default search action
Samir Sebbah
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j16]Hyame Assem Alameddine, Sanaa Sharafeddine, Samir Sebbah, Sara Ayoubi, Chadi Assi:
Dynamic Task Offloading and Scheduling for Low-Latency IoT Services in Multi-Access Edge Computing. IEEE J. Sel. Areas Commun. 37(3): 668-682 (2019) - [j15]Sara Ayoubi, Samir Sebbah, Chadi Assi:
A Logic-Based Benders Decomposition Approach for the VNF Assignment Problem. IEEE Trans. Cloud Comput. 7(4): 894-906 (2019) - 2017
- [j14]Hyame Assem Alameddine, Samir Sebbah, Chadi Assi:
On the Interplay Between Network Function Mapping and Scheduling in VNF-Based Networks: A Column Generation Approach. IEEE Trans. Netw. Serv. Manag. 14(4): 860-874 (2017) - 2016
- [j13]Dariush Ebrahimi, Samir Sebbah, Chadi Assi:
A Column Generation Method for Constructing and Scheduling Multiple Forwarding Trees in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 15(9): 6513-6523 (2016) - [c19]Samir Sebbah, Claire Bagley, Mike Colena, Serdar Kadioglu:
Availability Optimization in Cloud-Based In-Memory Data Grids. CP 2016: 666-679 - [c18]Serdar Kadioglu, Mike Colena, Samir Sebbah:
Heterogeneous resource allocation in Cloud Management. NCA 2016: 35-38 - [c17]Dariush Ebrahimi, Samir Sebbah, Chadi Assi:
On Jointly Constructing and Scheduling Multiple Forwarding Trees in Wireless Sensor Networks. SECON 2016: 1-9 - 2015
- [j12]Mina Yazdanpanah, Chadi Assi, Samir Sebbah, Yousef R. Shayan:
Does Network Coding Combined With Interference Cancellation Bring Any Gain to a Wireless Network? IEEE/ACM Trans. Netw. 23(5): 1485-1500 (2015) - 2014
- [j11]Chadi Assi, Sara Ayoubi, Samir Sebbah, Khaled B. Shaban:
Towards Scalable Traffic Management in Cloud Data Centers. IEEE Trans. Commun. 62(3): 1033-1045 (2014) - [c16]Mohammad Nurujjaman, Samir Sebbah, Ahmad Khalil, Chadi Assi:
Efficient selection of optimally designed ethernet ring instances. ICC 2014: 3037-3043 - [c15]Sara Ayoubi, Samir Sebbah, Khaled B. Shaban, Chadi Assi:
Traffic engineering in cloud data centers: A column generation approach. NOMS 2014: 1-5 - 2013
- [j10]Samir Sebbah, Brigitte Jaumard:
Differentiated quality-of-protection in survivable WDM mesh networks using p-structures. Comput. Commun. 36(6): 621-629 (2013) - [j9]Samir Sebbah, Ahmed Ghanmi, Abdeslem Boukhtouta:
A column-and-cut generation algorithm for planning of Canadian armed forces tactical logistics distribution. Comput. Oper. Res. 40(12): 3069-3079 (2013) - [j8]Mohammad Nurujjaman, Samir Sebbah, Chadi Assi:
Multi-Ring ERP Network Design: A Traffic Engineering Approach. IEEE Commun. Lett. 17(1): 162-165 (2013) - [j7]Hamed M. K. Alazemi, Samir Sebbah, Mohammad Nurujjaman:
Fast and Efficient Network Protection Method Using Path Pre-Cross-Connected Trails. JOCN 5(12): 1343-1352 (2013) - [j6]Mohammad Nurujjaman, Samir Sebbah, Chadi Assi:
A Max-Flow Design Approach for Improved Service Availability in Multi-Ring ERP Networks. IEEE Trans. Commun. 61(8): 3385-3395 (2013) - [c14]Mohammad Nurujjaman, Samir Sebbah, Chadi Assi:
Planning and optimization of highly resilient multi-ring ERP-based mesh networks. DRCN 2013: 203-209 - [c13]Mina Yazdanpanah, Samir Sebbah, Chadi Assi, Yousef R. Shayan:
Impact of successive interference cancellation on the capacity of wireless networks: Joint optimal link scheduling and power control. ICC 2013: 1582-1587 - 2012
- [j5]Mohammad Nurujjaman, Samir Sebbah, Chadi Assi, Martin Maier:
Optimal Capacity Provisioning for Survivable Next Generation Ethernet Transport Networks. JOCN 4(12): 967-977 (2012) - [j4]Samir Sebbah, Brigitte Jaumard:
An efficient column generation design method of p-cycle-based protected working capacity envelope. Photonic Netw. Commun. 24(3): 167-176 (2012) - [j3]Samir Sebbah, Brigitte Jaumard:
Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using $p$ -Structures. IEEE/ACM Trans. Netw. 20(3): 798-810 (2012) - [c12]Mohammad Nurujjaman, Samir Sebbah, Chadi Assi:
Improving service availability In ERP based mesh networks. GLOBECOM 2012: 2733-2739 - [c11]Mohammad Nurujjaman, Samir Sebbah, Chadi Assi, Martin Maier:
Optimal capacity planning and RPL placement in carrier Ethernet mesh network design. ICC 2012: 3094-3099 - 2011
- [j2]Mohammad S. Kiaei, Samir Sebbah, Anton Cerný, Hamed M. K. Alazemi, Chadi Assi:
Efficient Network Protection Design Models using Pre-Cross-Connected Trails. IEEE Trans. Commun. 59(11): 3102-3110 (2011) - [c10]Mohammad S. Kiaei, Samir Sebbah, Anton Cerný, Hamed M. K. Alazemi, Chadi Assi:
Survivable Network Design Models Based on Pre-Cross-Connected Trails. ICCCN 2011: 1-7 - [c9]Samir Sebbah, Ahmed Ghanmi, Abdeslem Boukhtouta:
Modeling and simulation of military tactical logistics distribution. WSC 2011: 2507-2518 - 2010
- [j1]Samir Sebbah, Brigitte Jaumard:
Design of survivable WDM networks using pre-configured protection structures with unrestricted shapes. Photonic Netw. Commun. 19(1): 9-21 (2010) - [c8]Brigitte Jaumard, Nazmun Nahar Bhuiyan, Samir Sebbah, Florian Huc, David Coudert:
A new framework for efficient shared segment protection scheme for WDM networks. HPSR 2010: 189-196
2000 – 2009
- 2009
- [c7]Samir Sebbah, Brigitte Jaumard:
PWCE design in survivablewdm networks using unrestricted shape p-structure patterns. CCECE 2009: 279-282 - [c6]Brigitte Jaumard, Caroline Rocha, Samir Sebbah:
Large scale optimization in survivable WDM mesh networks: Tutorial proposal (DRCN 2009). DRCN 2009: 385-388 - [c5]Samir Sebbah, Brigitte Jaumard:
Differentiated Quality of Service in Survivable WDM Mesh Networks. GLOBECOM 2009: 1-6 - [c4]Samir Sebbah, Brigitte Jaumard:
A Resilient Transparent Optical Network Design with a Pre-Configured Extended-Tree Scheme. ICC 2009: 1-6 - [c3]Samir Sebbah, Brigitte Jaumard:
A global approach to fully pre-cross connected protection schemes design using p-structures. ICUMT 2009: 1-6 - 2008
- [c2]Samir Sebbah, Brigitte Jaumard:
Survivable WDM Networks Design with Non-Simple p-Cycle-Based PWCE. GLOBECOM 2008: 2687-2692 - 2007
- [c1]Brigitte Jaumard, Samir Sebbah:
Multi-Level Tabu Search for 3G Network Dimensioning. WCNC 2007: 4411-4416
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint