default search action
Mohamed Aissani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j12]Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
Fault-tolerant data transport backbone for 3D wireless sensor networks. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j11]Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
Load balancing approach for heterogeneous 2-tiered wireless sensor networks. Trans. Emerg. Telecommun. Technol. 33(8) (2022) - [j10]Samir Berrani, Ali Yachir, Badis Djamaa, Saïd Mahmoudi, Mohamed Aissani:
Towards a new semantic middleware for service description, discovery, selection, and composition in the Internet of Things. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j9]Samir Berrani, Ali Yachir, Saïd Mahmoudi, Badis Djamaa, Mohamed Aissani:
Towards a New Semantic Model for Service-Based IoT Applications. J. Inf. Sci. Eng. 38(1): 83-100 (2022) - 2021
- [j8]Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
Efficient deployment approach of wireless sensor networks on 3D terrains. Int. J. Data Min. Model. Manag. 13(1/2): 114-136 (2021)
2010 – 2019
- 2019
- [j7]Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
A practical data driven approach for the deployment of WSNs on realistic terrains. Trans. Emerg. Telecommun. Technol. 30(8) (2019) - [c17]Mustapha Réda Senouci, Mostefa Zafer, Mohamed Aissani:
Using Relay Nodes in Wireless Sensor Networks: A Review. FedCSIS 2019: 479-486 - [c16]Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
On Coverage of 3D Terrains by Wireless Sensor Networks. FedCSIS 2019: 501-504 - 2018
- [c15]Mostefa Zafer, Mustapha Réda Senouci, Mohamed Aissani:
Terrain Partitioning Based Approach for Realistic Deployment of Wireless Sensor Networks. CIIA 2018: 423-435 - [c14]Samir Berrani, Ali Yachir, Badis Djamaa, Mohamed Aissani:
Multi-agent System Based Service Composition in the Internet of Things. CIIA 2018: 521-532 - [c13]Samir Berrani, Ali Yachir, Badis Djemaa, Mohamed Aissani:
Extended multi-agent system based service composition in the Internet of things. PAIS 2018: 1-8 - 2017
- [j6]Mohammed Boudali, Mustapha Réda Senouci, Mohamed Aissani, Walid-Khaled Hidouci:
Activities scheduling algorithms based on probabilistic coverage models for wireless sensor networks. Ann. des Télécommunications 72(3-4): 221-232 (2017) - 2016
- [c12]Ali Yachir, Badis Djamaa, Ahmed Mecheti, Yacine Amirat, Mohamed Aissani:
A Comprehensive Semantic Model for Smart Object Description and Request Resolution in the Internet of Things. ANT/SEIT 2016: 147-154 - 2015
- [c11]Badis Djamaa, Mark A. Richardson, Peter Barker, Mohamed Aissani:
Multicast Burst Forwarding in Constrained Networks. VTC Spring 2015: 1-6 - 2014
- [c10]Mohamed Aissani, Sofiane Bouznad, Badis Djamaa, Ibrahim Tsabet:
Efficient Energy-Aware Mechanisms for Real-Time Routing in Wireless Sensor Networks. ADHOC-NOW 2014: 304-317 - 2013
- [j5]Mohamed Aissani, Sofiane Bouznad, S. E. Allia, A. Hariza:
Repellent voids for improving geographical routing efficiency in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 11(2): 172-197 (2013) - [j4]Mohamed Aissani, Sofiane Bouznad, A. Fareb, M. A. Laidoui:
EA-SPEED: energy-aware real-time routing protocol for wireless sensor networks. Int. J. Inf. Commun. Technol. 5(1): 22-44 (2013) - 2010
- [j3]Mohamed Aissani, Abdelhamid Mellouk, Nadjib Badache, Mouloud Boumaza:
A novel approach for void avoidance in wireless sensor networks. Int. J. Commun. Syst. 23(8): 945-962 (2010)
2000 – 2009
- 2009
- [j2]Mohamed Aissani, Abdelhamid Mellouk, Walid Demigha, Mustapha Réda Senouci:
Link failure resilience in the dynamic source routing protocol. Wirel. Commun. Mob. Comput. 9(5): 591-605 (2009) - [c9]Mohamed Aissani, Abdelhamid Mellouk, Nadjib Badache, Mohamed Djebbar:
A Preventive Rerouting Scheme for Avoiding Voids in Wireless Sensor Networks. GLOBECOM 2009: 1-5 - [c8]Walid Demigha, Nadjib Badache, Mohamed Aissani, Abdelhamid Mellouk:
Fault-Tolerant Prediction-Based Scheme for Target Tracking Application. GLOBECOM 2009: 1-6 - [c7]Mohamed Aissani, Abdelhamid Mellouk, Nadjib Badache, Brahim Saidani:
An efficient real-time routing with presence of concave voids in wireless sensor networks. IWCMC 2009: 186-190 - 2008
- [c6]Mohamed Aissani, Abdelhamid Mellouk, Nadjib Badache, Brahim Saidani:
Oriented Void Avoidance Scheme for Real-Time Routing Protocols in Wireless Sensor Networks. GLOBECOM 2008: 83-87 - [c5]Mohamed Aissani, Abdelhamid Mellouk, Nadjib Badache, Mohamed Djebbar:
A New Approach of Announcement and Avoiding Routing Voids in Wireless Sensor Networks. GLOBECOM 2008: 1790-1794 - 2007
- [j1]Farid Benhammadi, M. N. Amirouche, Hamid Hentous, Kadda Bey-Beghdad, Mohamed Aissani:
Fingerprint matching from minutiae texture maps. Pattern Recognit. 40(1): 189-197 (2007) - [c4]Mohamed Aissani, Messaoud Fenouche, Hadi Sadour, Abdelhamid Mellouk:
Ant-DSR: Cache Maintenance Based Routing Protocol for Mobile Ad-Hoc Networks. AICT 2007: 35 - [c3]Mohamed Aissani, Mustapha Réda Senouci, Walid Demigha, Abdelhamid Mellouk:
Optimizations and Performance Study of the Dynamic Source Routing Protocol. ICNS 2007: 107 - 2006
- [c2]Hamid Hentous, Farid Benhammadi, Mohamed Aissani, Kadda Beghdad Bey:
Fingerprint Matching Based on Minutiae Covering Zones. ISCC 2006: 233-238 - 2005
- [c1]Farid Benhammadi, Hamid Hentous, Kadda Bey-Beghdad, Mohamed Aissani:
Fingerprint Matching Using Minutiae Coordinate Systems. IbPRIA (2) 2005: 529-536
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint