How much redundancy does a network need to survive network element failures?
Chadi Assi
- Concordia University Research Chair in Technologies and Trends for Future Cellular Networks
- Professor
- Concordia Institute for Information Systems Engineering
- wireless networks19
- network design2
- network optimization4
- network performance evaluation4
- smart grids11
- mobile ad hoc networks11
- cloud computing17
- cloud networks2
- 5G networks5
- metro ethernet
- data centres2
- ICT29
- internet of things (IoT)17
- cyberphysical systems12
- optical networks3
- communication protocols8
- information systems security12
- network resource allocation3
- quality management8
- data security7
-
J. William Atwood
autonomic networking, multicast, communication protocols
-
Roch Glitho
end-user services architectures, virtualization, cloud computing
-
Sandra Céspedes
wireless networks, internet of things (IoT), vehicular networking
-
Walaa Hamouda
wireless communications, compressed sensing, channel coding
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Abdelhak Bentaleb
multimedia systems and communication, video streaming architecture, access networks
-
Lingyu Wang
network security, privacy, security metrics
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Ferhat Khendek
software engineering, ICT, service engineering
-
Lata Narayanan
networks, algorithm design, robotics
-
Rodolfo W. L. Coutinho
internet of underwater things (IoUT), internet of things (IoT), edge computing
-
Jun Yan
smart grids, cyberphysical security, machine learning
-
Dongyu Qiu
networks, network performance evaluation, wireless networks
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Jun Cai
machine learning, distributed/parallel systems, energy efficiency
-
Mourad Debbabi
information systems security, cyberphysical systems, smart grids
-
Walter Lucia
cyberphysical systems, predictive control, fault-tolerant control
-
Brigitte Jaumard
autonomic networking, graph theory, operations research
-
Mohammad Mannan
anti-surveillance tools, web authentication, trusted computing
-
Arash Mohammadi
signal processing, information systems security, cyberphysical systems
-
Olga Ormandjieva
empirical software engineering, software metrics, category theory
-
Jeremy Clark
cryptography, blockchain, cryptocurrency
-
Jamal Bentahar
software agents, multi-agent systems, formal logic
-
Yousef R. Shayan
wireless communications, MIMO wireless, wireless networks
-
M. N. S. Swamy
image processing, video signal processing, statistical signal processing
-
Mohsen Ghafouri
cyberphysical security, power systems control, smart infrastructures
-
Amir G. Aghdam
adaptive control, decentralized large-scale systems, control systems
-
Claudio Contardo
large scale optimization, operations research, logistics planning
-
Jia Yuan Yu
data science, decision theory, machine learning
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
M. Reza Soleymani
wireless networks, ICT, cognitive radio networks
-
Wei-Ping Zhu
signal processing, speech processing, image processing
-
John Xiupu Zhang
quantum dot lasers, InP broadband photodetectors, radio over fibre
-
Paula Lago
healthcare information systems, ubiquitous and pervasive computing, internet of things (IoT)