default search action
Nadjib Achir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir:
Bleach: From WiFi probe-request signatures to MAC association. Ad Hoc Networks 164: 103623 (2024) - [c67]Rosario Patanè, Nadjib Achir, Andrea Araldo, Lila Boukhatem:
Can Vehicular Cloud Replace Edge Computing? WCNC 2024: 1-6 - 2023
- [j15]Pedro Cruz, Nadjib Achir, Aline Carneiro Viana:
On the Edge of the Deployment: A Survey on Multi-access Edge Computing. ACM Comput. Surv. 55(5): 99:1-99:34 (2023) - [c66]Paul Muhlethaler, Nadjib Achir:
Analyzing and Optimizing Extended-CAM Service Using Simple Stochastic Geometry Model. PEMWN 2023: 1-6 - [c65]João Paulo Esper, Nadjib Achir, Kleber Vieira Cardoso, Jussara M. Almeida:
Impact of User Privacy and Mobility on Edge Offloading. PIMRC 2023: 1-6 - [c64]Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir:
Introducing benchmarks for evaluating user-privacy vulnerability in WiFi. VTC2023-Spring 2023: 1-7 - [c63]Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir:
Do WiFi Probe-Requests Reveal Your Trajectory? WCNC 2023: 1-6 - [i2]João Paulo Esper, Nadjib Achir, Kleber Vieira Cardoso, Jussara M. Almeida:
Impact of User Privacy and Mobility on Edge Offloading. CoRR abs/2306.15740 (2023) - 2022
- [j14]Celia Yasmine Tazibt, Nadjib Achir, Tounsia Djamah:
Online drone-based data gathering strategies for ground sensor networks. Int. J. Sens. Networks 38(3): 177-190 (2022) - [c62]Fernando Dias de Mello Silva, Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Anne Fladenmuller, Luís Henrique M. K. Costa:
Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry Pi. CSNet 2022: 1-7 - 2021
- [c61]Loïc Jouans, Aline Carneiro Viana, Nadjib Achir, Anne Fladenmuller:
Associating the Randomized Bluetooth MAC Addresses of a Device. CCNC 2021: 1-6 - [c60]Sanaullah Faiz, Nadjib Achir, Khaled Boussetta:
Increasing vehicles perception using cooperative relaying and priority-based beaconing. HPSR 2021: 1-6 - [c59]Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Catuscia Palamidessi:
Public Wireless Packets Anonymously Hurt You. LCN 2021: 649-652 - [c58]Wassim Seifeddine, Cédric Adjih, Nadjib Achir:
Dynamic Hierarchical Neural Network Offloading in IoT Edge Networks. PEMWN 2021: 1-6 - [i1]Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir:
SimBle: Generating privacy preserving real-worldBLE traces with ground truth. CoRR abs/2101.11728 (2021) - 2020
- [j13]Yong Jin, Daniele D'Agostino, Nadjib Achir, James Nightingale, Jiacun Wang:
Special issue on multimedia fog/edge computing systems. Multim. Syst. 26(1): 1-2 (2020) - [c57]Hoan Le, Khaled Boussetta, Nadjib Achir:
A unified and semantic data model for fog computing. GIIS 2020: 1-6 - [c56]Sanaullah Faiz, Nadjib Achir, Khaled Boussetta:
On the benefits of increased vehicles perception to cooperative communications: a performance evaluation study. MobiArch 2020: 16-21 - [c55]Hoan Le, Nadjib Achir, Khaled Boussetta:
Fog Services Provider Architecture for IoT. NOF 2020: 8-15
2010 – 2019
- 2019
- [j12]Houssemeddine Mazouzi, Khaled Boussetta, Nadjib Achir:
Maximizing mobiles energy saving through tasks optimal offloading placement in two-tier cloud: A theoretical and an experimental study. Comput. Commun. 144: 132-148 (2019) - [j11]Yong Jin, Hang Shen, Daniele D'Agostino, Nadjib Achir, James Nightingale:
Guest editorials: Special issue on fog/edge networking for multimedia applications. Peer-to-Peer Netw. Appl. 12(6): 1477-1479 (2019) - [j10]Houssemeddine Mazouzi, Nadjib Achir, Khaled Boussetta:
DM2-ECOP: An Efficient Computation Offloading Policy for Multi-user Multi-cloudlet Mobile Edge Computing Environment. ACM Trans. Internet Techn. 19(2): 24:1-24:24 (2019) - [c54]Amal Kammoun, Nabil Tabbane, Gladys Diaz, Nadjib Achir, Abdulhalim Dandoush:
Proactive Network Slices Management Algorithm Based on Fuzzy Logic System and Support Vector Regression Model. BWCCA 2019: 386-397 - [c53]Amal Kammoun, Nabil Tabbane, Gladys Diaz, Nadjib Achir, Abdulhalim Dandoush:
Inter-slice Mobility Management in the Context of SDN/NFV Networks. DiCES-N@ICTAC 2019: 77-90 - [c52]Houssemeddine Mazouzi, Nadjib Achir, Khaled Boussetta:
Elastic Offloading of Multitasking Applications to Mobile Edge Computing. MSWiM 2019: 307-314 - [c51]Hoan Le, Nadjib Achir, Khaled Boussetta:
Fog computing architecture with heterogeneous Internet of Things technologies. NOF 2019: 130-133 - [c50]Amal Kammoun, Nabil Tabbane, Gladys Diaz, Nadjib Achir, Abdulhalim Dandoush:
Dynamic Handler Framework for Network Slices Management. SoftCOM 2019: 1-6 - 2018
- [c49]Amal Kammoun, Nabil Tabbane, Gladys Diaz, Abdulhalim Dandoush, Nadjib Achir:
End-to-End Efficient Heuristic Algorithm for 5G Network Slicing. AINA 2018: 386-392 - [c48]Amal Kammoun, Nabil Tabbane, Gladys Diaz, Nadjib Achir:
Admission Control Algorithm for Network Slicing Management in SDN-NFV Environment. ICMCS 2018: 1-6 - [c47]Houssemeddine Mazouzi, Nadjib Achir, Khaled Boussetta:
Maximizing Mobiles Energy Saving Through Tasks Optimal Offloading Placement in two-tier Cloud. MSWiM 2018: 137-145 - [c46]Sadia Ingrachen, Nadjib Achir, Paul Mühlethaler, Tounsia Djamah, Amine Berqia:
A Collaborative Environment Perception Approach for Vehicular Ad Hoc Networks. VTC Fall 2018: 1-5 - [c45]Celia Yasmine Tazibt, Nadjib Achir, Paul Mühlethaler, Tounsia Djamah:
UAV-Based Data Gathering Using An Artificial Potential Fields Approach. VTC Fall 2018: 1-5 - [c44]Michele Garraffa, Mustapha Bekhti, Lucas Létocart, Nadjib Achir, Khaled Boussetta:
Drones path planning for WSN data gathering: A column generation heuristic approach. WCNC 2018: 1-6 - 2017
- [c43]Younes Bouchaala, Paul Mühlethaler, Oyunchimeg Shagdar, Nadjib Achir:
Optimized spatial CSMA for VANETs: A comparative study using a simple stochastic model and simulation results. CCNC 2017: 293-298 - [c42]Mustapha Bekhti, Michele Garraffa, Nadjib Achir, Khaled Boussetta, Lucas Létocart:
Assessment of multi-UAVs tracking for data gathering. IWCMC 2017: 1004-1009 - [c41]Paul Mühlethaler, Younes Bouchaala, Oyunchimeg Shagdar, Nadjib Achir:
Evaluating the gain of directional antennas in linear VANETs using stochastic geometry. PEMWN 2017: 1-7 - [c40]Celia Yasmine Tazibt, Mustapha Bekhti, Tounsia Djamah, Nadjib Achir, Khaled Boussetta:
Wireless sensor network clustering for UAV-based data gathering. Wireless Days 2017: 245-247 - [c39]Younes Bouchaala, Paul Mühlethaler, Nadjib Achir:
Analysis of the IEEE 802.11 EDCF scheme for broadcast traffic: Application for VANETs. Wireless Days 2017: 252-257 - [c38]Mustapha Bekhti, Nadjib Achir, Khaled Boussetta:
Swarm of Networked Drones for Video Detection of Intrusions. WICON 2017: 221-231 - 2016
- [c37]Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi:
A new security games based reaction algorithm against DOS attacks in VANETs. CCNC 2016: 837-840 - [c36]Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi:
A new group Diffie-Hellman key generation proposal for secure VANET communications. CCNC 2016: 992-995 - [c35]Rafael Araujo da Silva, Aldri Santos, Michele Nogueira, Khaled Boussetta, Nadjib Achir:
Avoiding Collisions by Time Slot Reduction Supporting Voice and Video in 802.11 Networks. GLOBECOM 2016: 1-6 - [c34]Mustapha Bekhti, Nadjib Achir, Khaled Boussetta, Marwen Abdennebi:
A Heuristic Path Planning Approach for UAVs Integrating Tracking Support Through Terrestrial Wireless Networks. GOODTECHS 2016: 213-223 - [c33]Nadjib Achir, Younes Bouchaala, Paul Mühlethaler, Oyunchimeg Shagdar:
Comparison of spatial aloha and CSMA using simple stochastic geometry models for 1D and 2D networks. ICT 2016: 1-7 - [c32]Nadjib Achir, Younes Bouchaala, Paul Mühlethaler, Oyunchimeg Shagdar:
Optimisation of spatial CSMA using a simple stochastic geometry model for 1D and 2D networks. IWCMC 2016: 558-563 - [c31]Mustapha Bekhti, Marwen Abdennebi, Nadjib Achir, Khaled Boussetta:
Path planning of unmanned aerial vehicles with terrestrial wireless network tracking. Wireless Days 2016: 1-6 - 2015
- [j9]Abdelhak Farsi, Nadjib Achir, Khaled Boussetta:
WLAN planning: Separate and joint optimization of both access point placement and channel assignment. Ann. des Télécommunications 70(5-6): 263-274 (2015) - 2014
- [j8]Raouf Boutaba, Nadjib Achir, Marc St-Hilaire, Eduardo Freire Nakamura:
Planning and Deployment of Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c30]Nadjib Achir, Mérouane Debbah, Paul Mühlethaler:
Massive MIMO cooperative communications for wireless sensor networks: Throughput and energy efficiency analysis. PIMRC 2014: 590-594 - [c29]Ahmed Amari, Nadjib Achir, Paul Mühlethaler, Anis Laouiti:
Optimized broadcast scheme for mobile ad hoc networks. WCNC 2014: 2594-2598 - [c28]Nadjib Achir, Paul Mühlethaler:
Optimal sinks deployment and packet scheduling for Wireless Sensor Networks. Wireless Days 2014: 1-6 - 2013
- [j7]Arnaud Kaiser, Nadjib Achir, Khaled Boussetta:
Multipath traffic balancing approach for disconnection reduction in video games over mobile ad hoc networks. Wirel. Commun. Mob. Comput. 13(3): 328-342 (2013) - 2012
- [j6]Nadjib Achir, Haris Gacanin, Otto Carlos Muniz Bandeira Duarte:
Foreword to the special issue on wireless network: from home to backbone. Telecommun. Syst. 51(1): 1-2 (2012) - [c27]Abdelhak Farsi, Nadjib Achir, Khaled Boussetta, Gladys Diaz, Arturo Gomez:
Backhaul Topology Design and Weighted Max-Min Fair Capacity Allocation in Wireless Mesh Networks. ICAIT 2012: 296-309 - [c26]Arturo Gomez, Gladys Diaz, Khaled Boussetta, Nadjib Achir, Abdelhak Farsi:
Adaptive Contention Window for Zone-Based Dissemination of Vehicular Traffic. ICAIT 2012: 330-339 - [c25]Abdelhak Farsi, Nadjib Achir, Khaled Boussetta:
Three-phase heuristic algorithm for Wireless LAN planning. WCNC 2012: 2294-2299 - [c24]Bartlomiej Blaszczyszyn, Paul Mühlethaler, Nadjib Achir:
Vehicular Ad-hoc Networks using slotted Aloha: Point-to-point, emergency and broadcast communications. Wireless Days 2012: 1-6 - 2011
- [j5]Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta, Guy Pujolle:
Artificial potential field approach in WSN deployment: Cost, QoM, connectivity, and lifetime constraints. Comput. Networks 55(1): 84-105 (2011) - [j4]Sondes Khemiri, Khaled Boussetta, Nadjib Achir, Guy Pujolle:
Mobile WiMAX Bandwidth Reservation Thresholds: A Heuristic Approach. Int. J. Wirel. Networks Broadband Technol. 1(2): 42-61 (2011) - [c23]Arnaud Kaiser, Khaled Boussetta, Nadjib Achir:
An Energy-Delay Routing Protocol for Video Games over Multihops Ad Hoc Networks. ADHOCNETS 2011: 193-208 - [c22]Khaled Boussetta, Arnaud Kaiser, Nadjib Achir:
Effects of packetization delay on multiplayer gaming experience over ad hoc networks. Wireless Days 2011: 1-6 - 2010
- [c21]Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta, Guy Pujolle:
Multi-Objective WSN Deployment: Quality of Monitoring, Connectivity and Lifetime. ICC 2010: 1-6 - [c20]Salim Benayoune, Nadjib Achir, Khaled Boussetta, Ken Chen:
A MAC-level flow control algorithm for H.264/AVC video streaming over HSDPA. IWCMC 2010: 1166-1171 - [c19]Claudio E. Palazzi, Arnaud Kaiser, Nadjib Achir, Khaled Boussetta:
A preliminary evaluation of backup servers for longer gaming sessions in MANETs. SimuTools 2010: 12 - [c18]Sondes Khemiri, Guy Pujolle, Khaled Boussetta, Nadjib Achir:
A Combined MAC and Physical Resource Allocation Mechanism in IEEE 802.16e Networks. VTC Spring 2010: 1-5 - [c17]Arnaud Kaiser, Nadjib Achir, Khaled Boussetta:
A multipath traffic balancing proposal to reduce gaming disconnections in MANET. Wireless Days 2010: 1-5
2000 – 2009
- 2009
- [j3]Salim Benayoune, Nadjib Achir, Khaled Boussetta, Ken Chen:
A MAC Centric Cross Layer Approach for H.264 Video Streaming over HSDPA. J. Commun. 4(9): 691-699 (2009) - [j2]Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta, Guy Pujolle:
A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events. Sensors 9(3): 1625-1643 (2009) - [c16]Arnaud Kaiser, Dario Maggiorini, Nadjib Achir, Khaled Boussetta:
On the Objective Evaluation of Real-Time Networked Games. GLOBECOM 2009: 1-5 - [c15]Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta, Guy Pujolle:
Potential Field Approach to Ensure Connectivity and Differentiated Detection in WSN Deployment. ICC 2009: 1-6 - [c14]Arnaud Kaiser, Nadjib Achir, Khaled Boussetta:
Multiplayer games over wireless ad hoc networks: Energy and delay analysis. ICUMT 2009: 1-7 - [c13]Abdelhak Farsi, Nadjib Achir, Khaled Boussetta:
Two-tier Wireless Mesh Networks dimensioning. Wireless Days 2009: 1-5 - 2008
- [c12]Nadjib Aitsaadi, Nadjib Achir, Khaled Khaled, Guy Pujolle:
A Tabu Search Approach for Differentiated Sensor Network Deployment. CCNC 2008: 163-167 - [c11]Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta, Guy Pujolle:
Heuristic Deployment to Achieve Both Differentiated Detection and Connectivity in WSN. VTC Spring 2008: 123-127 - [c10]Salim Benayoune, Nadjib Achir, Khaled Boussetta, Ken Chen:
Content-Aware ARQ for H.264 Streaming in UTRAN. WCNC 2008: 1956-1961 - [c9]Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta, Bezalel Gavish:
A gradient approach for differentiated wireless sensor network deployment. Wireless Days 2008: 1-5 - [c8]Sondes Khemiri, Khaled Boussetta, Nadjib Achir:
Bandwidth partitioning for Mobile WiMAX service provisioning. Wireless Days 2008: 1-5 - 2007
- [c7]Salim Benayoune, Nadjib Achir, Khaled Boussetta, Ken Chen:
A study of H.264/AVC robustness over a wireless link. ISSPA 2007: 1-4 - [c6]Sondes Khemiri, Khaled Boussetta, Nadjib Achir, Guy Pujolle:
WiMax bandwidth provisioning service to residential customers. MWCN 2007: 116-120 - [c5]Sondes Khemiri, Khaled Boussetta, Nadjib Achir, Guy Pujolle:
Optimal Call Admission Control for an IEEE 802.16 Wireless Metropolitan Area Network. NET-COOP 2007: 105-114 - [c4]Ahmad Sardouk, Sidi-Mohammed Senouci, Nadjib Achir, Khaled Boussetta:
Assessment of MANET broadcast schemes in the application context of multiplayer video games. NETGAMES 2007: 55-60 - 2005
- [c3]Nadjib Achir:
Multi-object video error recovery over wireless networks. WMuNeP 2005: 32-37 - 2004
- [j1]Mauro Fonseca, Nazim Agoulmine, Yacine Ghamri-Doudane, Nadjib Achir, Guy Pujolle:
Une nouvelle architecture de gestion de réseaux DiffServ basée sur la technologie de réseau actif et la gestion à base de règles. Ann. des Télécommunications 59(5-6): 565-589 (2004) - 2003
- [c2]Nadjib Achir, Guy Pujolle:
Multi-Object Video Rate Control. Net-Con 2003: 191-202 - 2002
- [c1]Nadjib Achir, Nazim Agoulmine, Mauro Fonseca, Yacine Ghamri-Doudane, Guy Pujolle:
Active Technology as an Efficient Approach to Control DiffServ Networks: The DACA Architecture. MMNS 2002: 170-183
Coauthor Index
aka: Paul Muhlethaler
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint