default search action
Adil Al-Yasiri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1997
- [b1]Adil Al-Yasiri:
Domain oriented object reuse based on genetic software architectures. Liverpool John Moores University, UK, 1997
Journal Articles
- 2018
- [j6]Ali M. Mahmood, Adil Al-Yasiri, Omar Y. K. Alani:
A New Processing Approach for Reducing Computational Complexity in Cloud-RAN Mobile Networks. IEEE Access 6: 6927-6946 (2018) - [j5]Ali M. Mahmood, Adil Al-Yasiri, Omar Y. K. Alani:
Latency reduction by dynamic channel estimator selection in C-RAN networks using fuzzy logic. Comput. Networks 138: 44-56 (2018) - 2016
- [j4]Nabeel Khan, Adil Al-Yasiri:
Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework. Int. J. Inf. Technol. Web Eng. 11(3): 50-64 (2016) - 2015
- [j3]Ameera Al-Karkhi, Adil Al-Yasiri, Nigel Linge:
Discreet verification of user identity in pervasive computing environments using a non-intrusive technique. Comput. Electr. Eng. 41: 102-114 (2015) - [j2]Angham A. Abdulahad Sabagh, Adil Al-Yasiri:
GECAF: a framework for developing context-aware pervasive systems. Comput. Sci. Res. Dev. 30(1): 87-103 (2015) - 2012
- [j1]Michael Mackay, Thar Baker, Adil Al-Yasiri:
Security-oriented cloud computing platform for critical infrastructures. Comput. Law Secur. Rev. 28(6): 679-686 (2012)
Conference and Workshop Papers
- 2018
- [c13]Ali M. Mahmood, Adil Al-Yasiri, Omar Y. K. Alani:
Cognitive Neural Network Delay Predictor for High Speed Mobility in 5G C-RAN Cellular Networks. 5G World Forum 2018: 93-98 - 2016
- [c12]Nabeel Khan, Adil Al-Yasiri:
Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework. FNC/MobiSPC 2016: 485-490 - [c11]Aymen J. Salman, Adil Al-Yasiri:
Developing Domain-Specific Language for Wireless Sensor Network application development. ICITST 2016: 301-308 - [c10]Ausama Majeed, Adil Al-Yasiri:
Formulating A Global Identifier Based on Actor Relationship for the Internet of Things. InterIoT/SaSeIoT 2016: 79-91 - [c9]Ali M. Mahmood, Adil Al-Yasiri:
Scalable Processing in 5G Cloud-RAN Networks Using MapReduce Framework. NTMS 2016: 1-6 - [c8]Aymen J. Salman, Adil Al-Yasiri:
SenNet: A Programming Toolkit to Develop Wireless Sensor Network Applications. NTMS 2016: 1-7 - 2015
- [c7]Shaymaa Al-Shammari, Adil Al-Yasiri:
MonSLAR: a middleware for monitoring SLA for RESTFUL services in cloud computing. MESOCA 2015: 46-50 - 2014
- [c6]Ameera Al-Karkhi, Adil Al-Yasiri, Muhammad Jaseemuddin:
Non-intrusive user identity provisioning in the internet of things. MOBIWAC 2014: 83-90 - 2013
- [c5]Adil Al-Yasiri:
An approach for energy efficient service oriented architecture for sensor networks. ICEAC 2013: 135-140 - 2011
- [c4]Angham A. Abdulahad Sabagh, Adil Al-Yasiri:
An Extensible Framework for Context-Aware Smart Environments. ARCS 2011: 98-109 - 1998
- [c3]Adil Al-Yasiri, C. Bambord:
DOOR-an approach for reusing and retrieving domain-oriented components. ECRTS 1998: 230-237 - [c2]Ewan Smith, Adil Al-Yasiri, Madjid Merabti:
A Multi-Tiered Classification Scheme for Component Retrieval. EUROMICRO 1998: 20882-20889 - 1994
- [c1]Muthu Ramachandran, Adil Al-Yasiri:
Reusing and Retrieving Software Components: An Object-Oriented Domain Analysis Approach. OOIS 1994: 134-137
Informal and Other Publications
- 2016
- [i2]Nabeel Khan, Adil Al-Yasiri:
Framework for cloud computing adoption: A road map for Smes to cloud migration. CoRR abs/1601.01608 (2016) - 2012
- [i1]Ameera Al-Karkhi, Adil Al-Yasiri, Nigel Linge:
Privacy, Trust and Identity in Pervasive Computing: A Review of Technical Challenges and Future Research Directions. CoRR abs/1207.7242 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 17:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint