![]() | Up a level |
Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605
Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .
Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Sellami, Mohamed, Al-Khafajiy, Mohammed, Atif, Yacine, Ugljanin, Emir, Faci, Noura, Baker, Thar and Maamar, Zakaria (2018) Cognitive Computing Meets the Internet of Things. In: 13th International Conference on Software Technologies.
Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Al-Khafajiy, Mohammed, Baker, Thar, Waraich, Atif, Al-Jumeily, Dhiya and Hussain, Abir (2019) IoT-Fog Optimal Workload via Fog Offloading. In: IEEE/ACM International Conference on Utility and Cloud Computing Companion.
Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.
Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.
Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.
Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.
Sellami, Mohamed, Al-Khafajiy, Mohammed, Atif, Yacine, Ugljanin, Emir, Faci, Noura, Baker, Thar and Maamar, Zakaria (2018) Cognitive Computing Meets the Internet of Things. In: 13th International Conference on Software Technologies.
Al-Khafajiy, Mohammed, Otoum, Safa, Baker, Thar, Asim, Muhammad, Maamar, Zakaria, Aloqaily, Moayad, Taylor, Mark and Randles, Martin (2021) Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Transactions on Internet Technology, 21 (3). pp. 1-23. ISSN 1533-5399
Hudson, John (2010) Culture and communication. Digital Imaging and Photography .
Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .
Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.
Hudson, John (2010) Culture and communication. Digital Imaging and Photography .
Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .
Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605
Hudson, John (2011) Utopias, the cathedral of the new Worlds and the microchip. Digital Imaging and Photography .
Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.
Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605
Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .
Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .
Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .
Hudson, John (2010) Culture and communication. Digital Imaging and Photography .
Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Meng, Hongying, Freeman, Micheal, Pears, Nick and Bailey, Chris (2008) FPGA implementation of real-time human motion recognition on a reconfigurable video processing architecture. Journal of Real-time Image Processing, 3 (3). pp. 163-176. ISSN 1861-8200
Meng, Hongying, Pears, Nick, Freeman, Michael and Bailey, Chris (2008) Motion history histograms for human action recognition. In: Embedded Computer Vision (Advances in Pattern Recognition). Springer, UK. ISBN 9781848003033
Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215
Meng, Hongying, Freeman, Micheal, Pears, Nick and Bailey, Chris (2008) FPGA implementation of real-time human motion recognition on a reconfigurable video processing architecture. Journal of Real-time Image Processing, 3 (3). pp. 163-176. ISSN 1861-8200
Meng, Hongying, Pears, Nick, Freeman, Michael and Bailey, Chris (2008) Motion history histograms for human action recognition. In: Embedded Computer Vision (Advances in Pattern Recognition). Springer, UK. ISBN 9781848003033
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X
Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.
Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.
Al-Khafajiy, Mohammed, Baker, Thar, Waraich, Atif, Al-Jumeily, Dhiya and Hussain, Abir (2019) IoT-Fog Optimal Workload via Fog Offloading. In: IEEE/ACM International Conference on Utility and Cloud Computing Companion.
Al-Khafajiy, Mohammed, Webster, Lee, Baker, Thar and Waraich, Atif (2018) Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In: International Conference on Future Networks and Distributed Systems.
Al-Khafajiy, Mohammed, Otoum, Safa, Baker, Thar, Asim, Muhammad, Maamar, Zakaria, Aloqaily, Moayad, Taylor, Mark and Randles, Martin (2021) Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Transactions on Internet Technology, 21 (3). pp. 1-23. ISSN 1533-5399
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X
Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315
Al-Khafajiy, Mohammed, Webster, Lee, Baker, Thar and Waraich, Atif (2018) Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In: International Conference on Future Networks and Distributed Systems.
Hudson, John (2011) Utopias, the cathedral of the new Worlds and the microchip. Digital Imaging and Photography .
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Hudson, John (2010) Culture and communication. Digital Imaging and Photography .
Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X
Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.
Al-Khafajiy, Mohammed, Baker, Thar, Waraich, Atif, Al-Jumeily, Dhiya and Hussain, Abir (2019) IoT-Fog Optimal Workload via Fog Offloading. In: IEEE/ACM International Conference on Utility and Cloud Computing Companion.
Al-Khafajiy, Mohammed, Otoum, Safa, Baker, Thar, Asim, Muhammad, Maamar, Zakaria, Aloqaily, Moayad, Taylor, Mark and Randles, Martin (2021) Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Transactions on Internet Technology, 21 (3). pp. 1-23. ISSN 1533-5399
Al-Khafajiy, Mohammed, Webster, Lee, Baker, Thar and Waraich, Atif (2018) Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In: International Conference on Future Networks and Distributed Systems.
Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.
Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.
Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X
Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315
Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605
Sellami, Mohamed, Al-Khafajiy, Mohammed, Atif, Yacine, Ugljanin, Emir, Faci, Noura, Baker, Thar and Maamar, Zakaria (2018) Cognitive Computing Meets the Internet of Things. In: 13th International Conference on Software Technologies.
Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .
Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.
Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.
Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.
Kemp, Peter and Mcmanus, John (2009) Whither enterprise architecture? ITNOW Computing Journal, 51 (2). pp. 20-21. ISSN 1746-5702
Kemp, Peter and Mcmanus, John (2009) Whither enterprise architecture? ITNOW Computing Journal, 51 (2). pp. 20-21. ISSN 1746-5702
Kemp, Peter and Mcmanus, John (2009) Whither enterprise architecture? ITNOW Computing Journal, 51 (2). pp. 20-21. ISSN 1746-5702
Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .
Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.
Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315
Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.
Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .
Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Hudson, John (2010) Culture and communication. Digital Imaging and Photography .
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215
Hudson, John (2011) Utopias, the cathedral of the new Worlds and the microchip. Digital Imaging and Photography .
Meng, Hongying, Freeman, Micheal, Pears, Nick and Bailey, Chris (2008) FPGA implementation of real-time human motion recognition on a reconfigurable video processing architecture. Journal of Real-time Image Processing, 3 (3). pp. 163-176. ISSN 1861-8200
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X
Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X
Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .
Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .