Artificial potential field approach in WSN deployment: Cost, QoM, connectivity, and lifetime constraints N Aitsaadi, N Achir, K Boussetta, G Pujolle Computer Networks 55 (1), 84-105, 2011 | 54 | 2011 |
Differentiated underwater sensor network deployment N Aitsaadi, N Achir, K Boussetta, G Pujolle Oceans 2007-Europe, 1-6, 2007 | 53 | 2007 |
A tabu search wsn deployment method for monitoring geographically irregular distributed events N Aitsaadi, N Achir, K Boussetta, G Pujolle Sensors 9 (3), 1625-1643, 2009 | 51 | 2009 |
Multi-objective WSN deployment: quality of monitoring, connectivity and lifetime N Aitsaadi, N Achir, K Boussetta, G Pujolle 2010 IEEE International Conference on Communications, 1-6, 2010 | 39 | 2010 |
On the objective evaluation of real-time networked games A Kaiser, D Maggiorini, N Achir, K Boussetta GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-5, 2009 | 31 | 2009 |
Wireless sensor network clustering for UAV-based data gathering CY Tazibt, M Bekhti, T Djamah, N Achir, K Boussetta 2017 Wireless Days, 245-247, 2017 | 23 | 2017 |
WLAN planning: Separate and joint optimization of both access point placement and channel assignment A Farsi, N Achir, K Boussetta annals of telecommunications-annales des télécommunications 70 (5), 263-274, 2015 | 22 | 2015 |
A tabu search approach for differentiated sensor network deployment N Aitsaadi, N Achir, K Khaled, G Pujolle 2008 5th IEEE Consumer Communications and Networking Conference, 163-167, 2008 | 22 | 2008 |
Path planning of unmanned aerial vehicles with terrestrial wireless network tracking M Bekhti, M Abdennebi, N Achir, K Boussetta 2016 Wireless Days (WD), 1-6, 2016 | 21 | 2016 |
A new security games based reaction algorithm against DOS attacks in VANETs MN Mejri, N Achir, M Hamdi 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016 | 20 | 2016 |
Potential field approach to ensure connectivity and differentiated detection in WSN deployment N Aitsaadi, N Achir, K Boussetta, G Pujolle 2009 IEEE International Conference on Communications, 1-6, 2009 | 16 | 2009 |
A new group Diffie-Hellman key generation proposal for secure VANET communications MN Mejri, N Achir, M Hamdi 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016 | 15 | 2016 |
Drones path planning for WSN data gathering: A column generation heuristic approach M Garraffa, M Bekhti, L Létocart, N Achir, K Boussetta 2018 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2018 | 14 | 2018 |
Heuristic approaches for access points deployment and Frequency Assignment in WLANs A Farsi, N Achir, K Boussetta Global Information Infrastructure Symposium-GIIS 2011, 1-7, 2011 | 14 | 2011 |
Vehicular ad-hoc networks using slotted Aloha: point-to-point, emergency and broadcast communications B Blaszczyszyn, P Muhlethaler, N Achir 2012 IFIP Wireless Days, 1-6, 2012 | 13 | 2012 |
Heuristic deployment to achieve both differentiated detection and connectivity in wsn N Aitsaadi, N Achir, K Boussetta, G Pujolle VTC Spring 2008-IEEE Vehicular Technology Conference, 123-127, 2008 | 13 | 2008 |
DM2-ECOP: An efficient computation offloading policy for multi-user multi-cloudlet mobile edge computing environment H Mazouzi, N Achir, K Boussetta ACM Transactions on Internet Technology (TOIT) 19 (2), 1-24, 2019 | 12 | 2019 |
Active networking system evaluation: A practical experience N Achir, MSP Fonseca, YMG Doudane, N Agoulmine, A Mehaoua Networking and Information Systems Journal 3 (2), 431-448, 2000 | 12 | 2000 |
End-to-end efficient heuristic algorithm for 5G network slicing A Kammoun, N Tabbane, G Diaz, A Dandoush, N Achir 2018 IEEE 32nd International Conference on Advanced Information Networking …, 2018 | 11 | 2018 |
A gradient approach for differentiated wireless sensor network deployment N Aitsaadi, N Achir, K Boussetta, B Gavish 2008 1st IFIP Wireless Days, 1-5, 2008 | 11 | 2008 |