default search action
Mohamed Escheikh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j8]Wiem Taktak, Mohamed Escheikh, Kamel Barkaoui:
DRL approach for online user-centric QoS-Aware SFC embedding with dynamic VNF placement. Comput. Networks 251: 110637 (2024) - [j7]Mohamed Escheikh, Wiem Taktak:
Online QoS/QoE-Driven SFC Orchestration Leveraging a DRL Approach in SDN/NFV Enabled Networks. Wirel. Pers. Commun. 137(3): 1511-1538 (2024) - 2021
- [j6]Walid Ben Mesmia, Mohamed Escheikh, Kamel Barkaoui:
DevOps workflow verification and duration prediction using non-Markovian stochastic Petri nets. J. Softw. Evol. Process. 33(3) (2021) - 2019
- [j5]Mohamed Escheikh, Zayneb Tayachi, Kamel Barkaoui:
Performability modelling and analysis of server virtualised systems subject to workload-dependent software aging. Int. J. Crit. Comput. Based Syst. 9(3): 248-292 (2019) - 2018
- [j4]Assia Outamazirt, Mohamed Escheikh, Djamil Aïssani, Kamel Barkaoui, Ouiza Lekadir:
Performance analysis of the M/G/c/c + r queuing system for cloud computing data centres. Int. J. Crit. Comput. Based Syst. 8(3/4): 234-257 (2018) - 2017
- [j3]Mohamed Escheikh, Kamel Barkaoui:
On the dependability evaluation of a virtual multiple input multiple output link. Int. J. Crit. Comput. Based Syst. 7(1): 43-58 (2017) - [j2]Mohamed Escheikh, Kamel Barkaoui, Hana Jouini:
Versatile workload-aware power management performability analysis of server virtualized systems. J. Syst. Softw. 125: 365-379 (2017) - 2010
- [j1]Mohamed Escheikh, Kamel Barkaoui:
Opportunistic MAC layer design with stochastic Petri Nets for multimedia ad hoc networks. Concurr. Comput. Pract. Exp. 22(10): 1308-1324 (2010)
Conference and Workshop Papers
- 2023
- [c11]Mohamed Escheikh, Wiem Taktak, Kamel Barkaoui:
Testing Quality of Training in QoE-Aware SFC Orchestration Based on DRL Approach. ICTSS 2023: 274-288 - [c10]Wiem Taktak, Mohamed Escheikh, Kamel Barkaoui:
A QoE Driven DRL Approach for Network Slicing Based on SFC Orchestration in SDN/NFV Enabled Networks. VECoS 2023: 30-44 - 2019
- [c9]Mohamed Escheikh, Kamel Barkaoui:
Scalable Load Balancing Scheme for Distributed Controllers in Software Defined Data Centers. SDS 2019: 47-54 - 2017
- [c8]Hana Jouini, Mohamed Escheikh, Kamel Barkaoui, Tahar Ezzedine:
Mobility Load Balancing over Intra-frequency Heterogeneous Networks Using Handover Adaptation. VECoS 2017: 108-123 - 2016
- [c7]Mohamed Escheikh, Zayneb Tayachi, Kamel Barkaoui:
Workload-Dependent Software Aging Impact on Performance and Energy Consumption in Server Virtualized Systems. ISSRE Workshops 2016: 111-118 - [c6]Assia Outamazirt, Mohamed Escheikh, Djamil Aïssani, Kamel Barkaoui, Ouiza Lekadir:
On the Modeling and Performance Evaluation of Cloud Computing Centers Using M/G/c/c+r Queuing System. VECoS 2016: 77-84 - 2014
- [c5]Mohamed Escheikh, Hana Jouini, Kamel Barkaoui:
A Versatile Traffic and Power Aware Performability Analysis of Server Virtualized Systems. MASCOTS 2014: 207-212 - 2012
- [c4]Mohamed Escheikh, Kamel Barkaoui:
Network availability modeling of VMIMO link in multi-hop wireless network. ISCC 2012: 876-881 - 2011
- [c3]Mohamed Escheikh, Kamel Barkaoui:
Performance analysis of packet bursting scheme in IEEE 802.11e WLANs under slow rayleigh fading with non markovian stochastic petri nets. Q2SWinet 2011: 9-16 - 2009
- [c2]Mohamed Escheikh, Kamel Barkaoui:
Opportunistic MAC layer design with Stochastic Petri Nets for multimedia Ad Hoc Networks. ISCC 2009: 23-29 - 2000
- [c1]Mohamed Escheikh, Kamel Barkaoui, Ammar Bouallegue:
Performance Analysis of an N(N ATM Switch with Markov Modulated Poisson Process under Back-Pressure Mechanism. MASCOTS 2000: 416-423
Informal and Other Publications
- 2016
- [i2]Mohamed Escheikh, Hana Jouini, Kamel Barkaoui:
Modeling, implementation and performance analysis of mobility load balancing for LTE downlink data transmission. CoRR abs/1610.02589 (2016) - 2013
- [i1]Zohra Sbaï, Mohamed Escheikh:
Model Checking Techniques for Verification of an Encryption Scheme for Wireless Sensor Networks. CoRR abs/1305.4247 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint