Nadjib Achir
Title
Cited by
Cited by
Year
WLAN planning: Separate and joint optimization of both access point placement and channel assignment
A Farsi, N Achir, K Boussetta
annals of telecommunications-annales des télécommunications 70 (5), 263-274, 2015
2392015
Artificial potential field approach in WSN deployment: Cost, QoM, connectivity, and lifetime constraints
N Aitsaadi, N Achir, K Boussetta, G Pujolle
Computer Networks 55 (1), 84-105, 2011
592011
A tabu search wsn deployment method for monitoring geographically irregular distributed events
N Aitsaadi, N Achir, K Boussetta, G Pujolle
Sensors 9 (3), 1625-1643, 2009
562009
Differentiated underwater sensor network deployment
N Aitsaadi, N Achir, K Boussetta, G Pujolle
Oceans 2007-Europe, 1-6, 2007
562007
Multi-objective WSN deployment: quality of monitoring, connectivity and lifetime
N Aitsaadi, N Achir, K Boussetta, G Pujolle
2010 IEEE International Conference on Communications, 1-6, 2010
402010
Wireless sensor network clustering for UAV-based data gathering
CY Tazibt, M Bekhti, T Djamah, N Achir, K Boussetta
2017 Wireless Days, 245-247, 2017
332017
On the objective evaluation of real-time networked games
A Kaiser, D Maggiorini, N Achir, K Boussetta
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-5, 2009
332009
Path planning of unmanned aerial vehicles with terrestrial wireless network tracking
M Bekhti, M Abdennebi, N Achir, K Boussetta
2016 Wireless Days (WD), 1-6, 2016
252016
A tabu search approach for differentiated sensor network deployment
N Aitsaadi, N Achir, K Khaled, G Pujolle
2008 5th IEEE Consumer Communications and Networking Conference, 163-167, 2008
222008
A new security games based reaction algorithm against DOS attacks in VANETs
MN Mejri, N Achir, M Hamdi
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
212016
DM2-ECOP: An efficient computation offloading policy for multi-user multi-cloudlet mobile edge computing environment
H Mazouzi, N Achir, K Boussetta
ACM Transactions on Internet Technology (TOIT) 19 (2), 1-24, 2019
202019
A new group Diffie-Hellman key generation proposal for secure VANET communications
MN Mejri, N Achir, M Hamdi
2016 13th IEEE annual consumer communications & networking conference (CCNC …, 2016
162016
Potential field approach to ensure connectivity and differentiated detection in WSN deployment
N Aitsaadi, N Achir, K Boussetta, G Pujolle
2009 IEEE International Conference on Communications, 1-6, 2009
162009
Drones path planning for WSN data gathering: A column generation heuristic approach
M Garraffa, M Bekhti, L Létocart, N Achir, K Boussetta
2018 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2018
152018
Vehicular ad-hoc networks using slotted Aloha: point-to-point, emergency and broadcast communications
B Blaszczyszyn, P Muhlethaler, N Achir
2012 IFIP Wireless Days, 1-6, 2012
152012
End-to-end efficient heuristic algorithm for 5G network slicing
A Kammoun, N Tabbane, G Diaz, A Dandoush, N Achir
2018 IEEE 32nd International Conference on Advanced Information Networking …, 2018
142018
Heuristic approaches for access points deployment and Frequency Assignment in WLANs
A Farsi, N Achir, K Boussetta
Global Information Infrastructure Symposium-GIIS 2011, 1-7, 2011
142011
Heuristic deployment to achieve both differentiated detection and connectivity in wsn
N Aitsaadi, N Achir, K Boussetta, G Pujolle
VTC Spring 2008-IEEE Vehicular Technology Conference, 123-127, 2008
132008
Maximizing mobiles energy saving through tasks optimal offloading placement in two-tier cloud: A theoretical and an experimental study
H Mazouzi, K Boussetta, N Achir
Computer Communications 144, 132-148, 2019
122019
Admission control algorithm for network slicing management in SDN-NFV environment
A Kammoun, N Tabbane, G Diaz, N Achir
2018 6th international conference on multimedia computing and systems (ICMCS …, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20