default search action
Muhammed Salamah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Mostafa Ayoubi Mobarhan, Muhammed Salamah:
REPS-AKA5: A robust group-based authentication protocol for IoT applications in LTE system. Internet Things 22: 100700 (2023)
2010 – 2019
- 2019
- [j9]Firas Zawaideh, Muhammed Salamah:
An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. Int. J. Commun. Syst. 32(3) (2019) - 2015
- [j8]Saed Alqaraleh, Omar Ramadan, Muhammed Salamah:
Efficient watcher based web crawler design. Aslib J. Inf. Manag. 67(6): 663-686 (2015) - 2011
- [c22]Amir Hossein Akhavan Salmasi, Evgueni Doukhnitch, Muhammed Salamah:
A Hybrid TOA/AOA Hardware-Oriented Algorithm for Mobile Positioning. BWCCA 2011: 40-44 - [c21]Abdullahi Ibrahim Abdu, Muhammed Salamah:
Energy-Aware Transmission Scheme for Wireless Sensor Networks. WiMo/CoNeCo 2011: 135-144 - [c20]Gözde Sarisin, Muhammed Salamah:
Cone Tessellation Model for Three-Dimensional Networks. WiMo/CoNeCo 2011: 159-169 - 2010
- [c19]Fatma Tansu, Muhammed Salamah:
Vertical Handoff Decision Schemes for Heteregeneous Wireless Networks: An Overview. WiMo 2010: 338-348
2000 – 2009
- 2009
- [j7]Tamer Tulgar, Muhammed Salamah:
Performance analysis of a threshold based distributed channel allocation algorithm for cellular networks. Comput. Electr. Eng. 35(3): 485-496 (2009) - [j6]Fatma Tansu, Muhammed Salamah:
An efficient vertical handoff scheme for microcellular and macrocellular interworking. Int. J. Commun. Syst. 22(12): 1495-1513 (2009) - [c18]Idil Candan, Muhammed Salamah:
Analytical Modeling of a Time-Threshold Based Multi-guard Bandwidth Allocation Scheme for Cellular Networks. AICT 2009: 33-38 - [c17]Tamer Tulgar, Muhammed Salamah:
Channel import efficiency of the DonorList algorithm. ISCIS 2009: 352-356 - 2008
- [j5]Evgueni Doukhnitch, Muhammed Salamah:
General approach to simple algorithms for 2-D positioning techniques in cellular networks. Comput. Commun. 31(10): 2185-2194 (2008) - [j4]Evgueni Doukhnitch, Muhammed Salamah, Emre Ozen:
An efficient approach for trilateration in 3D positioning. Comput. Commun. 31(17): 4124-4129 (2008) - [j3]Muhammed Salamah, Evgueni Doukhnitch:
An efficient algorithm for mobile objects localization. Int. J. Commun. Syst. 21(3): 301-310 (2008) - 2007
- [j2]Idil Candan, Muhammed Salamah:
Analytical modeling of a time-threshold based bandwidth allocation scheme for cellular networks. Comput. Commun. 30(5): 1036-1043 (2007) - [c16]M. Najiminaini, Evgueni Doukhnitch, Muhammed Salamah:
Simple Hardware-Oriented Algorithms For Cellular Mobiles Positioning. ICPS 2007: 157-160 - [c15]Idil Candan, Muhammed Salamah:
Performance analysis of a time-threshold based bandwidth allocation scheme using a onedimensional markov chain in cellular networks. ISCC 2007: 369-373 - 2006
- [c14]Muhammed Salamah:
An Adaptive Multi-Guard Channel Scheme for Multi-Class Traffic in Cellular Networks. AICCSA 2006: 716-723 - [c13]Idil Candan, Muhammed Salamah:
Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular Networks. ICSNC 2006: 55 - [c12]Muhammed Salamah, Idil Candan:
Performance Analysis of a Time-Threshold Based Multi-Guard Bandwidth Allocation Scheme in Cellular Networks. ICWMC 2006: 28 - [c11]Muhammed Salamah, Fatma Tansu:
On The Vertical Handoff Performance for Interworking between Microcellular and Macrocellular Networks. ICWMC 2006: 80 - [c10]Tamer Tulgar, Muhammed Salamah:
DonorList: A New Distributed Channel Allocation Scheme for Cellular Networks. PWC 2006: 37-49 - [c9]Idil Candan, Muhammed Salamah:
A time-threshold based multi-guard bandwidth allocation scheme for cellular networks. ISCN 2006: 106-110 - [c8]Fatma Tansu, Muhammed Salamah:
On the vertical handoff decision for wireless overlay networks. ISCN 2006: 111-115 - [c7]Muhammed Salamah, Zuhair Abushaaban:
An adaptive transmission technique for low power consumption in wireless sensor networks. IWCMC 2006: 1051-1054 - [c6]Idil Candan, Muhammed Salamah:
Dynamic Time-Threshold Based Scheme for Voice Calls in Cellular Networks. NEW2AN 2006: 189-199 - 2005
- [j1]Muhammed Salamah, Hashem Lababidi:
Dynamically adaptive channel reservation scheme for cellular networks. Comput. Networks 49(6): 787-796 (2005) - [p2]Muhammed Salamah, Idil Candan:
A Fair bandwidth Allocation Scheme for Multimedia Handoff Calls in Cellular Networks. New Trends in Computer Networks 2005 - [p1]Fatma Tansu, Muhammed Salamah:
A fuzzy-based Vertical Handoff Scheme for Interworking between WLAN and GSM. New Trends in Computer Networks 2005 - 2004
- [c5]Muhammed Salamah, Evgueni Doukhnitch, Deniz Devrim:
A Fast Hardware-Oriented Algorithm for Cellular Mobiles Positioning. ISCIS 2004: 267-277 - [c4]Omar Ramadan, Oyku Akaydin, Muhammed Salamah, Abdullah Y. Oztopra:
Parallel Implementation of the Wave-Equation Finite-Difference Time-Domain Method Using the Message Passing Interface. ISCIS 2004: 810-818 - 2003
- [c3]Muhammed Salamah, Waseem Khalil:
A Novel Error Control Technique for Wireless ATM. ISCC 2003: 1285-1291 - 2001
- [c2]Muhammed Salamah, Hashem Lababidi:
FBLLB: A Fuzzy-Based Traffic Policing Mechanism for ATM Networks. AICCSA 2001: 31-35 - 2000
- [c1]Muhammed Salamah, Hashem Lababidi:
BLLB: A Novel Traffic Policing Mechanism for ATM Networks. MASCOTS 2000: 411-415
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint