dennis Nagle, Raymond Komow, and Jilin Tan,"System and method for adapting behavioral models to fluctuations in parametrically integrated environment",U.S. Patent 8,452,582,issued May 28,2013 [View] |
|
2013 |
Dr. Ismail Hababeh, Dr. Issa Khalil, Dr. Abdallah Khreishah, Dr. Samir Bataineh,"Performance Evaluation Of Wormhole Security Approaches For Ad-Hoc Networks",Journal of Computer Science,Vol 9, no 12, pp. 1626-1637,2013 |
|
2013 |
Feras Al-Hawari, Jilin Tan, and Jose Schutt-Aine,"Method and system for adaptive modeling and simulation of lossy transmission lines",U.S. Patent 8,386,216,issued February 26,2013 [View] |
|
2012 |
D. Weber-Wulff, C. Class,"Wie würden Sie urteilen? Fallbeispiel Pseudokonferenz?",Informatik Spektrum,Vol. 35, No. 5,2012 |
|
2012 |
Ismail Hababeh,"Improving network systems performance by clustering distributed database sites",The Journal of Supercomputing, 59(1):249-267,2012 |