default search action
Hala ElAarag
Person information
- affiliation: Stetson University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c21]Nicanor Vergara, Hala ElAarag:
Bluu: a prototype for nicotine consumption tracking. ACM Southeast Regional Conference 2022: 2-8 - 2021
- [j10]Christian Micklisch, Nathan Hilliard, Hala ElAarag:
Modeling and simulation of autonomous quadrotor systems and their onboard sensors. Simul. 97(3) (2021) - [c20]Hudson DeVoe, Nicholas Gilmet, Hala ElAarag:
A Novel Routing Protocol for Wireless Ad Hoc Networks Based on the Behavior of Slime Mold Physarum Polycephalum. ANNSIM 2021: 1-12
2010 – 2019
- 2019
- [c19]Bailey Granam, Hala ElAarag:
Utilization of Fuzzy Logic in CPU Scheduling in Various Computing Environments. ACM Southeast Regional Conference 2019: 222-225 - 2018
- [c18]Roberto Pagan, Hala ElAarag:
Diabetic assistant tool. ACM Southeast Regional Conference 2018: 31:1-31:8 - [c17]Christian Micklisch, Nathan Hilliard, Hala ElAarag:
Modeling and Simulation of Scalable Flocking with Fully Autonomous Quadrotors. SPECTS 2018: 1-9 - [c16]Ou Zheng, Hala ElAarag:
Simultaneous locallzation and mapping using UAVs equipped with inexpensive sensors. SpringSim (CNS) 2018: 1:1-1:10 - [c15]Christian Micklisch, Nathan Hilliard, Hala ElAarag:
Modeling and simulation of fully autonomous quadrotors. SpringSim (CNS) 2018: 5:1-5:12 - [e3]Abdolreza Abhari, Hala ElAarag:
Proceedings of the Communications and Networking Symposium, SpringSim (CNS) 2018, Baltimore, MD, USA, April 15-18, 2018. ACM 2018 [contents] - 2016
- [c14]Justin Ridgewell, Hala ElAarag:
NCTCP: a network coded TCP protocol. SpringSim (CNS) 2016: 6 - [e2]Hala ElAarag, Abdolreza Abhari:
Proceedings of the 19th Communications & Networking Symposium, CNS 2016, part of the 2016 Spring Simulation Multiconference, SpringSim '16, Pasadena, CA, USA, April 3-6, 2016. ACM 2016, ISBN 978-1-5108-2317-4 [contents] - 2015
- [j9]Harrison Neal, Hala ElAarag:
A Reliable Covert Communication Scheme Based on VoIP Steganography. Trans. Data Hiding Multim. Secur. 10: 55-68 (2015) - [c13]John Cossu, Hala ElAarag:
Malware detection inspired by the human immune system and making use of honeytokens. SpringSim (CNS) 2015: 37-43 - [e1]Abdolreza Abhari, Hala ElAarag:
Proceedings of the 18th Symposium on Communications & Networking, CNS 2015, part of the 2015 Spring Simulation Multiconference, SpringSim '15, Alexandria, VA, USA, April 12-15, 2015. SCS/ACM 2015, ISBN 978-1-5108-0100-4 [contents] - 2014
- [c12]J. Andrew Roles, Hala ElAarag, Erich Friedman:
A Bayesian game approach to coexistence with malicious and selfish nodes in wireless ad-hoc networks. SpringSim (CNS) 2014: 8 - 2013
- [b1]Hala ElAarag:
Web Proxy Cache Replacement Strategies - Simulation, Implementation, and Performance Evaluation. Springer Briefs in Computer Science, Springer 2013, ISBN 978-1-4471-4892-0, pp. I-X, 1-103 - [c11]Harrison Neal, Hala ElAarag:
Performance analysis of current data hiding algorithms for VoIP. SpringSim (CNS) 2013: 7 - [i1]Hala ElAarag, David Bauschlicher, Steven Bauschlicher:
System Architecture of HatterHealthConnect: An Integration of Body Sensor Networks and Social Networks to Improve Health Awareness. CoRR abs/1304.4548 (2013) - 2012
- [j8]Sam Romano, Hala ElAarag:
A quantitative study of Web cache replacement strategies using simulation. Simul. 88(5): 507-541 (2012) - [c10]Hala ElAarag, Matt Wozniak:
Using fuzzy inference to improve TCP congestion control over wireless networks. SpringSim (CNS) 2012: 16 - 2011
- [j7]Sam Romano, Hala ElAarag:
A neural network proxy cache replacement strategy and its implementation in the Squid proxy server. Neural Comput. Appl. 20(1): 59-78 (2011) - [c9]Derek Wells, Hala ElAarag:
A novel approach for automated music composition using memetic algorithms. ACM Southeast Regional Conference 2011: 155-159 - [c8]David Bauschlicher, Steven Bauschlicher, Hala ElAarag:
Framework for the integration of body sensor networks and social networks to improve health awareness. SpringSim (CNS) 2011: 19-26 - [c7]Sean Salmon, Hala ElAarag:
Simulation based experiments using EDNAS: the Event-Driven Network Architecture Simulator. WSC 2011: 3266-3277
2000 – 2009
- 2009
- [c6]Sean Salmon, Hala ElAarag:
SLAAP: Stream Location-Aware Alliance Partitioning in Bittorrent Networks for Video-on-Demand Systems. CCNC 2009: 1-2 - [c5]Hala ElAarag, Sam Romano:
Improvement of the neural network proxy cache replacement strategy. SpringSim 2009 - 2008
- [j6]Hala ElAarag, Andrew Moedinger, Chris Hogg:
TCP friendly protocols for media streams over heterogeneous wired-wireless networks. Comput. Commun. 31(10): 2242-2256 (2008) - [j5]Jake Cobb, Hala ElAarag:
Web proxy cache replacement scheme based on back-propagation neural network. J. Syst. Softw. 81(9): 1539-1558 (2008) - 2006
- [c4]Hala ElAarag, Laura Schindler:
A speech recognition and synthesis tool. ACM Southeast Regional Conference 2006: 45-49 - 2005
- [c3]Hala ElAarag, Andrew Moedinger:
IFTP-W: a TCP-friendly protocol for multimedia applications over wireless networks. ACM Southeast Regional Conference (2) 2005: 36-40 - 2004
- [c2]Colin Branch, Hala ElAarag:
Real Time Rendering of Expensive Small Environments. CISST 2004: 564-570 - 2003
- [j4]Hala ElAarag, Mostafa A. Bassiouni:
A reliable congestion control mechanism for geocasting in mobile wireless networks. Int. J. Netw. Manag. 13(5): 375-387 (2003) - 2002
- [j3]Hala ElAarag:
Improving TCP performance over mobile networks. ACM Comput. Surv. 34(3): 357-374 (2002) - [j2]Hala ElAarag, Mostafa A. Bassiouni:
An Internet friendly transport protocol for continuous media over best effort networks. Int. J. Commun. Syst. 15(10): 881-898 (2002) - 2001
- [j1]Hala ElAarag, Mostafa A. Bassiouni:
Performance evaluation of TCP connections in ideal and non-ideal network environments. Comput. Commun. 24(18): 1769-1779 (2001) - 2000
- [c1]Hala ElAarag, Mostafa A. Bassiouni:
Simulation of transport protocols over wireless communication networks. WSC 2000: 1235-1241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint