default search action
Anis Laouiti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based distributed trust management in IoT and IIoT: a survey. J. Supercomput. 80(15): 21867-21919 (2024) - 2023
- [c56]Khouloud Hwerbi, Ichrak Amdouni, Anis Laouiti, Cédric Adjih, Leïla Saïdane:
Veterinary Drone: Blockchain-Based System for Cattle Health Monitoring. IWCMC 2023: 1613-1618 - 2022
- [c55]Najoua Benalaya, Cédric Adjih, Ichrak Amdouni, Anis Laouiti, Leïla Azouz Saïdane:
UAV Search Path Planning For Livestock Monitoring. PEMWN 2022: 1-6 - [c54]Khouloud Hwerbi, Najoua Benalaya, Ichrak Amdouni, Anis Laouiti, Cédric Adjih, Leïla Azouz Saïdane:
A Survey on the Opportunities of Blockchain and UAVs in Agriculture. PEMWN 2022: 1-6 - 2021
- [c53]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based Privacy Aware Distributed Access Management Framework for Industry 4.0. WETICE 2021: 51-56 - 2020
- [j13]Mohamed Hadded, Khalifa Toumi, Anis Laouiti, Paul Mühlethaler:
A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks. Int. J. Interdiscip. Telecommun. Netw. 12(4): 74-87 (2020) - [c52]Asma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin:
An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts. AINA 2020: 1303-1318
2010 – 2019
- 2019
- [j12]Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti:
Misbehavior detection and efficient revocation within VANET. J. Inf. Secur. Appl. 46: 193-209 (2019) - [j11]Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti:
Trust model for secure group leader-based communications in VANET. Wirel. Networks 25(8): 4639-4661 (2019) - [c51]Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti:
A Trusted Group-Based Revocation Process for Intelligent Transportation System. ICDEc 2019: 133-146 - [c50]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments. NCA 2019: 1-9 - [c49]Oumaima Attia, Ines Khoufi, Anis Laouiti, Cédric Adjih:
An IoT-Blockchain Architecture Based on Hyperledger Framework for Healthcare Monitoring Application. NTMS 2019: 1-5 - [c48]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Alexandre Laubé, Steven Martin:
Blockchain based trust management mechanism for IoT. WCNC 2019: 1-8 - 2018
- [j10]Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leïla Azouz Saïdane:
Hybrid centralised MAC protocol for reliable broadcast of safety messages in vehicular ad hoc network. Int. J. Space Based Situated Comput. 8(3): 169-178 (2018) - [c47]Narjes Boulila, Mohamed Hadded, Anis Laouiti, Leïla Azouz Saïdane:
QCH-MAC: A Qos-Aware Centralized Hybrid MAC Protocol for Vehicular Ad Hoc NETworks. AINA 2018: 55-62 - [c46]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti:
An Optimized Multi-hop Broadcast Scheme for Mesh Networks with Node Failures. ICCC 2018: 814-818 - [c45]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti:
TDMA Scheduling Strategies for Vehicular Ad Hoc Networks: From a Distributed to a Centralized Approach. SoftCOM 2018: 1-6 - [c44]Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti:
A security solution for V2V communication within VANETs. Wireless Days 2018: 181-183 - 2017
- [j9]Ines Khoufi, Pascale Minet, Anis Laouiti, Saoucene Mahfoudh:
Survey of deployment algorithms in wireless sensor networks: coverage and connectivity issues and challenges. Int. J. Auton. Adapt. Commun. Syst. 10(4): 341-390 (2017) - [j8]Fatma Hrizi, Anis Laouiti:
Scalable and adaptive overlay for efficient forwarding in volunteer clouds. Int. J. Space Based Situated Comput. 7(4): 217-228 (2017) - [j7]Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti:
VANet security challenges and solutions: A survey. Veh. Commun. 7: 7-20 (2017) - [c43]Fatma Hrizi, Anis Laouiti:
Hierarchical Small World Overlay for Efficient Forwarding in Volunteer Clouds. AINA 2017: 236-243 - [c42]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti:
Performance evaluation of a TDMA-based multi-hop communication scheme for reliable delivery of warning messages in vehicular networks. IWCMC 2017: 1029-1034 - [c41]Pascale Minet, Ines Khoufi, Anis Laouiti:
Increasing reliability of a TSCH network for the industry 4.0. NCA 2017: 125-134 - [c40]Asma Lahbib, Khalifa Toumi, Sameh Elleuch, Anis Laouiti, Steven Martin:
Link reliable and trust aware RPL routing protocol for Internet of Things. NCA 2017: 235-240 - [c39]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti, Leïla Azouz Saïdane:
TDMA-Aware Routing Protocol for Multi-Hop Communications in Vehicular Ad Hoc Networks. WCNC 2017: 1-6 - 2016
- [c38]Ichrak Amdouni, Fatma Hrizi, Anis Laouiti, Eduard Grasa, Hakima Chaouchi:
Exploring the flexibility of network access control in the recursive InterNetwork Architecture. APCC 2016: 559-566 - [c37]Ines Khoufi, Pascale Minet, Anis Laouiti:
OA-DVFA: A Distributed Virtual Forces-based Algorithm to monitor an area with unknown obstacles. CCNC 2016: 1036-1041 - [c36]Ines Khoufi, Pascale Minet, Anis Laouiti:
Fault-Tolerant and Constrained Relay Node Placement in Wireless Sensor Networks. MASS 2016: 127-135 - [c35]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti, Leïla Azouz Saïdane:
A centralized TDMA based scheduling algorithm for real-time communications in vehicular ad hoc networks. SoftCOM 2016: 1-6 - [c34]Mohamed Hadded, Anis Laouiti, Paul Mühlethaler, Leïla Azouz Saïdane:
An Infrastructure-Free Slot Assignment Algorithm for Reliable Broadcast of Periodic Messages in Vehicular Ad Hoc Networks. VTC Fall 2016: 1-7 - 2015
- [j6]Mohamed Hadded, Paul Mühlethaler, Anis Laouiti, Rachid Zagrouba, Leïla Azouz Saïdane:
TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues. IEEE Commun. Surv. Tutorials 17(4): 2461-2492 (2015) - [j5]Ines Khoufi, Saoucene Mahfoudh, Pascale Minet, Anis Laouiti:
Data gathering architecture for temporary worksites based on a uniform deployment of wireless sensors. Int. J. Sens. Networks 18(1/2): 3-21 (2015) - [c33]Mohamed Hadded, Rachid Zagrouba, Anis Laouiti, Paul Mühlethaler, Leïla Azouz Saïdane:
A multi-objective genetic algorithm-based Adaptive Weighted Clustering Protocol in VANET. CEC 2015: 994-1002 - [c32]Hamssa Hasrouny, Carole Bassil, Abed Ellatif Samhat, Anis Laouiti:
Group-based authentication in V2V communications. DICTAP 2015: 173-177 - [c31]Mohamed Hadded, Paul Mühlethaler, Rachid Zagrouba, Anis Laouiti, Leïla Azouz Saïdane:
Using road IDs to enhance clustering in vehicular ad hoc networks. IWCMC 2015: 285-290 - [c30]Fatma Hrizi, Anis Laouiti, Hakima Chaouchi:
SFR: Scalable forwarding with RINA for distributed clouds. NOF 2015: 1-6 - [c29]Ines Khoufi, Mohamed Hadded, Pascale Minet, Anis Laouiti:
Optimized trajectories of multi-robot deploying wireless sensor nodes. WiMob 2015: 724-731 - [i2]Fatma Marzouk, Rachid Zagrouba, Anis Laouiti, Paul Mühlethaler:
An empirical study of Unfairness and Oscillation in ETSI DCC. CoRR abs/1510.01125 (2015) - 2014
- [c28]Pinar Kirci, Hakima Chaouchi, Anis Laouiti:
Wireless Sensor Networks and Efficient Localisation. FiCloud 2014: 98-100 - [c27]Pinar Kirci, Hakima Chaouchi, Anis Laouiti:
Cluster-based protocol structures in WSNs. IWSSIP 2014: 183-186 - [c26]Ines Khoufi, Pascale Minet, Anis Laouiti, Erwan Livolant:
A simple method for the deployment of wireless sensors to ensure full coverage of an irregular area with obstacles. MSWiM 2014: 203-210 - [c25]Ines Khoufi, Anis Laouiti, Bachar Wehbi:
TAR Channel Access Mechanism: A Study of a Highway Ramp Car Merge Case. NTMS 2014: 1-5 - [c24]Ahmed Amari, Nadjib Achir, Paul Mühlethaler, Anis Laouiti:
Optimized broadcast scheme for mobile ad hoc networks. WCNC 2014: 2594-2598 - [c23]Saoucene Mahfoudh, Ines Khoufi, Pascale Minet, Anis Laouiti:
GDVFA: A distributed algorithm based on grid and virtual forces for the redeployment of WSNs. WCNC 2014: 3040-3045 - [c22]Ines Khoufi, Erwan Livolant, Pascale Minet, Mohamed Hadded, Anis Laouiti:
Optimized trajectory of a robot deploying wireless sensor nodes. Wireless Days 2014: 1-6 - 2013
- [c21]Saoucene Mahfoudh, Ines Khoufi, Pascale Minet, Anis Laouiti:
Relocation of mobile wireless sensors in the presence of obstacles. ICT 2013: 1-5 - [e3]Saadi Boudjit, Anis Laouiti:
Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare, MobileHealth@MobiHoc 2013, Bangalore, India, July 29 - August 1, 2013. ACM 2013, ISBN 978-1-4503-2207-2 [contents] - 2012
- [c20]Khalil Mougou, Saoucene Mahfoudh, Pascale Minet, Anis Laouiti:
Redeployment of Randomly Deployed Wireless Mobile Sensor Nodes. VTC Fall 2012: 1-5 - [c19]Afef Sayadi, Saoucene Mahfoudh, Anis Laouiti:
Sensor-OSTR: Novel energy-efficient dynamic TDMA frame size-based MAC protocol for wireless multi-hop sensor networks. Wireless Days 2012: 1-3 - [c18]Saoucene Mahfoudh, Pascale Minet, Anis Laouiti:
Overview of Deployment and Redeployment Algorithms for Mobile Wireless Sensor Networks. ANT/MobiWIS 2012: 946-951 - [e2]Saadi Boudjit, Anis Laouiti:
Proceedings of the 2nd ACM international workshop on Pervasive Wireless Healthcare, MobileHealth@MobiHoc 2012, Hilton Head, SC, USA, June 11-14, 2012. ACM 2012, ISBN 978-1-4503-1292-9 [contents] - 2011
- [c17]Afef Sayadi, Bachar Wehbi, Anis Laouiti:
One Shot Slot TDMA-Based Reservation MAC Protocol for Wireless Ad Hoc Networks. VTC Spring 2011: 1-5 - [e1]Saadi Boudjit, Anis Laouiti:
Proceedings of the First ACM MobiHoc Workshop on Pervasive Wireless Healthcare, MobileHealth@MobiHoc 2011, Paris, France, May 16-20, 2011. ACM 2011, ISBN 978-1-4503-0780-2 [contents] - 2010
- [c16]Bachar Wehbi, Anis Laouiti, Ana R. Cavalli:
Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks. WCNC 2010: 1-6
2000 – 2009
- 2009
- [c15]Nobal B. Niraula, Kanchana Kanchanasut, Anis Laouiti:
Peer-to-peer live video streaming over mobile ad hoc network. IWCMC 2009: 1045-1050 - [c14]Foued Kribi, Pascale Minet, Anis Laouiti:
Redeploying mobile wireless sensor networks with virtual forces. Wireless Days 2009: 1-6 - [p1]Pascale Minet, Anis Laouiti:
Multicasting in Mobile Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 97-120 - 2008
- [j4]Georgios Rodolakis, Anis Laouiti, Philippe Jacquet, Amina Meraihi Naimi:
Multicast overlay spanning trees in ad hoc networks: Capacity bounds, protocol design and performance evaluation. Comput. Commun. 31(7): 1400-1412 (2008) - [j3]Yasser Toor, Paul Mühlethaler, Anis Laouiti, Arnaud de La Fortelle:
Vehicle ad hoc networks: Applications and related technical issues. IEEE Commun. Surv. Tutorials 10(1-4): 74-88 (2008) - [c13]Kanchana Kanchanasut, Thirapon Wongsaardsakul, Manutsiri Chansutthirangkool, Anis Laouiti, Hajime Tazaki, Khandakar Rashedul Arefin:
DUMBO II: a V-2-I emergency network. AINTEC 2008: 37-38 - [c12]Bachar Wehbi, Anis Laouiti, Ana R. Cavalli:
A Reactive Wireless Mesh Network Architecture. Med-Hoc-Net 2008: 203-214 - [c11]Bachar Wehbi, Anis Laouiti, Ana R. Cavalli:
Efficient time synchronization mechanism for wireless multi hop networks. PIMRC 2008: 1-6 - [c10]Anis Laouiti, Paul Mühlethaler, Farid Sayah, Yasser Toor:
Quantitative Evaluation of the Cost of Routing Protocol OLSR in a Vehicle Ad Hoc NETwork (VANET). VTC Spring 2008: 2986-2990 - 2007
- [j2]Saadi Boudjit, Cédric Adjih, Paul Mühlethaler, Anis Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR. J. Univers. Comput. Sci. 13(1): 4-31 (2007) - [c9]Georgios Rodolakis, Cédric Adjih, Anis Laouiti, Saadi Boudjit:
Quality-of-Service Multicast Overlay Spanning Tree Algorithms for Wireless Ad Hoc Networks. AINTEC 2007: 226-241 - [c8]Georgios Rodolakis, Amina Meraihi Naimi, Anis Laouiti:
Multicast Overlay Spanning Tree Protocol for Ad Hoc Networks. WWIC 2007: 290-301 - 2006
- [c7]Laurent Bouraoui, Stéphane Petti, Anis Laouiti, Thierry Fraichard, Michel Parent:
Cybercar Cooperation for Safe Intersections. ITSC 2006: 456-461 - [i1]Raghav Bhaskar, Paul Mühlethaler, Daniel Augot, Cédric Adjih, Saadi Boudjit, Anis Laouiti:
Efficient and Dynamic Group Key Agreement in Ad hoc Networks. CoRR abs/cs/0611027 (2006) - 2005
- [j1]Thierry Plesse, Cédric Adjih, Pascale Minet, Anis Laouiti, Adokoé Plakoo, Marc Badel, Paul Mühlethaler, Philippe Jacquet, Jérôme Lecomte:
OLSR performance measurement in a military mobile ad hoc network. Ad Hoc Networks 3(5): 575-588 (2005) - [c6]Saadi Boudjit, Cédric Adjih, Anis Laouiti, Paul Mühlethaler:
A Duplicate Address Detection and Autoconfiguration Mechanism for a Single-Interface OLSR Network. AINTEC 2005: 128-142 - [c5]Laurent Bouraoui, Arnaud de La Fortelle, Anis Laouiti:
OLSR Improvement for Distributed Traffic Applications. Med-Hoc-Net 2005: 73-77 - [c4]Saadi Boudjit, Anis Laouiti, Paul Mühlethaler, Cédric Adjih:
Duplicate Address Detection and Autoconfiguration in OLSR. SNPD 2005: 403-410 - 2003
- [c3]Thierry Plesse, Jérôme Lecomte, Cédric Adjih, Marc Badel, Philippe Jacquet, Anis Laouiti, Pascale Minet, Paul Mühlethaler, Adokoé Plakoo:
Olsr Routing for Military Ad-Hoc Networks. MWCN 2003 - 2002
- [c2]Amir Qayyum, Laurent Viennot, Anis Laouiti:
Multipoint Relaying for Flooding Broadcast Messages in Mobile Wireless Networks. HICSS 2002: 298 - [c1]Philippe Jacquet, Anis Laouiti, Pascale Minet, Laurent Viennot:
Performance of Multipoint Relaying in Ad Hoc Mobile Routing Protocols. NETWORKING 2002: 387-398
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 23:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint