Follow
rachid saadi
rachid saadi
Withings
Verified email at withings.com
Title
Cited by
Cited by
Year
Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications
C Pham, A Makhoul, R Saadi
Journal of Network and Computer Applications 34 (2), 783-795, 2011
582011
Risk management in intrusion detection applications with wireless video sensor networks
A Makhoul, R Saadi, C Pham
IEEE WCNC 182, 10, 2010
282010
Method for calculating the activity of a user
R Saadi, N Buard, C Hutchings
US Patent 11,120,901, 2021
212021
T2D: A Peer to Peer trust management system based on Disposition to Trust
R Saadi, JM Pierson, L Brunie
Proceedings of the 2010 ACM Symposium on Applied Computing, 1472-1478, 2010
202010
Adaptive scheduling of wireless video sensor nodes for surveillance applications
A Makhoul, R Saadi, C Pham
Proceedings of the 4th ACM workshop on Performance monitoring and …, 2009
202009
The GAPLA: a globally asynchronous locally synchronous FPGA architecture
X Jia, R Vemuri
13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines …, 2005
202005
Composing trust models towards interoperable trust management
R Saadi, MA Rahaman, V Issarny, A Toninelli
IFIP International Conference on Trust Management, 51-66, 2011
182011
Establishing trust beliefs based on a uniform disposition to trust
R Saadi, O Hasan, JM Pierson, L Brunie
2007 Third International IEEE Conference on Signal-Image Technologies and …, 2007
182007
Security-by-Contract-with-Trust for mobile devices
G Costa, A Lazouski, F Martinelli, I Matteucci, V Issarny, R Saadi, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
172010
Method for counting steps taken by a user
R Saadi, A Dahbi, C Hutchings
US Patent 9,584,956, 2017
132017
The CONNECT architecture
P Grace, N Georgantas, A Bennaceur, GS Blair, F Chauvel, V Issarny, ...
Formal Methods for Eternal Networked Software Systems: 11th International …, 2011
132011
Authentication and access control using trust collaboration in pervasive grid environments
R Saadi, JM Pierson, L Brunie
Advances in Grid and Pervasive Computing: Second International Conference …, 2007
132007
(Dis) trust certification model for large access in a pervasive environment
R Saadi, JM Pierson, L Brunie
International Journal of Pervasive Computing and Communications 1 (4), 289-299, 2005
132005
Proximity-based trust inference for mobile social networking
A Seyedi, R Saadi, V Issarny
IFIP International Conference on Trust Management, 253-264, 2011
122011
The Chameleon: A Pervasive Grid Security Architecture
R Saadi, JM Pierson, L Brunie
International Conference on Networking and Services (ICNS'07), 48-48, 2007
102007
Inferring affordances using learning techniques
A Bennaceur, R Johansson, A Moschitti, R Spalazzese, D Sykes, R Saadi, ...
Eternal Systems: First InternationalWorkshop, EternalS 2011, Budapest …, 2012
92012
Surveillance vidéo sur réseaux de capteurs sans-fils: ordonnancement adaptatif avec prise en compte de la criticité.
A Makhoul, R Abdallah, CD Pham
CFIP'2009, 2009
82009
Intermediate CONNECT architecture
A Bennaceur, GS Blair, F Chauvel, N Georgantas, P Grace, V Issarny, ...
72011
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks
A Makhoul, R Saadi, CD Pham
2009 International Conference on Ultra Modern Telecommunications & Workshops …, 2009
72009
APC: access pass certificate distrust certification model for large access in pervasive environment
R Saadi, JM Pierson, L Brunie
ICPS'05. Proceedings. International Conference on Pervasive Services, 2005 …, 2005
72005
The system can't perform the operation now. Try again later.
Articles 1–20