default search action
Ehab S. Elmallah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
Flow Sharing Reliability in Energy Harvesting Wireless Sensing Networks. ICC 2024: 250-255 - 2022
- [c56]Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
On Slicing Weighted Energy-Harvesting Wireless Sensing Networks with Transmission Range Uncertainty. LCN 2022: 471-478 - [c55]Abdulsalam Basabaa, Ehab S. Elmallah:
On Configuring Directional Transmission for Path Exposure Reliability in Energy Harvesting Wireless Sensor Networks. SENSORNETS 2022: 60-70 - 2021
- [c54]Mohammed Elmorsy, Ehab S. Elmallah:
On Flow Reliability in Energy Harvesting Wireless Sensor Networks. ICC 2021: 1-6 - [c53]Abdulsalam Basabaa, Ehab S. Elmallah:
Extension Algorithms for Path Exposure in Energy Harvesting Wireless Sensor Networks. ICCCN 2021: 1-8 - [c52]Abdulsalam Basabaa, Ehab S. Elmallah:
Upper Bounds on Path Exposure in EH-WSNs with Variable Transmission Ranges. LCN 2021: 629-636 - [c51]Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
Breach Path Detection Reliability in Energy Harvesting Wireless Sensor Networks. LCN 2021: 637-644 - 2020
- [c50]Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
On Connected Components in Multistate Wireless Sensor Network Probabilistic Models. ICC 2020: 1-7 - [c49]Abdulsalam Basabaa, Ehab S. Elmallah:
Bounding Path Exposure in Energy Harvesting Wireless Sensor Networks Using Pathsets and Cutsets. LCN 2020: 503-508
2010 – 2019
- 2019
- [j19]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy expressions and the bottom-up design of computing policies. Computing 101(9): 1307-1326 (2019) - [c48]Rezwana Reaz, Ehab S. Elmallah, Mohamed G. Gouda:
Executing Firewalls in Public Clouds. ICCCNT 2019: 1-6 - [c47]Youssef N. Altherwy, Ehab S. Elmallah, Julie A. McCann:
Two-terminal connectivity in UWSN probabilistic graphs: A polynomial time algorithm: poster abstract. SenSys 2019: 444-445 - [c46]Abdulsalam Basabaa, Ehab S. Elmallah:
Bounds on Path Exposure in Energy Harvesting Wireless Sensor Networks. WCNC 2019: 1-7 - 2018
- [c45]Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
A Graph Theoretic Approach to Localization under Uncertainty. ICC 2018: 1-7 - [c44]Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
On Probabilistic Connected Components in Underwater Sensor Networks. LCN 2018: 200-207 - 2017
- [j18]Ehab S. Elmallah, Mohamed G. Gouda:
Hardness of Firewall Analysis. IEEE Trans. Dependable Secur. Comput. 14(3): 339-349 (2017) - [c43]Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
A factoring algorithm for probabilistic localization in Underwater Sensor Networks. ICC 2017: 1-7 - [c42]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy Expressions and the Bottom-Up Design of Computing Policies. NETYS 2017: 151-165 - 2016
- [j17]Wail Mardini, Yaser M. Khamayseh, Abedl Rahman Almodawar, Ehab S. Elmallah:
Adaptive RSSI-based localization scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 9(6): 991-1004 (2016) - [c41]Mohammed Elmorsy, Ehab S. Elmallah:
Packing of cutsets for a breach path detection problem. ICC 2016: 1-7 - [c40]Mohammed Elmorsy, Ehab S. Elmallah:
Breach Path Reliability for Directional Sensor Networks. LCN 2016: 371-379 - 2015
- [c39]Mohammed Elmorsy, Ehab S. Elmallah:
Guarding an area of interest in sensor grids with unreliable nodes. ICC 2015: 6456-6462 - [c38]Mohammed Elmorsy, Ehab S. Elmallah:
Reliable surveillance in ring deployed Wireless Sensor Networks. LCN 2015: 133-140 - [c37]Rezwana Reaz, Muqeet Ali, Mohamed G. Gouda, Marijn Heule, Ehab S. Elmallah:
The Implication Problem of Computing Policies. SSS 2015: 109-123 - 2014
- [c36]Mohammed Elmorsy, Ehab S. Elmallah:
On pathsets and cutsets of a Wireless Sensor Network surveillance problem. ICC 2014: 459-465 - [c35]Mohammed Elmorsy, Ehab S. Elmallah:
Breach path to target area detection reliability in Wireless Sensor Networks. LCN 2014: 253-261 - [c34]Md Asadul Islam, Ehab S. Elmallah:
Tree bound on probabilistic connectivity of Underwater Sensor Networks. LCN Workshops 2014: 746-752 - [c33]Ehab S. Elmallah, Mohamed G. Gouda:
Hardness of Firewall Analysis. NETYS 2014: 153-168 - [c32]Ehab S. Elmallah, Hrishikesh B. Acharya, Mohamed G. Gouda:
Incremental Verification of Computing Policies. SSS 2014: 226-236 - 2013
- [c31]Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms:
Location Uncertainty and Target Coverage in Wireless Sensor Networks Deployment. DCOSS 2013: 20-27 - [c30]Mohammed Elmorsy, Ehab S. Elmallah, Hosam M. F. AboElFotoh:
On path exposure in probabilistic wireless sensor networks. LCN 2013: 433-440 - 2012
- [c29]Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms:
On Breach Path Detection Reliability of Wireless Sensor Grids. ICCCN 2012: 1-7 - [c28]Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms:
An approach for bounding breach path detection reliability in wireless sensor networks. LCN 2012: 585-592 - [c27]Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms:
Balancing area coverage in partitioned wireless sensor networks. WCNC 2012: 2323-2328 - 2011
- [j16]Farid Naït-Abdesselam, Kwang-Cheng Chen, Ehab S. Elmallah, Matthias Frank:
Architectures and protocols for wireless mesh, ad hoc, and sensor networks. Wirel. Commun. Mob. Comput. 11(3): 303-305 (2011) - [c26]Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms, Hosam M. F. AboElFotoh:
On area coverage reliability of wireless sensor networks. LCN 2011: 580-588 - [c25]Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms:
Balanced slices in wireless sensor networks. WCNC 2011: 440-445 - 2010
- [c24]Mohamed H. Shazly, Ehab S. Elmallah, Hosam M. F. AboElFotoh:
A Three-State Node Reliability Model for Sensor Networks. GLOBECOM 2010: 1-5 - [c23]M. Takaffoli, Ehab S. Elmallah, Walied A. Moussa:
Scheduled Access Using the IEEE 802.15.4 Guaranteed Time Slots. ICC 2010: 1-5 - [c22]Abdullah-Al Mahmood, Ehab S. Elmallah:
An Algorithm for Incremental Joint Routing and Scheduling in Wireless Mesh Networks. WCNC 2010: 1-6
2000 – 2009
- 2009
- [j15]Periklis Chatzimisios, Yang Xiao, Ilenia Tinnirello, Fabrizio Granelli, Ehab S. Elmallah:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Recent Advances in IEEE 802.11 WLANs: Protocols, Solutions and Future Directions". Mob. Networks Appl. 14(6): 693-696 (2009) - [c21]Abdullah-Al Mahmood, Ehab S. Elmallah:
Joint non-bifurcated routing and scheduling in wireless grid mesh networks. BROADNETS 2009: 1-7 - [c20]Abdullah-Al Mahmood, Ehab S. Elmallah:
Incremental Routing and Scheduling in Wireless Grids. GLOBECOM 2009: 1-6 - [c19]Ehab S. Elmallah:
Message from the general chair. LCN 2009: 1-2 - [c18]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Consistent Fixed Points and Negative Gain. PDCAT 2009: 299-305 - [c17]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Brief Announcement: Consistent Fixed Points and Negative Gain. SSS 2009: 771-772 - 2008
- [j14]Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni:
Logarithmic keying. ACM Trans. Auton. Adapt. Syst. 3(4): 18:1-18:18 (2008) - [c16]Hosam M. F. AboElFotoh, Ehab S. Elmallah:
Reliability of wireless sensor grids. LCN 2008: 252-257 - 2007
- [j13]Hosam M. F. AboElFotoh, Ehab S. Elmallah, Hossam S. Hassanein:
A flow-based reliability measure for wireless sensor networks. Int. J. Sens. Networks 2(5/6): 311-320 (2007) - [j12]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. IEEE Trans. Parallel Distributed Syst. 18(4): 474-484 (2007) - [c15]Yaser M. Khamayseh, Ehab S. Elmallah:
Admission Control Framework for Delay Bounded Traffic in Cellular Networks. GLOBECOM 2007: 5070-5074 - [c14]Abdullah-Al Mahmood, Ehab S. Elmallah, Ahmed E. Kamal:
Non-Bifurcated Routing in Wireless Multi-Hop Mesh Networks. LCN 2007: 279-286 - 2006
- [j11]Hossam S. Hassanein, Alex Oliver, Nidal Nasser, Ehab S. Elmallah:
QoS-aware call admission control in wideband CDMA wireless networks. Int. J. Commun. Syst. 19(2): 185-203 (2006) - [j10]Ehab S. Elmallah, Hosam M. F. AboElFotoh:
Circular Layout Cutsets: An Approach for Improving Consecutive Cutset Bounds for Network Reliability. IEEE Trans. Reliab. 55(4): 602-612 (2006) - [c13]Hosam M. F. AboElFotoh, Ehab S. Elmallah, Hossam S. Hassanein:
On The Reliability of Wireless Sensor Networks. ICC 2006: 3455-3460 - [c12]Yaser M. Khamayseh, Ehab S. Elmallah:
An Adaptive Non-preemptive Scheduling Framework for Delay Bounded Traffic in Cellular Networks. LCN 2006: 81-88 - [c11]Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah:
Logarithmic Keying of Communication Networks. SSS 2006: 314-323 - 2005
- [c10]Yaser M. Khamayseh, Ehab S. Elmallah:
A delay bounded approach for streaming services in CDMA cellular networks. Q2SWinet 2005: 130-135 - [c9]Ehab S. Elmallah, Mrinal K. Mandal:
On Maintaining Multimedia Session's Quality in CDMA Cellular Networks Using a Rate Adaptive Framework. QSHINE 2005: 42 - 2004
- [c8]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal dispersal of special certificate graphs. GLOBECOM 2004: 2213-2217 - [c7]Hossam S. Hassanein, Alex Oliver, Nidal Nasser, Ehab S. Elmallah:
Uplink QoS-Aware Admission Control in WCDMA Networks with Class-Based Power Sharing. QSHINE 2004: 10-17 - [c6]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda:
Optimal Dispersal of Certificate Chains. DISC 2004: 435-449 - 2002
- [j9]Ehab S. Elmallah, Chin-Hung Lam:
Fast permutation routing in a class of interconnection networks. Networks 40(2): 85-90 (2002) - [c5]Ehab S. Elmallah, Hossam S. Hassanein:
A Power-Aware Admission Control Scheme for Supporting the Assured Forwarding Model in CDMA Cellular Networks. LCN 2002: 211-219 - 2001
- [c4]Ehab S. Elmallah, Hossam S. Hassanein, Hosam M. F. AboElFotoh:
Supporting QoS routing in mobile ad hoc networks using probabilistic locality and load balancing. GLOBECOM 2001: 2901-2906 - [c3]Ehab S. Elmallah, Hossam S. Hassanein, Hosam M. F. AboElFotoh:
On the Use of a Simple Mobility Model in Ad Hoc Routing. ICPP Workshops 2001: 479-484 - [c2]Kui Wu, Janelle J. Harms, Ehab S. Elmallah:
Profile-Based Protocols in Wireless Mobile Ad Hoc Networks. LCN 2001: 568-575
1990 – 1999
- 1998
- [j8]Ehab S. Elmallah, Lorna K. Stewart:
Polygon Graph Recognition. J. Algorithms 26(1): 101-140 (1998) - 1997
- [c1]Ehab S. Elmallah, Chin-Hung Lam:
An O(N1.695) permutation routing algorithm on augmented data manipulators. Advances in Switching Networks 1997: 235-243 - 1995
- [j7]Ehab S. Elmallah, Joseph C. Culberson:
Multicommodity flows in simple multistage networks. Networks 25(1): 19-30 (1995) - 1993
- [j6]Ehab S. Elmallah, Lorna K. Stewart:
Independence and domination in Polygon Graphs. Discret. Appl. Math. 44(1-3): 65-77 (1993) - [j5]Charles J. Colbourn, Ehab S. Elmallah:
Reliable assignments of processors to tasks and factoring on matroids. Discret. Math. 114(1-3): 115-129 (1993) - 1992
- [j4]Ehab S. Elmallah:
Algorithms for K-terminal reliability problems with node failures. Networks 22(4): 369-384 (1992) - [j3]Ehab S. Elmallah, Charles J. Colbourn:
Series-parallel subgraphs of planar graphs. Networks 22(6): 607-614 (1992) - 1990
- [j2]Ehab S. Elmallah, Charles J. Colbourn:
On two dual classes of planar graphs. Discret. Math. 80(1): 21-40 (1990)
1980 – 1989
- 1985
- [j1]Ehab S. Elmallah, Charles J. Colbourn:
Optimum Communication Spanning Trees in Series-Parallel Networks. SIAM J. Comput. 14(4): 915-925 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint