default search action
Sameh Najeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Nourhane Sboui, Hakim Ghazzai, Sameh Najeh, Lokman Sboui:
Efficient LEO Satellite Data Management Using No-Reference Image Quality Assessment. ICT 2024: 1-5 - 2023
- [j7]Abdelmonom Hajjej, Marwane Ayaida, Sameh Najeh, Nadhir Messai, Leïla Najjar:
Robust backbone network based on hybrid selection of relays for multi-hop data dissemination in VANETs. Veh. Commun. 44: 100659 (2023) - [c24]Mohamed Yassine Hentati, Tijani Chahed, Philippe Ciblat, Marceau Coupechoux, Sameh Najeh:
5G vs Wifi6 Downlink Power Consumption Comparison for Teleworking Use Case. ComNet 2023: 1-9 - [c23]Khouloud Gharsalli, Pierre-Jean Bouvet, Sameh Najeh, Hichem Besbes, Thierry Le Pors, Houssem Gazzah:
Non-cooperative Resource Allocation Game-Theoretic Approach in Underwater Acoustics. IWCMC 2023: 632-637 - [c22]Sameh Najeh, Ammar Bouallegue:
Power Allocation in Device-to-Device Communications based-Stackelberg Game Theory. IWCMC 2023: 1178-1183 - [c21]Khaled Hmidi, Sameh Najeh, Ammar Bouallegue:
Power Control Approach in HetNets based-Qlearning Technique. IWCMC 2023: 1184-1189 - 2022
- [c20]Sameh Najeh, Ammar Bouallegue:
Near-Far Problem based-Game Theory in Device-to-Device Communications. ICC 2022: 3364-3369 - [c19]Dhia Eddine Laouiti, Marwane Ayaida, Nadhir Messai, Sameh Najeh, Leïla Najjar, Ferdaous Chaabane:
Sybil Attack Detection in VANETs using an AdaBoost Classifier. IWCMC 2022: 217-222 - [c18]Abdelmonom Hajjej, Leïla Najjar, Marwane Ayaida, Nadhir Messai, Sameh Najeh:
Improved Contention Based Forwarding for data broadcasting in VANETs. IWCMC 2022: 829-834 - 2020
- [j6]Sameh Najeh:
Joint mode selection and power control for D2D underlaid cellular networks. Phys. Commun. 38: 100917 (2020) - [j5]Sameh Najeh, Ammar Bouallegue:
Distributed vs centralized game theory-based mode selection and power control for D2D communications. Phys. Commun. 38: 100962 (2020)
2010 – 2019
- 2019
- [j4]Marwane Ayaida, Nadhir Messai, Sameh Najeh, Kouamé Boris Ndjore:
A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs. Ad Hoc Networks 90 (2019) - [j3]Sameh Najeh, Ammar Bouallegue:
Game theory for SINR-based power control in device-to-device communications. Phys. Commun. 34: 135-143 (2019) - [c17]Marwane Ayaida, Nadhir Messai, Geoffrey Wilhelm, Sameh Najeh:
A Novel Sybil Attack Detection Mechanism for C-ITS. IWCMC 2019: 913-918 - [c16]Sameh Najeh, Ammar Bouallegue:
Distributed Interference and Power Control based-Game Theory for D2D Communication. IWCMC 2019: 991-996 - [c15]Marwane Ayaida, Nadhir Messai, Sameh Najeh, Geoffrey Wilhelm:
Cyber Attack Detection Algorithm Using Traffic Flow Theory. Nets4Cars/Nets4Trains/Nets4Aircraft 2019: 38-49 - 2016
- [j2]Leila Melki, Sameh Najeh, Hichem Besbes:
Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications. Digit. Commun. Networks 2(4): 225-232 (2016) - [c14]Yosra Abbes, Sameh Najeh, Hichem Besbes:
Tractable framework for modeling and analyzing Joint CoMP Transmission and eICIC technology in two-tier heterogeneous cellular networks. ISIVC 2016: 1-6 - [c13]Leila Melki, Sameh Najeh, Hichem Besbes:
System performance of two-way decode-and-forward relaying assisted D2D communication underlaying cellular networks. ISIVC 2016: 270-275 - [c12]Yosra Abbes, Sameh Najeh, Hichem Besbes:
Joint superposition coding and great fairness admission control for QoS provisioning in LTE systems. IWCMC 2016: 852-857 - [c11]Leila Melki, Sameh Najeh, Hichem Besbes:
Interference management scheme for network-assisted multi-hop D2D communications. PIMRC 2016: 1-5 - [c10]Yosra Abbes, Sameh Najeh, Hichem Besbes:
QoS-aware admission control formalism for OFDMA-based network. Wireless Days 2016: 1-3 - 2015
- [c9]Leila Melki, Sameh Najeh, Hichem Besbes:
System performance of cellular network underlaying D2D multi-hop communication. COMNET 2015: 1-5 - [c8]Yosra Abbes, Jihene Ben Abderrazak, Sameh Najeh, Hichem Besbes:
QoS provision inter-cell Interference Coordination approach based on joint transmission and Superposition Coding. IWCMC 2015: 834-839 - [c7]Leila Melki, Sameh Najeh, Hichem Besbes:
Dynamic frequency allocation for D2D communication based on IAR messages in OFDMA networks. IWCMC 2015: 1424-1428 - [c6]Leila Melki, Sameh Najeh, Hichem Besbes:
Radio resource allocation scheme for intra-inter-cell D2D communications in LTE-A. PIMRC 2015: 1515-1519 - 2014
- [c5]Nesrine Fradi, Sameh Najeh, Hatem Boujemaa:
Resource allocation in OFDMA networks with femto and macro-cells coexistence using Fractional Frequency Reuse (FFR). COMNET 2014: 1-5 - [c4]Leila Melki, Sameh Najeh, Hichem Besbes:
Subcarrier and bit allocation scheme for D2D communication based on OFDMA cellular networks. IWCMC 2014: 606-610 - 2013
- [c3]Yosra Abbes, Sameh Najeh, Hichem Besbes:
Joint proportional fairness admission control and superposition coding for OFDMA networks. ICT 2013: 1-5 - 2011
- [j1]Sameh Najeh, Hichem Besbes:
A Simple Superposition Coding Scheme for Optimizing Resource Allocation in Downlink OFDMA Systems. Wirel. Pers. Commun. 59(2): 237-260 (2011) - 2010
- [c2]Sameh Najeh, Hichem Besbes:
Queue-balancing resource allocation for rate-stable OFDMA systems. IWCMC 2010: 966-970
2000 – 2009
- 2005
- [c1]Sameh Najeh, Hichem Besbes, Ammar Bouallegue:
Greedy Algorithm for Dynamic Resource Allocation in Downlink of OFDMA System. ISWCS 2005: 475-479
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint