Scholarworks Repository

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Sort by: Order: Results:

  • Itani M.; Diab H. (2004)
    This paper presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. MorphoSys, a dynamic reconfigurable architecture that sustains implementations that ...
  • Kabalan K.Y.; El-Hajj A.; Al-Husseini M. (WASHINGTON2000 FLORIDA AVE NW, WASHINGTON, DC 20009 USA, 2004)
    In this paper, we introduce a new class of planar arrays that we call the Bessel planar arrays. A formula for the current distribution in the elements of these arrays is presented, which is related to Bessel functions. For ...
  • Artail H.A. (AMSTERDAMPO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS, 2004)
    Web personalization and customization are increasingly becoming important services for web users. The conventional approaches used in implementing these services often lead to poor responsiveness, lengthy network delays, ...
  • Kayssi A.; Sharafeddine S.; Karaki H. (HOBOKEN111 RIVER ST, HOBOKEN, NJ 07030 USA, 2004)
    Data communications and computer networking (DCCN) has established itself as an essential part of most computer science and engineering curricula, usually in the form of courses and-or laboratories. For reliable training ...
  • Saade J.J.; Diab H.B. (2004)
    Based on the various components involved in the structure of fuzzy logic controllers, this study provides an in-depth examination of the different features and disadvantages of commonly used defuzzification methods. Then ...
  • Itani W.; Kayssi A.I. (2004)
    This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible, flexible, and customizable. It supports end-to-end client authentication, ...
  • Meskaoui N.; Gaiti D.; Kabalan K. (2004)
    This paper presents our approach integrating a high level of intelligence within telecommunication networks. Artificial intelligence has proved its efficiency in resolving complex issues in different fields like air traffic ...
  • Chehab A.; Kayssi A.; Nazer A.; Aaraj N. (2004)
    We propose a method for testing dynamic CMOS circuits using the transient power supply current, iDDT. The method is based on setting the primary inputs of the circuit under test, switching the clock signal and monitoring ...
  • Chehab A.; El-Hajj A.; Al-Husseini M.; Artail H. (DUBLINDUBLIN INST TECHNOLOGY, BOLTON ST, DUBLIN, IRELAND, 2004)
    Spreadsheets were originally intended for business applications like finance, accounting, and so on. However, the ubiquity and simplicity of spreadsheet programs, in addition to their rich library of built-in functions, ...
  • Kayssi A.; El-Haj-Mahmoud A. (2004)
    New protocols and network applications must be extensively tested before deployment on the Internet. In this paper, we describe the design and implementation of EmuNET, a lightweight, portable, configurable, and extendable ...
  • El-Hajj A.; Kabalan K.Y.; Elias F. (2004)
    The problem of penetration into a cylindrical cavity through apertures was discussed. The characteristic mode theory was used to solve the aperture problem for a cylindrical conducting waveguide. The equivalence principle ...
  • Kabalan K.Y.; El-Hajj A.; Choufani D. (2004)
    The performance of turbo codes with short frame size of 320 bits with variable rate and constraint length of 4 and 5 of AWGN channel is investigated. Two encoders (13,15) and (37,21) with constraint length 4 and 5 were ...
  • Aaraj N.; Nazer A.; Chehab A.; Kayssi A. (LOS ALAMITOS10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, 2004)
    We propose methods for testing dynamic CMOS circuits using the transient power supply current, iDDT. The methods are based on setting the primary inputs of the circuit under test, switching the clock signal and monitoring ...
  • Mansour M.M. (2004)
    This paper investigates high-performance decoder design for regular and irregular repeat-accumulate (RA) codes of large block length. In order to achieve throughputs and bit-error rate performance that are inline with ...
  • Derbas G.; Kayssi A.; Artail H.; Chehab A. (2004)
    In this paper we present TRUMMAR, a reputation-based trust model that mobile agent systems can use to protect agents from malicious hosts. TRUMMAR is unique in being a truly comprehensive model since it accounts, in a ...
  • Kuwatly I.; Sraj M.; Masri Z.A.; Artail H. (2004)
    A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a ...
  • El-Afifi L.; Karaki M.; Korban J.; Al Alaoui M.A. (2004)
    In this paper, we propose 'Hands-free Interface', a technology that is intended to replace conventional computer screen pointing devices for the use of the disabled. We describe a real time, non-intrusive, fast and affordable ...
  • Diab H.B. (PISCATAWAY445 HOES LANE, PISCATAWAY, NJ 08855 USA, 2004)
    This paper describes and evaluates the use of fuzzy logic arbiters for multiple-bus shared memory multiprocessor system. Multiple-bus systems allow multiple and simultaneous bus transfer in addition to a high degree of ...
  • Kayssi A.I. (PISCATAWAY445 HOES LANE, PISCATAWAY, NJ 08855 USA, 2004)
    The transient response of metal-oxide-semiconductor (MOS) gates is a topic covered in most textbooks on digital integrated circuits and very-large-scale-integration (VLSI) design. One method often used to calculate first-order ...
  • Artail H.A. (OXFORDOXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2004)
    In this paper we present a method for password recovery through the employment of multiple Web servers, and which we name Peer-Assisted Carrying Authentication (PACA). The paper starts by highlighting the vulnerabilities ...

Search Scholarworks


Browse

My Account