default search action
Ahmed A. Zewail
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j9]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches. IEEE J. Sel. Areas Inf. Theory 2(4): 1240-1252 (2021) - 2020
- [j8]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Device-to-Device Coded-Caching With Distinct Cache Sizes. IEEE Trans. Commun. 68(5): 2748-2762 (2020) - [j7]Ahmed A. Zewail, Aylin Yener:
Device-to-Device Secure Coded Caching. IEEE Trans. Inf. Forensics Secur. 15: 1513-1524 (2020)
2010 – 2019
- 2019
- [j6]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Coded Caching for Heterogeneous Systems: An Optimization Perspective. IEEE Trans. Commun. 67(8): 5321-5335 (2019) - [c25]Ahmed A. Zewail, Abdelrahman M. Ibrahim, Aylin Yener:
An Optimization Framework for Secure Delivery in Heterogeneous Coded Caching Systems. ACSSC 2019: 1232-1236 - [c24]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Coded Placement for Systems with Shared Caches. ICC 2019: 1-6 - [c23]Ahmed A. Zewail, Aylin Yener:
Untrusted Caches in Two-layer Networks. ISIT 2019: 1-5 - [c22]Ahmed A. Zewail, Aylin Yener:
Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity. ITW 2019: 1-5 - [c21]Ahmed A. Zewail, Aylin Yener:
Cache-Aided Combination Networks with Asymmetric End Users. SPAWC 2019: 1-5 - [i10]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Device-to-Device Coded Caching with Distinct Cache Sizes. CoRR abs/1903.08142 (2019) - 2018
- [j5]Ahmed A. Zewail, Aylin Yener:
Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays. IEEE J. Sel. Areas Commun. 36(6): 1140-1152 (2018) - [c20]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes. ACSSC 2018: 1604-1608 - [c19]Ahmed A. Zewail, Aylin Yener:
Cache-aided combination networks with secrecy guarantees. CISS 2018: 1-6 - [c18]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Device-to-Device Coded Caching with Heterogeneous Cache Sizes. ICC 2018: 1-6 - [c17]Ahmed A. Zewail, Aylin Yener:
The Wiretap Channel with a Cache. ISIT 2018: 1720-1724 - [c16]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
On Coded Caching with Heterogeneous Distortion Requirements. ITA 2018: 1-9 - [i9]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
On Coded Caching with Heterogeneous Distortion Requirements. CoRR abs/1802.10073 (2018) - [i8]Ahmed A. Zewail, Aylin Yener:
Device-to-Device Secure Coded Caching. CoRR abs/1809.06844 (2018) - [i7]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Coded Caching for Heterogeneous Systems: An Optimization Perspective. CoRR abs/1810.08187 (2018) - [i6]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes. CoRR abs/1811.04067 (2018) - 2017
- [j4]Ahmed A. Zewail, Aylin Yener:
Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees. IEEE Trans. Inf. Forensics Secur. 12(9): 2052-2066 (2017) - [c15]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Optimization of heterogeneous caching systems with rate limited links. ICC 2017: 1-6 - [c14]Ahmed A. Zewail, Aylin Yener:
Coded caching for combination networks with cache-aided relays. ISIT 2017: 2433-2437 - [c13]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Centralized Coded Caching with Heterogeneous Cache Sizes. WCNC 2017: 1-6 - [i5]Ahmed A. Zewail, Aylin Yener:
Combination Networks with or without Secrecy Constraints: The Impact of Caching Relays. CoRR abs/1712.04930 (2017) - 2016
- [j3]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Green Distributed Storage Using Energy Harvesting Nodes. IEEE J. Sel. Areas Commun. 34(5): 1590-1603 (2016) - [j2]Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
Using network coding to achieve the capacity of deterministic relay networks with relay messages. Wirel. Commun. Mob. Comput. 16(15): 2390-2405 (2016) - [c12]Ahmed A. Zewail, Aylin Yener:
Fundamental limits of secure device-to-device coded caching. ACSSC 2016: 1414-1418 - [c11]Ahmed A. Zewail, Aylin Yener:
Coded caching for resolvable networks with security requirements. CNS 2016: 621-625 - [c10]Ahmed A. Zewail, Aylin Yener:
Two-Hop Untrusted Relay Channel with an External Eavesdropper under Layered Secrecy Constraints. GLOBECOM 2016: 1-6 - 2015
- [j1]Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed S. Nafea, Ahmed A. Zewail, Aylin Yener, Damien Octeau:
Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships. IEEE J. Sel. Top. Signal Process. 9(2): 360-373 (2015) - [c9]Abdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener:
Towards green distributed storage systems. ACSSC 2015: 890-894 - [c8]Ahmed A. Zewail, Aylin Yener:
The two-hop interference untrusted-relay channel with confidential messages. ITW Fall 2015: 322-326 - 2014
- [c7]Ahmed A. Zewail, Mohamed S. Nafea, Aylin Yener:
Multi-terminal networks with an untrusted relay. Allerton 2014: 895-902 - [c6]Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed S. Nafea, Ahmed A. Zewail, Aylin Yener, Damien Octeau:
Optimal strategies for targeted influence in signed networks. ASONAM 2014: 906-911 - [c5]Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed S. Nafea, Ahmed A. Zewail, Aylin Yener, Damien Octeau:
Communicating in a socially-aware network: Impact of relationship types. GlobalSIP 2014: 788-792 - [c4]Ahmed A. Zewail, Mohammed Nafie, Yahya Mohasseb, Hesham El Gamal:
Achievable degrees of freedom region of MIMO relay networks using Detour Schemes. ICC 2014: 1860-1865 - [c3]Ahmed A. Zewail, Aylin Yener:
The multiple access channel with an untrusted relay. ITW 2014: 25-29 - [i4]Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
Using Network Coding to Achieve the Capacity of Deterministic Relay Networks with Relay Messages. CoRR abs/1404.4761 (2014) - 2013
- [c2]Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
The deterministic multicast capacity of 4-node relay networks. ISIT 2013: 804-808 - [c1]Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
The deterministic capacity of relay networks with relay private messages. ITW 2013: 1-5 - [i3]Ahmed A. Zewail, Mohammed Nafie, Yahya Mohasseb, Hesham El Gamal:
The Deterministic Multicast Capacity of 4-Node Relay Networks. CoRR abs/1304.4464 (2013) - [i2]Ahmed A. Zewail, Mohammed Nafie:
The Achievable Degrees of Freedom Region of Relay Networks using Detours. CoRR abs/1307.0685 (2013) - [i1]Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
The Deterministic Capacity of Relay Networks with Relay Private Messages. CoRR abs/1308.1761 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint