Name
Papers
Collaborators
SELIM G. AKL
209
105
Citations 
PageRank 
Referers 
2074
299.32
2792
Referees 
References 
1550
1409
Search Limit
1001000
Title
Citations
PageRank
Year
How To Encrypt A Graph00.342020
A minimum knapsack-based resource allocation for underlaying device-to-device communication.00.342018
Worst Case Branching And Other Measures Of Nondeterminism10.352017
Improved electromagnetic tracking for catheter path reconstruction with application in high-dose-rate brachytherapy.20.422017
Time: The Final Frontier00.342017
Nonuniversality explained.00.342016
A Two-Phase Auction-Based Fair Resource Allocation For Underlaying D2d Communications30.402016
A Stable Matching Algorithm For Resource Allocation For Underlaying Device-To-Device Communications30.412016
A Local Search Algorithm for Resource Allocation for Underlaying Device-to-Device Communications.30.412015
Carving Secret Messages out of Public Information20.442015
Electromagnetic tracking in surgical and interventional environments: usability study.141.052015
What is computation?10.382014
December Issue 2013 Editorial Note00.342014
A survey of access management techniques in machine type communications421.322014
Lower Bound for Converting an NFA with Finite Nondeterminism into an MDFA.00.342014
Comparisons between Measures of Nondeterminism on Finite Automata.50.422013
A Cellular Automaton Model for Wireless Sensor Networks.50.492012
State complexity and limited nondeterminism70.472012
State Complexity of Finite Tree Width NFAs.00.342012
Computing With Uncertainty And Its Implications To Universality00.342012
Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data.00.342011
Enhancing identity trust in cryptographic key management systems for dynamic environments30.382011
Trans-Canada Slimeways: Slime mould imitates the Canadian transport network60.482011
A Quantum Cryptographic Solution To The Problem Of Access Control In A Hierarchy50.482010
On The Importance Of Being Quantum20.642010
Quantum security in wireless sensor networks40.472010
An Exact Solution to the Two-Dimensional Arbitrary-Threshold Density Classification Problem.00.342009
Some topological properties of star graphs: The surface area and volume130.652009
A Localized Algorithm for Target Monitoring in Wireless Sensor Networks10.362009
On replacing cryptographic keys in hierarchical key management systems50.422008
Quantum Wireless Sensor Networks10.352008
Accelerating machines: a review60.492008
Planar tree transformation: Results and counterexample20.392008
Unconventional Computational Problems With Consequences To Universality30.502008
Optimal Linear-Time Algorithm For Uplink Scheduling Of Packets With Hard Or Soft Deadlines In Wimax10.372008
Optimal Cell Size in Multi-Hop Cellular Networks20.392008
Key Distribution based on Quantum Fourier Transform00.342008
Parallelism In Quantum Information Processing Defeats The Universal Computer20.362007
Number of processors with partitioning strategy and EDF-schedulability test: upper and lower bounds with comparison10.362007
An Adaptive Double-layer Workflow Scheduling Approach for Grid Computing30.502007
Two-Phase Computation and Data Scheduling Algorithms for Workflows in the Grid30.462007
A Performance Model Of Disha Routing In K-Ary N-Cube Networks10.362007
PFAS: A Resource-Performance-Fluctuation-Aware Workflow Scheduling Algorithm for Grid Computing90.582007
Unconventional Computation, 6th International Conference, UC 2007, Kingston, Canada, August 13-17, 2007, Proceedings164.782007
Quantum computing: beyond the limits of conventional computation50.632007
On planar path transformation.60.522007
Aspects Of Biomolecular Computing30.412007
Comparing Priority Functions of Heuristic Scheduling Algorithms for Soft Real-Time Tasks00.342007
On the Average Capacity of Vehicle to Vehicle Networks00.342007
A Performance Study of Splittable and Unsplittable Traffic Allocation in Wireless Sensor Networks20.392006
  • 1
  • 2