|
|
|
|
|
The DroidKnight: a silent guardian for the Android ker nel, hunting for rogue smar tphone malware applications |
Authors : |
M. A. Akbar, Farr ukh Shahzad and Muddassar Farooq |
Conference/Journal : |
Virus Bulletin |
Publishing Information : |
|
Place : |
United States |
Download : |
DroidKnight -Virus Bulletin 2013.pdf
|
|
|
|
A Formal Usability Constraints Model for Watermarking of Outsourced Datasets |
Authors : |
M. Kamran and Muddassar Farooq |
Conference/Journal : |
Submitted for Review |
Publishing Information : |
TR-nexGINRC-2012-59 |
Place : |
|
Download : |
TR-59-Kamran.pdf
|
|
|
An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data |
Authors : |
M. Kamran and Muddassar Farooq |
Conference/Journal : |
. |
Publishing Information : |
TR-nexGINRC-2011-57 |
Place : |
|
Download : |
TR-57-Kamran.pdf
|
|
|
Using Evolutionary Algorithms for ECG Arrhythmia Detection and Classification |
Authors : |
Komal Waseem, Awais Javed, Rashad Ramzan and Muddassar Farooq |
Conference/Journal : |
7th International Conference on Natural Computation (ICNC 2011) |
Publishing Information : |
IEEE, DOI: 10.1109/ICNC.2011.6022596 |
Place : |
Shanghai, China |
Download : |
ICNC11-Komal.pdf
|
|
A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols |
Authors : |
N. Mazhara and M. Farooq |
Conference/Journal : |
Applied Soft Computing |
Publishing Information : |
doi:10.1016/j.asoc.2011.03.021 |
Place : |
|
Download : |
asc11-Nauman.pdf
|
|
Using Evolutionary Learning Classifiers To Do Mobile Spam (SMS) Filtering |
Authors : |
M. Bilal Junaid and Muddassar Farooq |
Conference/Journal : |
GECCO 2011 |
Publishing Information : |
ACM 978-1-4503-0557-0/11/07 |
Place : |
Dublin, Ireland. |
Download : |
GECCO11-Bilal1.pdf
|
|
In-Execution Malware Detection using Task Structures of Linux Processes |
Authors : |
Farrukh Shahzad, Sohail Bhatti, Muhammad Shahzad and Muddassar Farooq |
Conference/Journal : |
IEEE International Conference on Communications ICC2011 |
Publishing Information : |
IEEE (InPress) |
Place : |
Kyoto Japan |
Download : |
ICC11-Farrukh.pdf
|
|
ELF-Miner: Using Structural Knowledge and Data Mining for Detecting Linux Malicious Executables |
Authors : |
Farrukh Shahzad and Muddassar Farooq |
Conference/Journal : |
Knowledge and Information Systems : An International Journal |
Publishing Information : |
Accepted (In Press), Impact Factor = 2.211 |
Place : |
|
Download : |
KAIS11-Farrukh.pdf
|
|
OG-Miner: an Intelligent Health Tool For Achieving Millennium Development Goals (MDGs) in m-Health Environments |
Authors : |
M. Jamal Afridi and Muddassar Farooq |
Conference/Journal : |
Hawaii International Conference on Systems Sciences |
Publishing Information : |
|
Place : |
Kauai, Hawaii |
Download : |
HICSS11-Jamal.pdf
|
|
|
Investigating the Agent-based Ad Hoc Routing Algorithms: A Probabilistic Performance Evaluation Framework Based on Reliability Theory |
Authors : |
Muhammad Saleem and Mudassar Farooq. |
Conference/Journal : |
. |
Publishing Information : |
Ph.D. Thesis |
Place : |
|
Download : |
PhD-Thesis-ACM-MSaleem.pdf
|
|
On the Reliability of Ad Hoc Routing Protocols for Loss-and-Delay Sensitive Applications |
Authors : |
Muhammad Saleem, Israr Ullah, Syed Ali Khayam, and Mudassar Farooq. |
Conference/Journal : |
Ad Hoc Networks (2010) |
Publishing Information : |
doi:10.1016/j.adhoc.2010.07.012, Impact Factor = 1.293 |
Place : |
|
Download : |
AHN10-Saleem.pdf
|
|
Classification Potential vs. Classification Accuracy: A Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets |
Authors : |
Ajay Kumar Tanwani and Muddassar Farooq |
Conference/Journal : |
Learning Classifier Systems LCS 2010 |
Publishing Information : |
Lecture Notes in Computer Science, 2010, Volume 6471/2010, 127-144, DOI: 10.1007/978-3-642-17508-4_9 |
Place : |
Montreal, Canada |
Download : |
IWLCS09-ajay1.pdf
|
|
Using Computational Intelligence to Identify Performance Bottlenecks In a Computer System |
Authors : |
Faraz Ahmed, Farrukh Shahzad and Muddassar Farooq |
Conference/Journal : |
11th International Conference on Parallel Problem Solving From Nature |
Publishing Information : |
Lecture Notes in Computer Science, 2011, Volume 6238/2011, 304-313, DOI: 10.1007/978-3-642-15844-5_31 |
Place : |
Krakow, Poland |
Download : |
PPSN10-Faraz.pdf
|
|
Swarm Intelligence Based Routing Protocols for Wireless Sensor Networks: Survey and Future Directions |
Authors : |
Muhammad Saleem, Gianni Di Caro and Muddassar Farooq |
Conference/Journal : |
Information Sciences (2010) |
Publishing Information : |
doi:10.1016/j.ins.2010.07.005, Impact Factor = 3.291 |
Place : |
|
Download : |
IS10-Saleem1.pdf
|
|
Exposing the CCN (Criminal Cellular Network): SMS Vulnerabilities to Embed High Capacity Covert Channel |
Authors : |
M Zubair Rafique and Muddassar Farooq |
Conference/Journal : |
Black Hat USA 2010// Black Hat Arsenal |
Publishing Information : |
Black Hat USA |
Place : |
LAS VEGAS, USA |
Download : |
BHUSA10-Zubair-Arsenal-WP.pdf
|
|
Mining Kernel Task Structure for Malware Analysis and Detection |
Authors : |
Farrukh Shahzad, Muhammad Shahzad, Muddassar Farooq |
Conference/Journal : |
|
Publishing Information : |
TR-nexGINRC-2010-56 |
Place : |
|
Download : |
TR-56-Farrukh.pdf
|
|
Towards a Theory of Generalizing System Call Representation For In-Execution Malware Detection |
Authors : |
Bilal Mehdi, Faraz Ahmed, Syed Ali Khayyam and Muddassar Farooq |
Conference/Journal : |
IEEE International Communications Conference (ICC2010) |
Publishing Information : |
IEEE |
Place : |
Cape Town, South Africa |
Download : |
icc10-bilal.pdf
|
|
'Be Liberal In What You Receive' On Your Mobile Phone |
Authors : |
M Zubair Rafique and Muddassar Farooq |
Conference/Journal : |
19th Virus Bulletin Conference (VB) |
Publishing Information : |
Virus Bulletin |
Place : |
Vancouver, Canada |
Download : |
vb10-zubair.pdf
|
|
RTP-Miner: A Real-time Security Framework for RTP Fuzzing Attacks |
Authors : |
M. Ali Akbar and Muddassar Farooq |
Conference/Journal : |
20th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2010) |
Publishing Information : |
ACM |
Place : |
Amsterdam, Netherlands |
Download : |
nossdav10-ali.pdf
|
|
On Performance Modeling of Ad Hoc Routing Protocols |
Authors : |
Muhammad Saleem, Syed Ali Khayam and Muddassar Farooq |
Conference/Journal : |
EURASIP Journal on Wireless Communications and Networking |
Publishing Information : |
(In Press) |
Place : |
|
Download : |
jwcn10-saleem.pdf
|
|
MESSIAH: To Nip the Exploits in the Bud |
Authors : |
M. Zubair Rafique, Atif Yaqub and Muddassar Farooq |
Conference/Journal : |
|
Publishing Information : |
TR-nexGINRC-2010-55 |
Place : |
|
Download : |
TR-55-Zubair.pdf
|
|
|
User Centered Design of E-Health Applications for Remote Patient Management |
Authors : |
Amina Tariq, Ajay Kumar Tanwani and Muddassar Farooq |
Conference/Journal : |
10th Annual Conference of the NZ ACM Special Interest Group on Human-Computer Interaction, CHINZ 2009 |
Publishing Information : |
ACM Press |
Place : |
Auckland, New Zealand |
Download : |
CHINZ09-ajay.pdf
|
|
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection |
Authors : |
Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
AISec 2009 - The 2nd Workshop on Security and Artificial Intelligence |
Publishing Information : |
Proceedings of the 2nd ACM workshop on Security and artificial intelligence |
Place : |
Chicago, Illinois, USA |
Download : |
aisec09-faraz.pdf
|
|
Evaluating DoS Attacks Against SIP-Based VoIP Systems |
Authors : |
M. Zubair Rafique, M. Ali Akbar and Muddassar Farooq |
Conference/Journal : |
IEEE Global Communications Conference (GLOBECOM 2009) |
Publishing Information : |
IEEE Press |
Place : |
Honululu, Hawaii USA |
Download : |
globecom09-zubair.pdf
|
|
Using Formal Grammar and Genetic Operators to Evolve Malware |
Authors : |
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Extended Abstract, Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-sadia.pdf
|
|
On the Inefficient Use of Entropy for Anomaly Detection |
Authors : |
Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Extended Abstract, Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-mobin.pdf
|
|
PE-probe: leveraging packer detection and structural information to detect malicious portable executables |
Authors : |
M. Zubair Shafiq, Syeda Momina Tabish, Muddassar Farooq |
Conference/Journal : |
18th Virus Bulletin Conference (VB) |
Publishing Information : |
Virus Bulletin |
Place : |
Switzerland |
Download : |
vb09-zubair.pdf
|
|
Keystroke-based User Identification on Smart Phones |
Authors : |
Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-saira.pdf
|
|
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime |
Authors : |
M. Zubair Shafiq, Syeda Momina Tabish, Fauzan Mirza, Muddassar Farooq |
Conference/Journal : |
12th International Symposium On Recent Advances In Intrusion Detection (RAID) |
Publishing Information : |
Lecture Notes in Computer Science, Springer |
Place : |
France |
Download : |
raid09-zubair.pdf
|
|
A Ubiquitous Real-Time Motion Artifact Rejection technique for Remote NIBP Monitoring of Hypertensive Patients |
Authors : |
Ali Hasnain, Mudaser Awan, Muddassar Farooq |
Conference/Journal : |
World Congress on Medical Physics and Bio-medical Engineering |
Publishing Information : |
Springer Verlag |
Place : |
Munich, Germany |
Download : |
worldcongress09-ali.pdf
|
|
Malware Detection using Statistical Analysis of Byte-Level File Content |
Authors : |
S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Workshop on CyberSecurity and Intelligence Informatics (CSI) |
Publishing Information : |
ACM Press |
Place : |
Paris, France |
Download : |
kdd09-momina.pdf
|
|
A Sense of `Danger' for Windows Processes |
Authors : |
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Conference/Journal : |
International Conference on Research in Artificial Immune Systems |
Publishing Information : |
Lecture Notes in Computer Science, Springer |
Place : |
York, UK |
Download : |
icaris09-salman.pdf
|
|
The Role of Biomedical Dataset in Classification |
Authors : |
Ajay Kumar Tanwani, Muddassar Farooq |
Conference/Journal : |
12th Conference on Artificial Intelligence in Medicine (AIME'09) |
Publishing Information : |
Springer Verlag |
Place : |
Verona, Italy |
Download : |
aime09-ajay.pdf
|
|
Performance Evaluation of Evolutionary Algorithms in Classification of Biomedical Datasets |
Authors : |
Ajay Kumar Tanwani, Muddassar Farooq |
Conference/Journal : |
International Workshop on Learning Classifier Systems (IWLCS), held in conjunction with Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
iwlcs09-ajay.pdf
|
|
A Hybrid GA-PSO Fuzzy System for User Identification on Smart Phones |
Authors : |
Muhammad Shahzad, Saira Zahid, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-shahzad.pdf
|
|
On the Appropriateness of Evolutionary Rule Learning Algorithms for Malware Detection |
Authors : |
M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Conference/Journal : |
International Workshop on Learning Classifier Systems (IWLCS), held in conjunction with Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
iwlcs09-zubair.pdf
|
|
Evolvable Malware |
Authors : |
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-sadia.pdf
|
|
Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection? |
Authors : |
M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-zubair.pdf
|
|
IMAD: In-Execution Malware Analysis and Detection |
Authors : |
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-bilal.pdf
|
|
Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks |
Authors : |
M. Ali Akbar, Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Montreal, Canada |
Download : |
gecco09-ali.pdf
|
|
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets |
Authors : |
Ajay Kumar Tanwani, Jamal Afridi, M. Zubair Shafiq, Muddassar Farooq |
Conference/Journal : |
7th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics (EvoBIO) |
Publishing Information : |
Volume 5483 of Lecture Notes in Computer Science, pp. 128-139, Springer |
Place : |
Tübingen, Germany |
Download : |
evobio09-ajay.pdf
|
|
A Framework for Efficient Mining of Structural Information to Detect Zero-Day Malicious Portable Executables |
Authors : |
M. Zubair Shafiq, Syeda Momina Tabish, Fauzan Mirza and Muddassar Farooq |
Conference/Journal : |
|
Publishing Information : |
TR-nexGINRC-2009-21 |
Place : |
|
Download : |
tr21-zubair.pdf
|
|
|
A Comparative Study of Anomaly Detection Algorithms for Detection of SIP Flooding in IMS |
Authors : |
M. Ali Akbar, Zeeshan Tariq and Muddassar Farooq |
Conference/Journal : |
International Conference on Internet Multimedia Services Architecture and Application |
Publishing Information : |
IEEE Press |
Place : |
Banglore, India |
Download : |
imsaa08-ali.pdf
|
|
Intelligent Features + Immune-inspired Classifiers: An Improved Approach to Malware Detection |
Authors : |
M. Zubair Shafiq, Syed Ali Khayam and Muddassar Farooq |
Conference/Journal : |
|
Publishing Information : |
TR-nexGINRC-2008-15 |
Place : |
|
Download : |
tr15-zubair.pdf
|
|
Using Telemedicine as an Enabler for Antenatal Care in Pakistan |
Authors : |
Muhammad Zulkifl Khalid, Ali Akbar, Ajay Kumar Tanwani, Amina Tariq and Muddassar Farooq |
Conference/Journal : |
2nd International Conference on E-Medical System (E-Medisys) |
Publishing Information : |
|
Place : |
Sfax, Tunisia |
Download : |
emedisys08-zulkifl.pdf
|
|
Embedded Malware Detection using Markovian Statistical Model of Benign Files |
Authors : |
M. Zubair Shafiq, Syeda Momina Tabish, Syed Ali Khayam and Muddassar Farooq |
Conference/Journal : |
|
Publishing Information : |
TR-nexGINRC-2008-14 |
Place : |
|
Download : |
tr14-momina.pdf
|
|
Formal Modeling of BeeAdHoc: a Bio-inspired Mobile Ad Hoc Network Routing Protocol |
Authors : |
Muhammad Saleem, Syed Ali Khayam and Muddassar Farooq |
Conference/Journal : |
Sixth International Workshop on Ant Colony and Swarm Intelligence (ANTS) |
Publishing Information : |
Lecture Notes in Computer Science, Springer Verlag |
Place : |
Brussels, Belgium |
Download : |
ants08-saleem.pdf
|
|
Embedded Malware Detection using Markov n-grams |
Authors : |
M. Zubair Shafiq, Syed Ali Khayam and Muddassar Farooq |
Conference/Journal : |
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) |
Publishing Information : |
Volume 5137 of Lecture Notes in Computer Science, pages 88-107, Springer Verlag |
Place : |
Paris, France |
Download : |
dimva08-zubair.pdf
|
|
A formal performance modeling framework for bio-inspired ad hoc routing protocols |
Authors : |
Muhammad Saleem, Syed Ali Khayam and Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Atlanta, USA |
Download : |
gecco08-saleem.pdf
|
|
A Sense of Danger: Dendritic Cells Inspired Artificial Immune System for MANET Security |
Authors : |
Nauman Mazhar and Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Atlanta, USA |
Download : |
gecco08-nauman.pdf
|
|
Improving Accuracy of Immune-inspired Malware Detectors by using Intelligent Features |
Authors : |
M. Zubair Shafiq, Syed Ali Khayam and Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
Atlanta, USA |
Download : |
gecco08-zubair.pdf
|
|
Comparison of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference System |
Authors : |
M. Zubair Shafiq, Muddassar Farooq and Syed Ali Khayam |
Conference/Journal : |
Applications of Evolutionary Computing, EvoWorkshops: EvoCoMnet |
Publishing Information : |
Volume 4974 of Lecture Notes in Computer Science, pages 48-57, Springer Verlag (Runners Up - Best Paper Award) |
Place : |
Napoli, Italy |
Download : |
evocomnet08-zubair.pdf
|
|
|
BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc |
Authors : |
Nauman Mazhar and Muddassar Farooq |
Conference/Journal : |
International Conference on Artificial Immune Systems (ICARIS) |
Publishing Information : |
Volume 4628 of Lecture Notes in Computer Science (LNCS), pp. 370-381, Springer Verlag |
Place : |
Santos, Brazil |
Download : |
|
|
A Framework for Empirical Evaluation of Nature Inspired Routing Protocols for Wireless Sensor Networ |
Authors : |
Muhammad Saleem and Muddassar Farooq |
Conference/Journal : |
IEEE International Conference on Evolutionary Computing (CEC) |
Publishing Information : |
- |
Place : |
Singapore |
Download : |
|
|
Vulnerability Analysis and Security Framework (BeeSec) for Nature Inspired MANET Routing Protocols |
Authors : |
Nauman Mazhar and Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
London |
Download : |
|
|
BeeSensor: A Bee-Inspired Power Aware Routing Protocol for Wireless Sensor Networks |
Authors : |
Muhamad Saleem and Muddassar Farooq |
Conference/Journal : |
EvoWorkshops 2007 |
Publishing Information : |
In Volume 4449 of Lecture Notes in Computer Science, pages 81-90, Springer Verlag |
Place : |
Valencia, Spain |
Download : |
|
|
Defence against 802.11 DoS Attacks using Artificial Immune System |
Authors : |
M. Zubair Shafiq and Muddassar Farooq |
Conference/Journal : |
International Conference on Artificial Immune Systems (ICARIS) |
Publishing Information : |
Volume 4628 of Lecture Notes in Computer Science (LNCS), pp. 95-106, Springer Verlag |
Place : |
Santos, Brazil |
Download : |
icaris07-zubair.pdf
|
|
Extended Thymus Action for Improving the response of AIS based NID System against Malicious Traffic |
Authors : |
M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi and Muddassar Farooq |
Conference/Journal : |
IEEE International Conference on Evolutionary Computing (CEC) |
Publishing Information : |
pages 3369-3376 |
Place : |
Singapore |
Download : |
cec07-zubair.pdf
|
|
A Comprehensive Formal Framework for Analyzing the Behavior of Nature-inspired Routing Protocols |
Authors : |
Saira Zahid, Muhammad Shahzad, Syed Usman Ali and Muddassar Farooq |
Conference/Journal : |
IEEE International Conference on Evolutionary Computing (CEC) |
Publishing Information : |
pages 180-187 |
Place : |
Singapore |
Download : |
cec07-saira.pdf
|
|
Extended Thymus Action for Reducing False Positives in AIS based Network Intrusion Detection Systems |
Authors : |
M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi and Muddassar Farooq |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
ACM Press |
Place : |
London, UK |
Download : |
gecco07-zubair.pdf
|
|
|
A Comprehensive Review of Nature Inspired Routing Algorithms for Fixed Telecommunication Networks |
Authors : |
Horst F. Wedde and Muddassar Farooq |
Conference/Journal : |
Elsevier Journal of Systems Architecture |
Publishing Information : |
Volume 52, Number 8-9 |
Place : |
|
Download : |
|
|
BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by AIS |
Authors : |
Horst F. Wedde, Constantin Timm, and Muddassar Farooq |
Conference/Journal : |
PPSN IX |
Publishing Information : |
In Volume 4193 of Lecture Notes in Computer Science, pages 623-632, Springer Verlag |
Place : |
Iceland |
Download : |
|
|
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms |
Authors : |
Horst F. Wedde, Constantin Timm, and Muddassar Farooq |
Conference/Journal : |
EvoWorkshops 2006 |
Publishing Information : |
Volume 3907 of Lecture Notes in Computer Science, pages 243-254, Springer Verlag |
Place : |
Budapest |
Download : |
|
|
|
BeeHive: New Ideas for Developing Routing Algorithms Inspired by Honey Bee Behavior |
Authors : |
Horst F. Wedde and Muddassar Farooq |
Conference/Journal : |
Computer and Information Science, Chapter 21 |
Publishing Information : |
Albert Zomaya and Stephan Olariu, Editors, Chapman & Hall/CRC, pp. 321-339 |
Place : |
|
Download : |
|
|
BeeHive: Routing Algorithms Inspired by Honey Bee Behavior |
Authors : |
Horst F. Wedde and Muddassar Farooq |
Conference/Journal : |
Kunstliche Intelligenz. Schwerpunkt: Swarm Intelligence |
Publishing Information : |
pp. 18-24, Nov 2005 |
Place : |
|
Download : |
|
|
The Wisdom of the Hive Applied to Mobile Ad-Hoc Networks |
Authors : |
Horst F. Wedde and Muddassar Farooq |
Conference/Journal : |
IEEE Swarm Intelligence Symposium |
Publishing Information : |
pp. 341-348 |
Place : |
Pasadena, California, USA |
Download : |
|
|
BeeAdHoc: An Energy Efficient Routing Algorithm for Mobile Ad Hoc Networks Inspired by Bee Behavior |
Authors : |
Horst F. Wedde, Muddassar Farooq, Thorsten Pannenbaecker, Brn Vogel, Christian Mueller, Johannes Meth, and Rene Jeruschkat |
Conference/Journal : |
ACM Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
pages 153-160, (Nominated for the best paper award) |
Place : |
Washington DC, USA |
Download : |
|
|
Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems |
Authors : |
Horst F. Wedde and Muddassar Farooq |
Conference/Journal : |
International Conference on Artificial Intelligence (IC-AI) |
Publishing Information : |
CSREA Press |
Place : |
Las Vegas, NV, USA |
Download : |
|
|
A Performance Evaluation Framework for Nature Inspired Routing Algorithms |
Authors : |
Horst F. Wedde and Muddassar Farooq |
Conference/Journal : |
Applications of Evolutionary Computing, EvoWorkshops |
Publishing Information : |
In Volume 3449 of Lecture Notes in Computer Science, pages 136-146, Springer Verlag |
Place : |
Lausanne, Switzerland |
Download : |
|
|
|
BeeHive: An Efficient Fault Tolerant Routing Algorithm under High Loads Inspired by Honey Bee Behavi |
Authors : |
Horst F. Wedde, Muddassar Farooq, and Yue Zhang |
Conference/Journal : |
Fourth International Workshop on Ant Colony and Swarm Intelligence (ANTS) |
Publishing Information : |
In Volume 3172 of Lecture Notes in Computer Science, pages 83-94, Springer Verlag (Winner of the Best Paper Award ANTS) |
Place : |
Brussels, Belgium |
Download : |
|
|
An Evolutionary Meta Hierarchical Scheduler for Linux Operating System |
Authors : |
Horst F. Wedde, Muddassar Farooq, and Mario Lischka |
Conference/Journal : |
Genetic and Evolutionary Computation Conference (GECCO) |
Publishing Information : |
Part II, In Volume 3103 of Lecture Notes in Computer Science, pages 1334 - 1335, Springer Verlag |
Place : |
Seattle, WA, USA |
Download : |
|
|
A User Centered Evolutionary Scheduling Framework |
Authors : |
Horst F. Wedde and Muddassar Farooq |
Conference/Journal : |
International Conference on Artificial Intelligence (ICAI) |
Publishing Information : |
Volume 2, pages 1126-1132, CSREA Press |
Place : |
Las Vegas, NV, USA |
Download : |
|
|
|
|
|
|