Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications C Pham, A Makhoul, R Saadi Journal of Network and Computer Applications 34 (2), 783-795, 2011 | 58 | 2011 |
Risk management in intrusion detection applications with wireless video sensor networks A Makhoul, R Saadi, C Pham IEEE WCNC 182, 10, 2010 | 28 | 2010 |
Method for calculating the activity of a user R Saadi, N Buard, C Hutchings US Patent 11,120,901, 2021 | 21 | 2021 |
T2D: A Peer to Peer trust management system based on Disposition to Trust R Saadi, JM Pierson, L Brunie Proceedings of the 2010 ACM Symposium on Applied Computing, 1472-1478, 2010 | 20 | 2010 |
Adaptive scheduling of wireless video sensor nodes for surveillance applications A Makhoul, R Saadi, C Pham Proceedings of the 4th ACM workshop on Performance monitoring and …, 2009 | 20 | 2009 |
The GAPLA: a globally asynchronous locally synchronous FPGA architecture X Jia, R Vemuri 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines …, 2005 | 20 | 2005 |
Composing trust models towards interoperable trust management R Saadi, MA Rahaman, V Issarny, A Toninelli IFIP International Conference on Trust Management, 51-66, 2011 | 18 | 2011 |
Establishing trust beliefs based on a uniform disposition to trust R Saadi, O Hasan, JM Pierson, L Brunie 2007 Third International IEEE Conference on Signal-Image Technologies and …, 2007 | 18 | 2007 |
Security-by-Contract-with-Trust for mobile devices G Costa, A Lazouski, F Martinelli, I Matteucci, V Issarny, R Saadi, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010 | 17 | 2010 |
Method for counting steps taken by a user R Saadi, A Dahbi, C Hutchings US Patent 9,584,956, 2017 | 13 | 2017 |
The CONNECT architecture P Grace, N Georgantas, A Bennaceur, GS Blair, F Chauvel, V Issarny, ... Formal Methods for Eternal Networked Software Systems: 11th International …, 2011 | 13 | 2011 |
Authentication and access control using trust collaboration in pervasive grid environments R Saadi, JM Pierson, L Brunie Advances in Grid and Pervasive Computing: Second International Conference …, 2007 | 13 | 2007 |
(Dis) trust certification model for large access in a pervasive environment R Saadi, JM Pierson, L Brunie International Journal of Pervasive Computing and Communications 1 (4), 289-299, 2005 | 13 | 2005 |
Proximity-based trust inference for mobile social networking A Seyedi, R Saadi, V Issarny IFIP International Conference on Trust Management, 253-264, 2011 | 12 | 2011 |
The Chameleon: A Pervasive Grid Security Architecture R Saadi, JM Pierson, L Brunie International Conference on Networking and Services (ICNS'07), 48-48, 2007 | 10 | 2007 |
Inferring affordances using learning techniques A Bennaceur, R Johansson, A Moschitti, R Spalazzese, D Sykes, R Saadi, ... Eternal Systems: First InternationalWorkshop, EternalS 2011, Budapest …, 2012 | 9 | 2012 |
Surveillance vidéo sur réseaux de capteurs sans-fils: ordonnancement adaptatif avec prise en compte de la criticité. A Makhoul, R Abdallah, CD Pham CFIP'2009, 2009 | 8 | 2009 |
Intermediate CONNECT architecture A Bennaceur, GS Blair, F Chauvel, N Georgantas, P Grace, V Issarny, ... | 7 | 2011 |
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks A Makhoul, R Saadi, CD Pham 2009 International Conference on Ultra Modern Telecommunications & Workshops …, 2009 | 7 | 2009 |
APC: access pass certificate distrust certification model for large access in pervasive environment R Saadi, JM Pierson, L Brunie ICPS'05. Proceedings. International Conference on Pervasive Services, 2005 …, 2005 | 7 | 2005 |