


default search action
S. A. M. Makki
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2006
- [j8]Wuxu Peng, Shamila Makki:
The CSMA/DM LAN protocol. Int. J. Commun. Syst. 19(8): 897-914 (2006) - [c21]Shamila Makki, Wunnava V. Subbarao:
On Security in TCP/IP over Wireless Network. Security and Management 2006: 456-461 - [c20]Shamila Makki, Wunnava V. Subbarao:
Application of Mobile Agents in Managing the Traffic in the Network and Improving the Reliability and Quality of Service. IMECS 2006: 32-35 - [c19]Shamila Makki, Wunnava V. Subbarao:
Wireless Local Area Network Implementation. IMECS 2006: 987-987 - [c18]Scott C.-H. Huang, Shamila Makki, Niki Pissinou:
Accusation Resolution Using Security Metrology. WASA 2006: 435-444 - 2005
- [c17]Seema Jani, S. A. M. Makki, Xiaohua Jia:
An Efficient Approach for Web-Site Adaptation. ICEIS (1) 2005: 108-114 - [c16]Hai Liu, Peng-Jun Wan, Chih-Wei Yi
, Xiaohua Jia
, S. A. M. Makki, Niki Pissinou:
Maximal lifetime scheduling in sensor surveillance networks. INFOCOM 2005: 2482-2491 - 2004
- [c15]Shamila Makki, Niki Pissinou, Hui Huang:
The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV). Security and Management 2004: 427- - [c14]Shamila Makki, Niki Pissinou, Tirthankar Bhowmick:
LEACH Protocol for Assigning Cluster-Heads Using a Deterministic and Stochastic Approach for Wireless Sensor Networks. International Conference on Wireless Networks 2004: 963-968 - [c13]S. A. M. Makki, Niki Pissinou, Saurabh D. Agrawal:
A Framework For Policy Based Coordinated Adaptation in Mobile Systems. International Conference on Wireless Networks 2004: 969-974 - [c12]Shamila Makki, Niki Pissinou, Sachin Vitthal Khare:
Simulation of Wireless Sensor Networks Based on Energy Aware Routing Approach. International Conference on Wireless Networks 2004: 982- - 2003
- [j7]Chiewon Lee, Jong-Wook Jang
, E. K. Park, S. A. M. Makki:
A simulation study of TCP performance over IEEE 1394 home networks. Comput. Commun. 26(7): 670-678 (2003) - [j6]S. A. M. Makki, Niki Pissinou, Philippe Daroux:
Mobile and wireless Internet access. Comput. Commun. 26(7): 734-746 (2003) - [j5]S. A. M. Makki, Niki Pissinou, Philippe Daroux:
LEO satellite communication networks - a routing approach. Wirel. Commun. Mob. Comput. 3(3): 385-395 (2003) - [c11]S. A. M. Makki, Niki Pissinou, Ravi Kailat:
Optimal Wavelength Conversion Degree in an All-Optical Network. Communications in Computing 2003: 176-180 - [c10]S. A. M. Makki, Niki Pissinou, Tirthankar Ghosh, Amit Deshpande:
Study of Network Performance in a Simulated Network for Optimized Node Degree and Network Cost. International Conference on Internet Computing 2003: 747-752 - [c9]Niki Pissinou, Ramon B. Mejia, S. A. M. Makki:
Provisioning an Interactive DVB Satellite Return Channel. International Conference on Wireless Networks 2003: 262-268 - 2002
- [j4]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson
:
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Rec. 31(2): 73-79 (2002) - [c8]S. A. M. Makki, Niki Pissinou, S. Kouzalis:
On Routing algorithms in Ad-hoc Networks. International Conference on Internet Computing 2002: 983-990 - [c7]Shamila Makki:
A Survey of Intelligent Agent Technology. IC-AI 2002: 398-404 - [e1]Birgitta König-Ries
, Kia Makki, S. A. M. Makki, Niki Pissinou, Peter Scheuermann:
Developing an Infrastructure for Mobile and Wireless Systems, NSF Workshop IMWS 2001, Scottsdale, AZ, USA, October 15, 2001, Revised Papers. Lecture Notes in Computer Science 2538, Springer 2002, ISBN 3-540-00289-8 [contents] - 2001
- [c6]S. A. M. Makki, Niki Pissinou, Philippe Daroux:
A new routing algorithm for low Earth orbit satellite networks. ICCCN 2001: 555-561 - [c5]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson
:
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37
1990 – 1999
- 1999
- [j3]S. A. M. Makki:
Eulerian tour construction in a distributed environment. Comput. Commun. 22(7): 621-628 (1999) - [c4]Suk-Chung Yoon, Lawrence J. Henschen, E. K. Park, S. A. M. Makki:
Using Domain Knowledge in Knowledge Discovery. CIKM 1999: 243-250 - 1997
- [b1]S. A. M. Makki:
Efficient distributed solutions for classical network problems. University of Queensland, Australia, 1997 - [c3]S. A. M. Makki, George Havas:
An Efficient Method for Constructing a Distributed Depth-First Search Tree. PDPTA 1997: 660-666 - 1996
- [j2]S. A. M. Makki:
Efficient distributed breadth-first search algorithm. Comput. Commun. 19(8): 628-636 (1996) - [j1]S. A. M. Makki, George Havas:
Distributed Algorithms for Depth-First Search. Inf. Process. Lett. 60(1): 7-12 (1996) - [c2]S. A. M. Makki:
Construction of Breadth-First Search Trees in Distributed Environments. PDPTA 1996: 91-99 - 1994
- [c1]S. A. M. Makki, George Havas:
Distributed Algorithms for Constructing a Depth-First-Search Tree. ICPP (3) 1994: 270-273
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint