Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Azmi Jaafar
@article{DBLP:journals/corr/abs-1709-10379, author = {Faranak Nejati and Abdul Azim Abdul Ghani and Keng{-}Yap Ng and Azmi Jaafar}, title = {Handling state space explosion in verification of component-based systems: {A} review}, journal = {CoRR}, volume = {abs/1709.10379}, year = {2017}, url = {http://arxiv.org/abs/1709.10379}, eprinttype = {arXiv}, eprint = {1709.10379}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-10379.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SaiduSJZ15, author = {Ibrahim Saidu and Shamala Subramaniam and Azmi Jaafar and Zuriati Ahmad Zukarnain}, title = {An Efficient Battery Lifetime Aware Power Saving {(EBLAPS)} Mechanism in {IEEE} 802.16e Networks}, journal = {Wirel. Pers. Commun.}, volume = {80}, number = {1}, pages = {29--49}, year = {2015}, url = {https://doi.org/10.1007/s11277-014-1993-7}, doi = {10.1007/S11277-014-1993-7}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SaiduSJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SaiduSJZ15a, author = {Ibrahim Saidu and Shamala Subramaniam and Azmi Jaafar and Zuriati Ahmad Zukarnain}, title = {A QoS-Aware {CAC} with Bandwidth Reservation and Degradation Scheme in {IEEE} 802.16e Networks}, journal = {Wirel. Pers. Commun.}, volume = {82}, number = {4}, pages = {2673--2693}, year = {2015}, url = {https://doi.org/10.1007/s11277-015-2372-8}, doi = {10.1007/S11277-015-2372-8}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SaiduSJZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/SaiduSJZ14, author = {Ibrahim Saidu and Shamala Subramaniam and Azmi Jaafar and Zuriati Ahmad Zukarnain}, title = {A load-aware weighted round-robin algorithm forIEEE 802.16 networks}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2014}, pages = {226}, year = {2014}, url = {https://doi.org/10.1186/1687-1499-2014-226}, doi = {10.1186/1687-1499-2014-226}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/SaiduSJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijncr/AriffinMJA12, author = {Suriyani Ariffin and Ramlan Mahmod and Azmi Jaafar and Muhammad Rezal Kamel Ariffin}, title = {Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems}, journal = {Int. J. Nat. Comput. Res.}, volume = {3}, number = {1}, pages = {56--72}, year = {2012}, url = {https://doi.org/10.4018/jncr.2012010105}, doi = {10.4018/JNCR.2012010105}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijncr/AriffinMJA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejor/MalekmohammadiLJ11, author = {Najmeh Malekmohammadi and Farhad Hosseinzadeh Lotfi and Azmi Jaafar}, title = {Data envelopment scenario analysis with imprecise data}, journal = {Central Eur. J. Oper. Res.}, volume = {19}, number = {1}, pages = {65--79}, year = {2011}, url = {https://doi.org/10.1007/s10100-009-0129-8}, doi = {10.1007/S10100-009-0129-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cejor/MalekmohammadiLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/AriffinMJA11, author = {Suriyani Ariffin and Ramlan Mahmod and Azmi Jaafar and Muhammad Rezal Kamel Ariffin}, title = {Immune Systems Approaches for Cryptographic Algorithm}, booktitle = {Sixth International Conference on Bio-Inspired Computing: Theories and Applications, {BIC-TA} 2011, Penang, Malaysia, September 27-29, 2011}, pages = {231--235}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/BIC-TA.2011.33}, doi = {10.1109/BIC-TA.2011.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bic-ta/AriffinMJA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsecs/AbdullahASJ11, author = {Nur Atiqah Sia Abdullah and Rusli Abdullah and Mohd Hasan Selamat and Azmi Jaafar}, editor = {Jasni Mohamad Zain and Wan Maseri Binti Wan Mohd and Eyas El{-}Qawasmeh}, title = {User Acceptance for Extended Function Point Analysis in Software Security Costing}, booktitle = {Software Engineering and Computer Systems - Second International Conference, {ICSECS} 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {180}, pages = {346--360}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22191-0\_31}, doi = {10.1007/978-3-642-22191-0\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsecs/AbdullahASJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.