Search :
News Flash
Student from nexGIN RC wins SEECOM 
Haider Hameed, a research student of AIS project participated in the All Pakistan SEECOM - Software Competition, held at University of Engineering & Technology (UET), Lahore on May 21-23, 2010. He pre... 


nexGIN RC Team Wins 1st Prize in Research Category at COMPPEC 2010 for RPMS Project 
A team consisting of Mudaser Awan, Jamal Afridi and Ali Akbar participated in the COMPPEC 2010, held at College of Electrical and Mechanical Engineering, Rawalpindi on June 6th, 2010. The team present... 



Publications In Year 2014

Secure Biometric Template Generation for Multi-Factor Authentication
Authors : Salman H. Khan, M. Ali Akbar, Farrukh Shahzad, Mudassar Farooq, Zeashan Khan
Conference/Journal : Pattern Recognition
Publishing Information :
Place :
Download : SecureBiometricTemplateGenerationForMulti-FactorAuthentication.pdf


Publications In Year 2013

A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-all Usability Constraints
Authors : M. Kamran, Sabah Suhail, and Muddassar Farooq
Conference/Journal : IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 12, pp. 2694-2707, 2013
Publishing Information :
Place :
Download : RobustDistortionMinimizingTechniqueforWatermarkingRelationDatabasesUsingOnce-for-allUsabilityConstrain
The DroidKnight: a silent guardian for the Android ker nel, hunting for rogue smar tphone malware applications
Authors : M. A. Akbar, Farr ukh Shahzad and Muddassar Farooq
Conference/Journal : Virus Bulletin
Publishing Information :
Place : United States
Download : DroidKnight -Virus Bulletin 2013.pdf


Publications In Year 2012

Digital Right Protection of Relational Databases
Authors : Muhammad Kamran
Conference/Journal : PhD Thesis
Publishing Information :
Place : FAST-NU Islamabad
Download : Digital-Right-Protection-of-Relational-Databases.pdf
A Formal Usability Constraints Model for Watermarking of Outsourced Datasets
Authors : M. Kamran and Muddassar Farooq
Conference/Journal : Submitted for Review
Publishing Information : TR-nexGINRC-2012-59
Place :
Download : TR-59-Kamran.pdf


Publications In Year 2011

An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data
Authors : M. Kamran and Muddassar Farooq
Conference/Journal : .
Publishing Information : TR-nexGINRC-2011-57
Place :
Download : TR-57-Kamran.pdf
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
Authors : Farrukh Shahzad, M. Shahzad, Muddassar Farooq
Conference/Journal : Information Sciences, Impact Factor: 2.833
Publishing Information : Elsevier: http://dx.doi.org/10.1016/j.ins.2011.09.016
Place :
Download : INS2011-Farrukh.pdf
Using Evolutionary Algorithms for ECG Arrhythmia Detection and Classification
Authors : Komal Waseem, Awais Javed, Rashad Ramzan and Muddassar Farooq
Conference/Journal : 7th International Conference on Natural Computation (ICNC 2011)
Publishing Information : IEEE, DOI: 10.1109/ICNC.2011.6022596
Place : Shanghai, China
Download : ICNC11-Komal.pdf
A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols
Authors : N. Mazhara and M. Farooq
Conference/Journal : Applied Soft Computing
Publishing Information : doi:10.1016/j.asoc.2011.03.021
Place :
Download : asc11-Nauman.pdf
Using Evolutionary Learning Classifiers To Do Mobile Spam (SMS) Filtering
Authors : M. Bilal Junaid and Muddassar Farooq
Conference/Journal : GECCO 2011
Publishing Information : ACM 978-1-4503-0557-0/11/07
Place : Dublin, Ireland.
Download : GECCO11-Bilal1.pdf
In-Execution Malware Detection using Task Structures of Linux Processes
Authors : Farrukh Shahzad, Sohail Bhatti, Muhammad Shahzad and Muddassar Farooq
Conference/Journal : IEEE International Conference on Communications ICC2011
Publishing Information : IEEE (InPress)
Place : Kyoto Japan
Download : ICC11-Farrukh.pdf
ELF-Miner: Using Structural Knowledge and Data Mining for Detecting Linux Malicious Executables
Authors : Farrukh Shahzad and Muddassar Farooq
Conference/Journal : Knowledge and Information Systems : An International Journal
Publishing Information : Accepted (In Press), Impact Factor = 2.211
Place :
Download : KAIS11-Farrukh.pdf
OG-Miner: an Intelligent Health Tool For Achieving Millennium Development Goals (MDGs) in m-Health Environments
Authors : M. Jamal Afridi and Muddassar Farooq
Conference/Journal : Hawaii International Conference on Systems Sciences
Publishing Information :
Place : Kauai, Hawaii
Download : HICSS11-Jamal.pdf


Publications In Year 2010

Investigating the Agent-based Ad Hoc Routing Algorithms: A Probabilistic Performance Evaluation Framework Based on Reliability Theory
Authors : Muhammad Saleem and Mudassar Farooq.
Conference/Journal : .
Publishing Information : Ph.D. Thesis
Place :
Download : PhD-Thesis-ACM-MSaleem.pdf
On the Reliability of Ad Hoc Routing Protocols for Loss-and-Delay Sensitive Applications
Authors : Muhammad Saleem, Israr Ullah, Syed Ali Khayam, and Mudassar Farooq.
Conference/Journal : Ad Hoc Networks (2010)
Publishing Information : doi:10.1016/j.adhoc.2010.07.012, Impact Factor = 1.293
Place :
Download : AHN10-Saleem.pdf
Classification Potential vs. Classification Accuracy: A Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets
Authors : Ajay Kumar Tanwani and Muddassar Farooq
Conference/Journal : Learning Classifier Systems LCS 2010
Publishing Information : Lecture Notes in Computer Science, 2010, Volume 6471/2010, 127-144, DOI: 10.1007/978-3-642-17508-4_9
Place : Montreal, Canada
Download : IWLCS09-ajay1.pdf
Using Computational Intelligence to Identify Performance Bottlenecks In a Computer System
Authors : Faraz Ahmed, Farrukh Shahzad and Muddassar Farooq
Conference/Journal : 11th International Conference on Parallel Problem Solving From Nature
Publishing Information : Lecture Notes in Computer Science, 2011, Volume 6238/2011, 304-313, DOI: 10.1007/978-3-642-15844-5_31
Place : Krakow, Poland
Download : PPSN10-Faraz.pdf
Swarm Intelligence Based Routing Protocols for Wireless Sensor Networks: Survey and Future Directions
Authors : Muhammad Saleem, Gianni Di Caro and Muddassar Farooq
Conference/Journal : Information Sciences (2010)
Publishing Information : doi:10.1016/j.ins.2010.07.005, Impact Factor = 3.291
Place :
Download : IS10-Saleem1.pdf
Exposing the CCN (Criminal Cellular Network): SMS Vulnerabilities to Embed High Capacity Covert Channel
Authors : M Zubair Rafique and Muddassar Farooq
Conference/Journal : Black Hat USA 2010// Black Hat Arsenal
Publishing Information : Black Hat USA
Place : LAS VEGAS, USA
Download : BHUSA10-Zubair-Arsenal-WP.pdf
Mining Kernel Task Structure for Malware Analysis and Detection
Authors : Farrukh Shahzad, Muhammad Shahzad, Muddassar Farooq
Conference/Journal :
Publishing Information : TR-nexGINRC-2010-56
Place :
Download : TR-56-Farrukh.pdf
Towards a Theory of Generalizing System Call Representation For In-Execution Malware Detection
Authors : Bilal Mehdi, Faraz Ahmed, Syed Ali Khayyam and Muddassar Farooq
Conference/Journal : IEEE International Communications Conference (ICC2010)
Publishing Information : IEEE
Place : Cape Town, South Africa
Download : icc10-bilal.pdf
'Be Liberal In What You Receive' On Your Mobile Phone
Authors : M Zubair Rafique and Muddassar Farooq
Conference/Journal : 19th Virus Bulletin Conference (VB)
Publishing Information : Virus Bulletin
Place : Vancouver, Canada
Download : vb10-zubair.pdf
RTP-Miner: A Real-time Security Framework for RTP Fuzzing Attacks
Authors : M. Ali Akbar and Muddassar Farooq
Conference/Journal : 20th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2010)
Publishing Information : ACM
Place : Amsterdam, Netherlands
Download : nossdav10-ali.pdf
On Performance Modeling of Ad Hoc Routing Protocols
Authors : Muhammad Saleem, Syed Ali Khayam and Muddassar Farooq
Conference/Journal : EURASIP Journal on Wireless Communications and Networking
Publishing Information : (In Press)
Place :
Download : jwcn10-saleem.pdf
MESSIAH: To Nip the Exploits in the Bud
Authors : M. Zubair Rafique, Atif Yaqub and Muddassar Farooq
Conference/Journal :
Publishing Information : TR-nexGINRC-2010-55
Place :
Download : TR-55-Zubair.pdf


Publications In Year 2009

User Centered Design of E-Health Applications for Remote Patient Management
Authors : Amina Tariq, Ajay Kumar Tanwani and Muddassar Farooq
Conference/Journal : 10th Annual Conference of the NZ ACM Special Interest Group on Human-Computer Interaction, CHINZ 2009
Publishing Information : ACM Press
Place : Auckland, New Zealand
Download : CHINZ09-ajay.pdf
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection
Authors : Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq
Conference/Journal : AISec 2009 - The 2nd Workshop on Security and Artificial Intelligence
Publishing Information : Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Place : Chicago, Illinois, USA
Download : aisec09-faraz.pdf
Evaluating DoS Attacks Against SIP-Based VoIP Systems
Authors : M. Zubair Rafique, M. Ali Akbar and Muddassar Farooq
Conference/Journal : IEEE Global Communications Conference (GLOBECOM 2009)
Publishing Information : IEEE Press
Place : Honululu, Hawaii USA
Download : globecom09-zubair.pdf
Using Formal Grammar and Genetic Operators to Evolve Malware
Authors : Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq
Conference/Journal : 12th International Symposium On Recent Advances In Intrusion Detection (RAID)
Publishing Information : Extended Abstract, Lecture Notes in Computer Science, Springer
Place : France
Download : raid09-sadia.pdf
On the Inefficient Use of Entropy for Anomaly Detection
Authors : Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam
Conference/Journal : 12th International Symposium On Recent Advances In Intrusion Detection (RAID)
Publishing Information : Extended Abstract, Lecture Notes in Computer Science, Springer
Place : France
Download : raid09-mobin.pdf
PE-probe: leveraging packer detection and structural information to detect malicious portable executables
Authors : M. Zubair Shafiq, Syeda Momina Tabish, Muddassar Farooq
Conference/Journal : 18th Virus Bulletin Conference (VB)
Publishing Information : Virus Bulletin
Place : Switzerland
Download : vb09-zubair.pdf
Keystroke-based User Identification on Smart Phones
Authors : Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq
Conference/Journal : 12th International Symposium On Recent Advances In Intrusion Detection (RAID)
Publishing Information : Lecture Notes in Computer Science, Springer
Place : France
Download : raid09-saira.pdf
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
Authors : M. Zubair Shafiq, Syeda Momina Tabish, Fauzan Mirza, Muddassar Farooq
Conference/Journal : 12th International Symposium On Recent Advances In Intrusion Detection (RAID)
Publishing Information : Lecture Notes in Computer Science, Springer
Place : France
Download : raid09-zubair.pdf
A Ubiquitous Real-Time Motion Artifact Rejection technique for Remote NIBP Monitoring of Hypertensive Patients
Authors : Ali Hasnain, Mudaser Awan, Muddassar Farooq
Conference/Journal : World Congress on Medical Physics and Bio-medical Engineering
Publishing Information : Springer Verlag
Place : Munich, Germany
Download : worldcongress09-ali.pdf
Malware Detection using Statistical Analysis of Byte-Level File Content
Authors : S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq
Conference/Journal : ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Workshop on CyberSecurity and Intelligence Informatics (CSI)
Publishing Information : ACM Press
Place : Paris, France
Download : kdd09-momina.pdf
A Sense of `Danger' for Windows Processes
Authors : Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq
Conference/Journal : International Conference on Research in Artificial Immune Systems
Publishing Information : Lecture Notes in Computer Science, Springer
Place : York, UK
Download : icaris09-salman.pdf
The Role of Biomedical Dataset in Classification
Authors : Ajay Kumar Tanwani, Muddassar Farooq
Conference/Journal : 12th Conference on Artificial Intelligence in Medicine (AIME'09)
Publishing Information : Springer Verlag
Place : Verona, Italy
Download : aime09-ajay.pdf
Performance Evaluation of Evolutionary Algorithms in Classification of Biomedical Datasets
Authors : Ajay Kumar Tanwani, Muddassar Farooq
Conference/Journal : International Workshop on Learning Classifier Systems (IWLCS), held in conjunction with Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Montreal, Canada
Download : iwlcs09-ajay.pdf
A Hybrid GA-PSO Fuzzy System for User Identification on Smart Phones
Authors : Muhammad Shahzad, Saira Zahid, Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Montreal, Canada
Download : gecco09-shahzad.pdf
On the Appropriateness of Evolutionary Rule Learning Algorithms for Malware Detection
Authors : M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq
Conference/Journal : International Workshop on Learning Classifier Systems (IWLCS), held in conjunction with Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Montreal, Canada
Download : iwlcs09-zubair.pdf
Evolvable Malware
Authors : Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Montreal, Canada
Download : gecco09-sadia.pdf
Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection?
Authors : M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Montreal, Canada
Download : gecco09-zubair.pdf
IMAD: In-Execution Malware Analysis and Detection
Authors : Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Montreal, Canada
Download : gecco09-bilal.pdf
Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks
Authors : M. Ali Akbar, Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Montreal, Canada
Download : gecco09-ali.pdf
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets
Authors : Ajay Kumar Tanwani, Jamal Afridi, M. Zubair Shafiq, Muddassar Farooq
Conference/Journal : 7th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics (EvoBIO)
Publishing Information : Volume 5483 of Lecture Notes in Computer Science, pp. 128-139, Springer
Place : Tübingen, Germany
Download : evobio09-ajay.pdf
A Framework for Efficient Mining of Structural Information to Detect Zero-Day Malicious Portable Executables
Authors : M. Zubair Shafiq, Syeda Momina Tabish, Fauzan Mirza and Muddassar Farooq
Conference/Journal :
Publishing Information : TR-nexGINRC-2009-21
Place :
Download : tr21-zubair.pdf


Publications In Year 2008

A Comparative Study of Anomaly Detection Algorithms for Detection of SIP Flooding in IMS
Authors : M. Ali Akbar, Zeeshan Tariq and Muddassar Farooq
Conference/Journal : International Conference on Internet Multimedia Services Architecture and Application
Publishing Information : IEEE Press
Place : Banglore, India
Download : imsaa08-ali.pdf
Intelligent Features + Immune-inspired Classifiers: An Improved Approach to Malware Detection
Authors : M. Zubair Shafiq, Syed Ali Khayam and Muddassar Farooq
Conference/Journal :
Publishing Information : TR-nexGINRC-2008-15
Place :
Download : tr15-zubair.pdf
Using Telemedicine as an Enabler for Antenatal Care in Pakistan
Authors : Muhammad Zulkifl Khalid, Ali Akbar, Ajay Kumar Tanwani, Amina Tariq and Muddassar Farooq
Conference/Journal : 2nd International Conference on E-Medical System (E-Medisys)
Publishing Information :
Place : Sfax, Tunisia
Download : emedisys08-zulkifl.pdf
Embedded Malware Detection using Markovian Statistical Model of Benign Files
Authors : M. Zubair Shafiq, Syeda Momina Tabish, Syed Ali Khayam and Muddassar Farooq
Conference/Journal :
Publishing Information : TR-nexGINRC-2008-14
Place :
Download : tr14-momina.pdf
Formal Modeling of BeeAdHoc: a Bio-inspired Mobile Ad Hoc Network Routing Protocol
Authors : Muhammad Saleem, Syed Ali Khayam and Muddassar Farooq
Conference/Journal : Sixth International Workshop on Ant Colony and Swarm Intelligence (ANTS)
Publishing Information : Lecture Notes in Computer Science, Springer Verlag
Place : Brussels, Belgium
Download : ants08-saleem.pdf
Embedded Malware Detection using Markov n-grams
Authors : M. Zubair Shafiq, Syed Ali Khayam and Muddassar Farooq
Conference/Journal : Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Publishing Information : Volume 5137 of Lecture Notes in Computer Science, pages 88-107, Springer Verlag
Place : Paris, France
Download : dimva08-zubair.pdf
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Authors : Muhammad Saleem, Syed Ali Khayam and Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Atlanta, USA
Download : gecco08-saleem.pdf
A Sense of Danger: Dendritic Cells Inspired Artificial Immune System for MANET Security
Authors : Nauman Mazhar and Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Atlanta, USA
Download : gecco08-nauman.pdf
Improving Accuracy of Immune-inspired Malware Detectors by using Intelligent Features
Authors : M. Zubair Shafiq, Syed Ali Khayam and Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : Atlanta, USA
Download : gecco08-zubair.pdf
Comparison of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference System
Authors : M. Zubair Shafiq, Muddassar Farooq and Syed Ali Khayam
Conference/Journal : Applications of Evolutionary Computing, EvoWorkshops: EvoCoMnet
Publishing Information : Volume 4974 of Lecture Notes in Computer Science, pages 48-57, Springer Verlag (Runners Up - Best Paper Award)
Place : Napoli, Italy
Download : evocomnet08-zubair.pdf


Publications In Year 2007

BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc
Authors : Nauman Mazhar and Muddassar Farooq
Conference/Journal : International Conference on Artificial Immune Systems (ICARIS)
Publishing Information : Volume 4628 of Lecture Notes in Computer Science (LNCS), pp. 370-381, Springer Verlag
Place : Santos, Brazil
Download :
A Framework for Empirical Evaluation of Nature Inspired Routing Protocols for Wireless Sensor Networ
Authors : Muhammad Saleem and Muddassar Farooq
Conference/Journal : IEEE International Conference on Evolutionary Computing (CEC)
Publishing Information : -
Place : Singapore
Download :
Vulnerability Analysis and Security Framework (BeeSec) for Nature Inspired MANET Routing Protocols
Authors : Nauman Mazhar and Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : London
Download :
BeeSensor: A Bee-Inspired Power Aware Routing Protocol for Wireless Sensor Networks
Authors : Muhamad Saleem and Muddassar Farooq
Conference/Journal : EvoWorkshops 2007
Publishing Information : In Volume 4449 of Lecture Notes in Computer Science, pages 81-90, Springer Verlag
Place : Valencia, Spain
Download :
Defence against 802.11 DoS Attacks using Artificial Immune System
Authors : M. Zubair Shafiq and Muddassar Farooq
Conference/Journal : International Conference on Artificial Immune Systems (ICARIS)
Publishing Information : Volume 4628 of Lecture Notes in Computer Science (LNCS), pp. 95-106, Springer Verlag
Place : Santos, Brazil
Download : icaris07-zubair.pdf
Extended Thymus Action for Improving the response of AIS based NID System against Malicious Traffic
Authors : M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi and Muddassar Farooq
Conference/Journal : IEEE International Conference on Evolutionary Computing (CEC)
Publishing Information : pages 3369-3376
Place : Singapore
Download : cec07-zubair.pdf
A Comprehensive Formal Framework for Analyzing the Behavior of Nature-inspired Routing Protocols
Authors : Saira Zahid, Muhammad Shahzad, Syed Usman Ali and Muddassar Farooq
Conference/Journal : IEEE International Conference on Evolutionary Computing (CEC)
Publishing Information : pages 180-187
Place : Singapore
Download : cec07-saira.pdf
Extended Thymus Action for Reducing False Positives in AIS based Network Intrusion Detection Systems
Authors : M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi and Muddassar Farooq
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : ACM Press
Place : London, UK
Download : gecco07-zubair.pdf


Publications In Year 2006

A Comprehensive Review of Nature Inspired Routing Algorithms for Fixed Telecommunication Networks
Authors : Horst F. Wedde and Muddassar Farooq
Conference/Journal : Elsevier Journal of Systems Architecture
Publishing Information : Volume 52, Number 8-9
Place :
Download :
BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by AIS
Authors : Horst F. Wedde, Constantin Timm, and Muddassar Farooq
Conference/Journal : PPSN IX
Publishing Information : In Volume 4193 of Lecture Notes in Computer Science, pages 623-632, Springer Verlag
Place : Iceland
Download :
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Authors : Horst F. Wedde, Constantin Timm, and Muddassar Farooq
Conference/Journal : EvoWorkshops 2006
Publishing Information : Volume 3907 of Lecture Notes in Computer Science, pages 243-254, Springer Verlag
Place : Budapest
Download :


Publications In Year 2005

BeeHive: New Ideas for Developing Routing Algorithms Inspired by Honey Bee Behavior
Authors : Horst F. Wedde and Muddassar Farooq
Conference/Journal : Computer and Information Science, Chapter 21
Publishing Information : Albert Zomaya and Stephan Olariu, Editors, Chapman & Hall/CRC, pp. 321-339
Place :
Download :
BeeHive: Routing Algorithms Inspired by Honey Bee Behavior
Authors : Horst F. Wedde and Muddassar Farooq
Conference/Journal : Kunstliche Intelligenz. Schwerpunkt: Swarm Intelligence
Publishing Information : pp. 18-24, Nov 2005
Place :
Download :
The Wisdom of the Hive Applied to Mobile Ad-Hoc Networks
Authors : Horst F. Wedde and Muddassar Farooq
Conference/Journal : IEEE Swarm Intelligence Symposium
Publishing Information : pp. 341-348
Place : Pasadena, California, USA
Download :
BeeAdHoc: An Energy Efficient Routing Algorithm for Mobile Ad Hoc Networks Inspired by Bee Behavior
Authors : Horst F. Wedde, Muddassar Farooq, Thorsten Pannenbaecker, Brn Vogel, Christian Mueller, Johannes Meth, and Rene Jeruschkat
Conference/Journal : ACM Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : pages 153-160, (Nominated for the best paper award)
Place : Washington DC, USA
Download :
Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems
Authors : Horst F. Wedde and Muddassar Farooq
Conference/Journal : International Conference on Artificial Intelligence (IC-AI)
Publishing Information : CSREA Press
Place : Las Vegas, NV, USA
Download :
A Performance Evaluation Framework for Nature Inspired Routing Algorithms
Authors : Horst F. Wedde and Muddassar Farooq
Conference/Journal : Applications of Evolutionary Computing, EvoWorkshops
Publishing Information : In Volume 3449 of Lecture Notes in Computer Science, pages 136-146, Springer Verlag
Place : Lausanne, Switzerland
Download :


Publications In Year 2004

BeeHive: An Efficient Fault Tolerant Routing Algorithm under High Loads Inspired by Honey Bee Behavi
Authors : Horst F. Wedde, Muddassar Farooq, and Yue Zhang
Conference/Journal : Fourth International Workshop on Ant Colony and Swarm Intelligence (ANTS)
Publishing Information : In Volume 3172 of Lecture Notes in Computer Science, pages 83-94, Springer Verlag (Winner of the Best Paper Award ANTS)
Place : Brussels, Belgium
Download :
An Evolutionary Meta Hierarchical Scheduler for Linux Operating System
Authors : Horst F. Wedde, Muddassar Farooq, and Mario Lischka
Conference/Journal : Genetic and Evolutionary Computation Conference (GECCO)
Publishing Information : Part II, In Volume 3103 of Lecture Notes in Computer Science, pages 1334 - 1335, Springer Verlag
Place : Seattle, WA, USA
Download :
A User Centered Evolutionary Scheduling Framework
Authors : Horst F. Wedde and Muddassar Farooq
Conference/Journal : International Conference on Artificial Intelligence (ICAI)
Publishing Information : Volume 2, pages 1126-1132, CSREA Press
Place : Las Vegas, NV, USA
Download :

Powered by : pepnet