default search action
Mustafa K. Mehmet Ali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j28]Shahin Vakilinia, Mustafa K. Mehmet Ali, Dongyu Qiu:
Correction to: Energy efficient temporal load aware resource allocation in cloud computing datacenters. J. Cloud Comput. 7: 19 (2018) - 2017
- [i1]Yao Yao, Mustafa K. Mehmet Ali, Shahin Vakilinia:
Optimal Resource Allocation in Distributed Broadband Wireless Communication Systems. CoRR abs/1710.11454 (2017) - 2015
- [j27]Shahin Vakilinia, Mustafa K. Mehmet Ali, Dongyu Qiu:
Modeling of the resource allocation in cloud computing centers. Comput. Networks 91: 453-470 (2015) - [j26]Helen Legakis, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
Lifetime analysis for wireless sensor networks. Int. J. Sens. Networks 17(1): 1-16 (2015) - [j25]Mohammadhossein Alvandi, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation. IEEE J. Sel. Areas Commun. 33(2): 295-308 (2015) - 2014
- [j24]Shahin Vakilinia, Dongyu Qiu, Mustafa K. Mehmet Ali:
Optimal multi-dimensional dynamic resource allocation in mobile cloud computing. EURASIP J. Wirel. Commun. Netw. 2014: 201 (2014) - 2013
- [j23]Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu:
The SIC botnet lifecycle model: A step beyond traditional epidemiological models. Comput. Networks 57(2): 404-421 (2013) - [j22]Mehdi Khabazian, Mustafa K. Mehmet Ali, Sonia Aïssa:
Analysis of Continuous Communication Availability in Vehicular Ad Hoc Networks. IEEE Syst. J. 7(1): 137-150 (2013) - [j21]Mehdi Khabazian, Sonia Aïssa, Mustafa K. Mehmet Ali:
Performance Modeling of Safety Messages Broadcast in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 14(1): 380-387 (2013) - [c21]Mohammadhossein Alvandi, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
Delay optimization in multi-hop wireless networks with network coding. WCNC 2013: 1381-1386 - 2012
- [c20]Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu:
Scomf and SComI botnet models: The cases of initial unhindered botnet expansion. CCECE 2012: 1-5 - [c19]Yuying Zhang, Mustafa K. Mehmet Ali:
Modeling of contention-free MAC protocol for broadband power line networks. CCECE 2012: 1-5 - [c18]Yao Yao, Mustafa K. Mehmet Ali:
Optimal resource allocation in distributed broadband wireless communication systems. PIMRC 2012: 291-297 - 2011
- [j20]Mehdi Khabazian, Sonia Aïssa, Mustafa K. Mehmet Ali:
Performance Modeling of Message Dissemination In Vehicular Ad Hoc Networks with Priority. IEEE J. Sel. Areas Commun. 29(1): 61-71 (2011) - [j19]Glenn Patterson, Mustafa K. Mehmet Ali:
Modeling of Data Reduction in Wireless Sensor Networks. Wirel. Sens. Netw. 3(8): 283-294 (2011) - [c17]Suchada Chaisook, Mustafa K. Mehmet Ali:
A performance evaluation of cognitive radio networks with multi-antenna. CCECE 2011: 73-76 - [c16]Mohammadhossein Alvandi, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
Delay optimization of wireless networks with network coding. CCECE 2011: 1282-1287 - 2010
- [c15]Hou Rucheng, Roch H. Glitho, Ferhat Khendek, Mustafa K. Mehmet Ali:
Integrating wireless actuation capabilities with the 3GPP IP Multimedia Subsystem for enhanced multimedia services. PIMRC 2010: 2551-2556
2000 – 2009
- 2009
- [j18]Mustafa K. Mehmet Ali, Hao Gu:
A performance modeling of wireless sensor networks as a queueing network with on and off servers. J. Commun. Networks 11(4): 406-415 (2009) - [j17]X. Song, Mustafa K. Mehmet Ali:
A performance analysis of discrete-time tandem queues with Markovian sources. Perform. Evaluation 66(9-10): 524-543 (2009) - [c14]Mehdi Khabazian, Mustafa K. Mehmet Ali:
A Continuous Communication Path Availability Analysis in Vehicular Ad Hoc Networks. VTC Spring 2009 - [c13]Glenn Patterson, Mustafa K. Mehmet Ali:
Modeling of extreme data in wireless sensor networks. WCNC 2009: 2266-2271 - 2008
- [j16]Mehdi Khabazian, Mustafa K. Mehmet Ali:
A Performance Modeling of Connectivity in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 57(4): 2440-2450 (2008) - [c12]Helen Legakis, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
Lifetime Analysis for Wireless Sensor Networks. GLOBECOM 2008: 100-105 - 2007
- [c11]Mehdi Khabazian, Mustafa K. Mehmet Ali:
Generalized Performance Modeling of Vehicular Ad Hoc Networks (VANETs). ISCC 2007: 51-56 - [c10]X. Song, Mustafa K. Mehmet Ali:
A Performance Analysis of Tandem Networks with Markovian Sources. ITC 2007: 731-742 - [c9]Mehdi Khabazian, Mustafa K. Mehmet Ali:
A Performance Modeling of Vehicular Ad Hoc Networks (VANETs). WCNC 2007: 4177-4182 - 2006
- [c8]Mustafa K. Mehmet Ali, Mehdi Khabazian:
A performance modeling of connectivity in ad hoc networks. WCNC 2006: 361-366 - [c7]Mustafa K. Mehmet Ali, Hao Gu:
Performance analysis of a wireless sensor network. WCNC 2006: 1166-1171 - 2004
- [j15]Mustafa K. Mehmet Ali, X. Song:
A performance analysis of a discrete-time priority queueing system with correlated arrivals. Perform. Evaluation 57(3): 307-339 (2004) - 2003
- [j14]Mustafa K. Mehmet Ali, X. Zhang, Jeremiah F. Hayes:
A performance analysis of a discrete-time queueing system with server interruption for modeling wireless ATM multiplexer. Perform. Evaluation 51(1): 1-31 (2003) - 2001
- [c6]Mustafa K. Mehmet Ali, X. Zhang, Jeremiah F. Hayes:
A Discrete-Time Queuing Analysis of the Wireless ATM Multiplexing System. ICN (1) 2001: 429-438
1990 – 1999
- 1996
- [j13]Mustafa K. Mehmet Ali, Shaying Yang:
Performance analysis of a random packet selection policy for multicast switching. IEEE Trans. Commun. 44(3): 388-398 (1996) - 1995
- [c5]Faouzi Kamoun, Mustafa K. Mehmet Ali:
Queueing Analysis of ATM Tandem Queues with Correlated Arrivals. INFOCOM 1995: 709-716 - 1994
- [j12]Xing Chen, Jeremiah F. Hayes, Mustafa K. Mehmet Ali:
Performance comparison of two input access methods for a multicast switch. IEEE Trans. Commun. 42(5): 2174-2178 (1994) - [j11]Mustafa K. Mehmet Ali, M. Youssefi, H. T. Nguyen:
The performance analysis and implementation of an input access scheme in a high-speed packet switch. IEEE Trans. Commun. 42(12): 3189-3199 (1994) - 1993
- [j10]Bruno Gréla-M'Poko, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
An approximate performance analysis of interconnected token-passing rings. IEEE Trans. Commun. 41(8): 1142-1146 (1993) - [j9]Mustafa K. Mehmet Ali, Faouzi Kamoun:
Neural networks for shortest path computation and routing in computer networks. IEEE Trans. Neural Networks 4(6): 941-954 (1993) - [c4]Mustafa K. Mehmet Ali:
The Performance Analysis of a Random Packet Selection Policy for Multicast Switching. INFOCOM 1993: 1117-1126 - [c3]Faouzi Kamoun, Mustafa K. Mehmet Ali:
Statistical analysis of the traffic generated by the superposition of N independent interrupted Poisson processes. Information Theory and Applications 1993: 325-342 - 1992
- [j8]Z. Luan, Jeremiah F. Hayes, Mustafa K. Mehmet Ali:
Frame Synchronization Performance of SONET Signals. Comput. Networks ISDN Syst. 25(2): 183-190 (1992) - 1991
- [j7]Mustafa K. Mehmet Ali, J. F. Sauriol:
Performance of a 2 × 2 banyan switch with non-symmetric traffic and variable message lengths. Comput. Commun. 14(5): 305-311 (1991) - [j6]Jeremiah F. Hayes, Richard Breault, Mustafa K. Mehmet Ali:
Performance analysis of a multicast switch. IEEE Trans. Commun. 39(4): 581-587 (1991) - [j5]Bruno Gréla-M'Poko, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
Approximate analysis of asymmetric single-service prioritized token passing systems. IEEE Trans. Commun. 39(7): 1037-1040 (1991) - [c2]Mustafa K. Mehmet Ali, M. Youssefi:
The Performance Analysis of an Input Access Scheme in a High-Speed Packet Switch. INFOCOM 1991: 454-461 - [c1]Xing Chen, Jeremiah F. Hayes, Mustafa K. Mehmet Ali:
Performance Analysis of Cyclic-Priority Input Access Method for a Multicast Switch. INFOCOM 1991: 1189-1195 - 1990
- [j4]Mustafa K. Mehmet Ali, Bruno Gréla-M'Poko, Jeremiah F. Hayes:
Comparison of accessing techniques with priority. Comput. Commun. 13(3): 149-156 (1990)
1980 – 1989
- 1988
- [j3]Mustafa K. Mehmet Ali, C. Murray Woodside, Jeremiah F. Hayes:
Re-Assembly Buffer Requirements in a Packet Voice Network. Comput. Networks 15: 109-119 (1988) - [j2]Mustafa K. Mehmet Ali, Jeremiah F. Hayes, Ahmed K. Elhakeem:
Traffic analysis of a local area network with a star topology. IEEE Trans. Commun. 36(6): 703-712 (1988) - 1986
- [j1]Ahmed K. Elhakeem, Bruno Gréla-M'Poko, Mustafa K. Mehmet Ali, Jeremiah F. Hayes:
Analysis of a Hybrid (Demand Assignment TDMA) Protocol for Video Teleconferencing-Voice Data Optical Networks. Comput. Networks 11: 219-241 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint