default search action
Steven Martin 0001
Person information
- affiliation: University of Paris-Sud, LRI, Orsay, France
- affiliation (PhD 2004): INRIA, France
Other persons with the same name
- Steven Martin — disambiguation page
- Steven Martin 0002 — Cray Inc., Chippewa Falls, WI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Stephane Durand, Kinda Khawam, Dominique Quadri, Samer Lahoud, Steven Martin:
Federated Learning Game in IoT Edge Computing. IEEE Access 12: 93060-93074 (2024) - [j23]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based distributed trust management in IoT and IIoT: a survey. J. Supercomput. 80(15): 21867-21919 (2024) - [c61]Kinda Khawam, Hussein Taleb, Samer Lahoud, Hassan Fawaz, Dominique Quadri, Steven Martin:
Non-Cooperative Edge Server Selection Game for Federated Learning in IoT. NOMS 2024: 1-6 - 2023
- [c60]Juliana El Rayess, Kinda Khawam, Samer Lahoud, Melhem El Helou, Steven Martin:
Study of LoRaWAN Networks Reliability. CIoT 2023: 200-205 - [c59]Abdulhakeem Abdulazeez, Nicola Roberto Zema, Tara Ali-Yahiya, Steven Martin:
Learning-Based Formation Control of UAV-Fleet. CNSM 2023: 1-7 - [c58]Kinda Khawam, Samer Lahoud, Cédric Adjih, Serge Makhoul, Rosy Al Tawil, Steven Martin:
Edge Learning as a Hedonic Game in LoRaWAN. ICC 2023: 3163-3168 - [c57]Juliana El Rayess, Kinda Khawam, Samer Lahoud, Melhem El Helou, Steven Martin:
RALI: Increasing Reliability in LoRaWAN through Repetition and Iteration. WCNC 2023: 1-6 - 2022
- [j22]Hussein Taleb, Kinda Khawam, Samer Lahoud, Melhem El Helou, Steven Martin:
Pilot Contamination Mitigation in Massive MIMO Cloud Radio Access Networks. IEEE Access 10: 58212-58224 (2022) - [j21]Kinda Khawam, Hassan Fawaz, Samer Lahoud, Odalric-Ambrym Maillard, Steven Martin:
A channel selection game for multi-operator LoRaWAN deployments. Comput. Networks 216: 109185 (2022) - [j20]Kinda Khawam, Samer Lahoud, Melhem El Helou, Steven Martin, Gang Feng:
Coordinated Framework for Spectrum Allocation and User Association in 5G HetNets With mmWave. IEEE Trans. Mob. Comput. 21(4): 1226-1243 (2022) - 2021
- [j19]Hassan Fawaz, Kinda Khawam, Samer Lahoud, Steven Martin, Melhem El Helou:
Cooperation for Spreading Factor Assignment in a Multioperator LoRaWAN Deployment. IEEE Internet Things J. 8(7): 5544-5557 (2021) - [j18]Hassan Fawaz, Kinda Khawam, Samer Lahoud, Cédric Adjih, Steven Martin:
Joint Spreading Factor and Channel Assignment in Multi-Operator LoRaWAN Deployments. Sensors 21(1): 162 (2021) - [j17]Bachir Lahad, Marc Ibrahim, Samer Lahoud, Kinda Khawam, Steven Martin:
Joint Modeling of TDD and Decoupled Uplink/Downlink Access in 5G HetNets With Multiple Small Cells Deployment. IEEE Trans. Mob. Comput. 20(7): 2395-2411 (2021) - [c56]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based Privacy Aware Distributed Access Management Framework for Industry 4.0. WETICE 2021: 51-56 - 2020
- [j16]Hussein Taleb, Kinda Khawam, Samer Lahoud, Melhem El Helou, Steven Martin:
A fully distributed approach for joint user association and RRH clustering in cloud radio access networks. Comput. Networks 182: 107445 (2020) - [c55]Asma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin:
An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts. AINA 2020: 1303-1318 - [c54]Bachir Lahad, Marc Ibrahim, Samer Lahoud, Kinda Khawam, Steven Martin:
Uplink/Downlink Decoupled Access with Dynamic TDD in 5G HetNets. IWCMC 2020: 1330-1335
2010 – 2019
- 2019
- [j15]Duc Thang Ha, Lila Boukhatem, Megumi Kaneko, Nhan Nguyen-Thanh, Steven Martin:
Adaptive beamforming and user association in heterogeneous cloud radio access networks: A mobility-aware performance-cost trade-off. Comput. Networks 160: 130-143 (2019) - [j14]Alexandre Laubé, Dominique Quadri, Steven Martin, Khaldoun Al Agha:
A Simple and Efficient Way to Save Energy in Multihop Wireless Networks with Flow Aggregation. J. Comput. Networks Commun. 2019: 7059401:1-7059401:10 (2019) - [c53]El-hacen Diallo, Alexandre Laubé, Khaldoun Al Agha, Steven Martin:
Efficient Block replication to optimize the blockchain resources. CSNet 2019: 1-5 - [c52]Duc-Tuyen Ta, Kinda Khawam, Samer Lahoud, Cédric Adjih, Steven Martin:
LoRa-MAB: Toward an Intelligent Resource Allocation Approach for LoRaWAN. GLOBECOM 2019: 1-6 - [c51]Duc-Tuyen Ta, Kinda Khawam, Samer Lahoud, Cédric Adjih, Steven Martin:
LoRa-MAB: A Flexible Simulator for Decentralized Learning Resource Allocation in IoT Networks. WMNC 2019: 55-62 - [c50]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments. NCA 2019: 1-9 - [c49]Alexandre Laubé, Steven Martin, Khaldoun Al Agha:
A solution to the split & merge problem for blockchain-based applications in ad hoc networks. PEMWN 2019: 1-6 - [c48]Nicola Roberto Zema, Dominique Quadri, Steven Martin, Omar Shrit:
Formation control of a mono-operated UAV fleet through ad-hoc communications: a Q-learning approach. SECON 2019: 1-6 - [c47]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Alexandre Laubé, Steven Martin:
Blockchain based trust management mechanism for IoT. WCNC 2019: 1-8 - [i1]Nhan Nguyen-Thanh, Dana Marinca, Kinda Khawam, David Rohde, Flavian Vasile, Elena Simona Lohan, Steven Martin, Dominique Quadri:
Recommendation System-based Upper Confidence Bound for Online Advertising. CoRR abs/1909.04190 (2019) - 2018
- [c46]Karen Boulos, Kinda Khawam, Melhem El Helou, Marc Ibrahim, Hadi E. Sawaya, Steven Martin:
An Efficient Scheme for BBU-RRH Association in C-RAN Architecture for Joint Power Saving and Re-Association Optimization. CloudNet 2018: 1-6 - [c45]Nhan Nguyen-Thanh, Dana Marinca, Kinda Khawam, Steven Martin, Lila Boukhatem:
Multimedia Content Popularity: Learning and Recommending a Prediction Method. GLOBECOM 2018: 1-7 - [c44]Bachir Lahad, Marc Ibrahim, Samer Lahoud, Kinda Khawam, Steven Martin:
A Statistical Model for Uplink/Downlink Intercell Interference and Cell Capacity in TDD HetNets. ICC 2018: 1-6 - [c43]Hussein Taleb, Melhem El Helou, Samer Lahoud, Kinda Khawam, Steven Martin:
Multi-Objective Optimization for RRH Clustering in Cloud Radio Access Networks. ICCA 2018: 85-89 - [c42]Hussein Taleb, Melhem El Helou, Samer Lahoud, Kinda Khawam, Steven Martin:
An Efficient Heuristic for Joint User Association and RRH Clustering in Cloud Radio Access Networks. ICT 2018: 8-14 - [c41]Hussein Taleb, Melhem El Helou, Kinda Khawam, Samer Lahoud, Steven Martin:
Joint User Association and RRH Clustering in Cloud Radio Access Networks. ICUFN 2018: 376-381 - [c40]Hassan Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour, Steven Martin:
Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices. IWCMC 2018: 1267-1272 - [c39]Karen Boulos, Kinda Khawam, Melhem El Helou, Marc Ibrahim, Steven Martin, Hadi E. Sawaya:
A Hybrid Approach for RRH Clustering in Cloud Radio Access Networks based on Game Theory. MobiWac 2018: 128-132 - [c38]Duc Thang Ha, Lila Boukhatem, Megumi Kaneko, Steven Martin:
An Advanced Mobility-Aware Algorithm for Joint Beamforming and Clustering in Heterogeneous Cloud Radio Access Network. MSWiM 2018: 199-206 - [c37]Bachir Lahad, Marc Ibrahim, Samer Lahoud, Kinda Khawam, Steven Martin:
Analytical Evaluation of Decoupled Uplink and Downlink Access in TDD 5G HetNets. PIMRC 2018: 1-7 - [c36]Karen Boulos, Melhem El Helou, Kinda Khawam, Marc Ibrahim, Steven Martin, Hadi E. Sawaya:
RRH clustering in cloud radio access networks with re-association consideration. WCNC 2018: 1-6 - 2017
- [j13]Kai Yang, Steven Martin, Dominique Quadri, Jinsong Wu, Gang Feng:
Energy-Efficient Downlink Resource Allocation in Heterogeneous OFDMA Networks. IEEE Trans. Veh. Technol. 66(6): 5086-5098 (2017) - [c35]Karen Boulos, Melhem El Helou, Marc Ibrahim, Kinda Khawam, Hadi E. Sawaya, Steven Martin:
Interference-aware clustering in cloud radio access networks. CloudNet 2017: 83-88 - [c34]Hussein Taleb, Melhem El Helou, Kinda Khawam, Samer Lahoud, Steven Martin:
Centralized and distributed RRH clustering in Cloud Radio Access Networks. ISCC 2017: 1091-1097 - [c33]Omar Shrit, Steven Martin, Khaldoun Al Agha, Guy Pujolle:
A new approach to realize drone swarm using ad-hoc network. Med-Hoc-Net 2017: 1-5 - [c32]Asma Lahbib, Khalifa Toumi, Sameh Elleuch, Anis Laouiti, Steven Martin:
Link reliable and trust aware RPL routing protocol for Internet of Things. NCA 2017: 235-240 - [c31]Duc Thang Ha, Lila Boukhatem, Megumi Kaneko, Steven Martin:
Performance-cost trade-off of joint beamforming and user clustering in cloud radio access networks. PIMRC 2017: 1-5 - [c30]Alexandre Laubé, Steven Martin, Dominique Quadri, Khaldoun Al Agha, Guy Pujolle:
FAME: A Flow Aggregation MEtric for Shortest Path Routing Algorithms in Multi-Hop Wireless Networks. WCNC 2017: 1-6 - 2016
- [j12]Kai Yang, Steven Martin, Chengwen Xing, Jinsong Wu, Rongfei Fan:
Energy-Efficient Power Control for Device-to-Device Communications. IEEE J. Sel. Areas Commun. 34(12): 3208-3220 (2016) - [j11]Samer Lahoud, Kinda Khawam, Steven Martin, Gang Feng, Zhewen Liang, Jad Nasreddine:
Energy-Efficient Joint Scheduling and Power Control in Multi-Cell Wireless Networks. IEEE J. Sel. Areas Commun. 34(12): 3409-3426 (2016) - [j10]Kinda Khawam, Samer Lahoud, Marc Ibrahim, Mohamad Yassin, Steven Martin, Melhem El Helou, Farah Moety:
Radio access technology selection in heterogeneous networks. Phys. Commun. 18: 125-139 (2016) - [c29]Alexandre Laubé, Steven Martin, Dominique Quadri, Khaldoun Al Agha:
Optimal Flow Aggregation for Global Energy Savings in Multi-hop Wireless Networks. ADHOC-NOW 2016: 124-137 - [c28]Bilal Maaz, Kinda Khawam, Yezekael Hayel, Samer Lahoud, Steven Martin, Dominique Quadri:
Joint user association, scheduling and power control in multi-cell networks. WiMob 2016: 1-7 - 2015
- [j9]Kai Yang, Steven Martin, Tara Ali-Yahiya:
LTE uplink interference aware resource allocation. Comput. Commun. 66: 45-53 (2015) - [j8]Guangyu Li, Lila Boukhatem, Steven Martin:
An Intersection-based QoS Routing in Vehicular Ad Hoc Networks. Mob. Networks Appl. 20(2): 268-284 (2015) - [c27]Kai Yang, Steven Martin, Lila Boukhatem, Jinsong Wu, Xiangyuan Bu:
Energy-Efficient Resource Allocation for Device-to-Device Communications Overlaying LTE Networks. VTC Fall 2015: 1-6 - [c26]Hassan Noura, Soran Hussein, Steven Martin, Lila Boukhatem, Khaldoun Al Agha:
ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks. WCNC 2015: 2103-2108 - [c25]Bilal Maaz, Kinda Khawam, Samir Tohmé, Steven Martin, Samer Lahoud, Jad Nasreddine:
Joint scheduling and power control in multi-cell networks for inter-cell interference coordination. WiMob 2015: 778-785 - 2014
- [j7]Hassan Noura, Steven Martin, Khaldoun Al Agha, Khaled Chahine:
ERSS-RLNC: Efficient and robust secure scheme for random linear network coding. Comput. Networks 75: 99-112 (2014) - [c24]Kai Yang, Steven Martin, Tara Ali-Yahiya:
Interference aware resource allocation for LTE uplink transmission. ISCC 2014: 1-6 - [c23]Hassan Noura, Steven Martin, Khaldoun Al Agha:
An Efficient Lightweight Security Algorithm for Random Linear Network Coding. SECRYPT 2014: 171-177 - [c22]Kai Yang, Steven Martin, Tara Ali-Yahiya, Jinsong Wu:
Energy-Efficient Resource Allocation for Downlink in LTE Heterogeneous Networks. VTC Fall 2014: 1-5 - [c21]Hassan Noura, Steven Martin, Khaldoun Al Agha:
EDCA: Efficient diffusion cipher and authentication scheme for Wireless Sensor Networks. WCNC 2014: 2635-2640 - 2013
- [j6]Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding. Comput. Networks 57(6): 1488-1502 (2013) - [c20]Hassan Noura, Steven Martin, Khaldoun Al Agha:
A New Efficient Secure Coding Scheme for Random Linear Network Coding. ICCCN 2013: 1-7 - [c19]Mauricio Iturralde, Steven Martin, Tara Ali-Yahiya:
Resource allocation by pondering parameters for uplink system in LTE Networks. LCN 2013: 747-750 - [c18]Hassan Noura, Steven Martin, Khaldoun Al Agha, Walter Grote:
Key dependent cipher scheme for sensor networks. Med-Hoc-Net 2013: 148-154 - [c17]Soran Hussein, Hassan Noura, Steven Martin, Lila Boukhatem, Khaldoun Al Agha:
ERCA: efficient and robust cipher algorithm for LTE data confidentiality. MSWiM 2013: 299-308 - [c16]Hassan Noura, Steven Martin, Khaldoun Al Agha:
E3SN - Efficient Security Scheme for Sensor Networks. SECRYPT 2013: 615-621 - 2012
- [j5]Steven Martin, Khaldoun Al Agha, Guy Pujolle:
Traffic-based topology control algorithm for energy savings in multi-hop wireless networks. Ann. des Télécommunications 67(3-4): 181-189 (2012) - [c15]Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
DYGES: A Network-Aware Generation-Based Network Coding for Multicast Flows. VTC Fall 2012: 1-5 - [c14]Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
TC-IROCX: Network Coding with topology control and interference awareness. WCNC 2012: 1970-1975 - 2011
- [c13]Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
IROCX: Interference-aware routing with opportunistically coded exchanges in wireless mesh networks. WCNC 2011: 1113-1118
2000 – 2009
- 2009
- [c12]Simon Odou, Steven Martin, Khaldoun Al Agha:
Idle Channel Time Estimation in Multi-Hop Wireless Networks. ICC 2009: 1-5 - [c11]Golnaz Karbaschi, Aline Carneiro Viana, Steven Martin, Khaldoun Al Agha:
On using network coding in multi hop wireless networks. PIMRC 2009: 420-424 - [c10]Simon Odou, Steven Martin, Khaldoun Al Agha:
Admission control based on dynamic rate constraints in multi-hop networks. WCNC 2009: 1956-1961 - 2007
- [j4]Pascale Minet, Steven Martin, Leïla Azouz Saïdane, Skander Azzaz:
FP/FIFO Scheduling: Coexistence of Deterministic and Probabilistic QoS Guarantees. Discret. Math. Theor. Comput. Sci. 9(1) (2007) - [c9]Leïla Azouz Saïdane, Skander Azzaz, Steven Martin, Pascale Minet:
FP/FIFO Scheduling: Deterministic Versus Probabilistic QoS Guarantees and P-Schedulability. ICC 2007: 518-523 - [c8]Pascale Minet, Steven Martin, Leïla Azouz Saïdane, Slim Masmoudi:
Probabilistic or deterministic QoS guarantees for flows scheduled with FP/DM. Parallel and Distributed Computing and Networks 2007: 150-155 - 2006
- [j3]Steven Martin, Pascale Minet, Laurent George:
Improving fixed priority schedulability with dynamic priority as secondary criterion. J. Embed. Comput. 2(3-4): 327-345 (2006) - [c7]Steven Martin, Pascale Minet:
Worst case end-to-end response times of flows scheduled with FP/FIFO. ICN/ICONS/MCL 2006: 54 - [c6]Steven Martin, Pascale Minet:
Schedulability analysis of flows scheduled with FIFO: application to the expedited forwarding class. IPDPS 2006 - 2005
- [j2]Steven Martin, Pascale Minet, Laurent George:
End-to-end response time with fixed priority scheduling: trajectory approach versus holistic approach. Int. J. Commun. Syst. 18(1): 37-56 (2005) - [j1]Steven Martin, Pascale Minet:
Improving the Analysis of Distributed Non-Preemptive FP/DP* Scheduling with the Trajectory Approach. Telecommun. Syst. 30(1-3): 49-79 (2005) - [c5]Steven Martin, Pascale Minet, Laurent George:
Deterministic QoS guarantees for multicast multimedia applications. ICAS/ICNS 2005: 31 - [c4]Steven Martin, Pascale Minet:
Holistic and Trajectory Approaches for Distributed Non-preemptive FP/DP* Scheduling. ICN (1) 2005: 296-305 - [c3]Leïla Azouz Saïdane, Pascale Minet, Steven Martin, Inès El Korbi:
Deterministic and probabilistic QoS guarantees for real-time traffics. MASCOTS 2005: 337-340 - 2004
- [b1]Steven Martin:
Maîtrise de la dimension temporelle de la qualité de service dans les réseaux. (Mastering the time dimension of the quality of service in networks). Paris 12 Val de Marne University, Créteil, France, 2004 - [c2]Steven Martin, Pascale Minet, Laurent George:
The Trajectory Approach for the End-to-End Response Times with Non-preemptive FP/EDF. SERA 2004: 229-247 - 2003
- [c1]Steven Martin, Pascale Minet, Laurent George:
Deterministic End-to-End Guarantees for Real-Time Applications in a DiffServ-MPLS Domain. SERA 2003: 51-73
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint