default search action
Ahmed Al-Maashri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Nesrine Abid, Ahmed Chiheb Ammari, Ahmed Al-Maashri, Mohamed Abid, Medhat Awadalla:
Accelerated and optimized covariance descriptor for pedestrian detection in self-driving cars. Des. Autom. Embed. Syst. 27(3): 139-163 (2023) - [j8]Manar Aldaoud, Dawood Al-Abri, Ahmed Al-Maashri, Firdous Kausar:
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach. J. Comput. Virol. Hacking Tech. 19(4): 597-614 (2023) - 2021
- [j7]Manar Aldaoud, Dawood Al-Abri, Ahmed Al-Maashri, Firdous Kausar:
DHCP attacking tools: an analysis. J. Comput. Virol. Hacking Tech. 17(2): 119-129 (2021) - 2020
- [j6]Abdul Aziz Al Abri, Ahmed Al-Maashri, Mohamed Ould-Khaoua, Hadj Bourdoucen:
Game-theoretic modeling of the behavior of Domain Name System attacker. Comput. Electr. Eng. 87: 106801 (2020)
2010 – 2019
- 2019
- [j5]Iman Al-Kindi, Dawood Al-Abri, Ahmed Al-Maashri, Fahad Bait Shiginah:
Analysis of malware propagation behavior in Social Internet of Things. Int. J. Commun. Syst. 32(15) (2019) - 2015
- [c12]Shaima M. Shakeel, Mohamed Ould-Khaoua, Osama M. Hussain Rehman, Ahmed Al-Maashri, Hadj Bourdoucen:
Experimental Evaluation of Safety Beacons Dissemination in VANETs. FNC/MobiSPC 2015: 618-623 - 2013
- [j4]Ahmed Al-Maashri, Matthew Cotter, Nandhini Chandramoorthy, Michael DeBole, Chi-Li Yu, Vijaykrishnan Narayanan, Chaitali Chakrabarti:
Hardware Acceleration for Neuromorphic Vision Algorithms. J. Signal Process. Syst. 70(2): 163-175 (2013) - [c11]Sungho Park, Ahmed Al-Maashri, Yang Xiao, Kevin M. Irick, Vijaykrishnan Narayanan:
Saliency-driven dynamic configuration of HMAX for energy-efficient multi-object recognition. ISVLSI 2013: 139-144 - 2012
- [j3]Sungho Park, Ahmed Al-Maashri, Kevin M. Irick, Aarti Chandrashekhar, Matthew Cotter, Nandhini Chandramoorthy, Michael DeBole, Vijaykrishnan Narayanan:
System-On-Chip for Biologically Inspired Vision Applications. Inf. Media Technol. 7(4): 1294-1318 (2012) - [j2]Sungho Park, Ahmed Al-Maashri, Kevin M. Irick, Aarti Chandrashekhar, Matthew Cotter, Nandhini Chandramoorthy, Michael DeBole, Vijaykrishnan Narayanan:
System-On-Chip for Biologically Inspired Vision Applications. IPSJ Trans. Syst. LSI Des. Methodol. 5: 71-95 (2012) - [c10]Ahmed Al-Maashri, Michael DeBole, Matthew Cotter, Nandhini Chandramoorthy, Yang Xiao, Vijaykrishnan Narayanan, Chaitali Chakrabarti:
Accelerating neuromorphic vision algorithms for recognition. DAC 2012: 579-584 - 2011
- [c9]Michael DeBole, Yang Xiao, Chi-Li Yu, Ahmed Al-Maashri, Matthew Cotter, Chaitali Chakrabarti, Vijaykrishnan Narayanan:
FPGA-accelerator system for computing biologically inspired feature extraction models. ACSCC 2011: 751-755 - [c8]Srinidhi Kestur, Kevin M. Irick, Sungho Park, Ahmed Al-Maashri, Vijaykrishnan Narayanan, Chaitali Chakrabarti:
An algorithm-architecture co-design framework for gridding reconstruction using FPGAs. DAC 2011: 585-590 - [c7]Michael DeBole, Ahmed Al-Maashri, Matthew Cotter, Chi-Li Yu, Chaitali Chakrabarti, Vijaykrishnan Narayanan:
A framework for accelerating neuromorphic-vision algorithms on FPGAs. ICCAD 2011: 810-813 - [c6]Ahmed Al-Maashri, Michael DeBole, Chi-Li Yu, Vijaykrishnan Narayanan, Chaitali Chakrabarti:
A hardware architecture for accelerating neuromorphic vision algorithms. SiPS 2011: 355-360 - [p1]Ahmed Al-Maashri, Guangyu Sun, Xiangyu Dong, Yuan Xie, Narayanan Vijaykrishnan:
Influence of Stacked 3D Memory/Cache Architectures on GPUs. 3D Integration for NoC-based SoC Architectures 2011: 249-271 - 2010
- [c5]Vijaykrishnan Narayanan, Ahmed Al-Maashri, Kevin M. Irick, Michael DeBole, Sungho Park:
AutoFLEX: A Framework for Image Processing Applications on Multiple-FPGA Systems. ERSA 2010: 59-66 - [c4]Vikram Sampath Kumar, Kevin M. Irick, Ahmed Al-Maashri, Narayanan Vijaykrishnan:
A Scalable Bandwidth Aware Architecture for Connected Component Labeling. ISVLSI 2010: 116-121 - [c3]Vikram Sampath Kumar, Kevin M. Irick, Ahmed Al-Maashri, Vijaykrishnan Narayanan:
A Scalable Bandwidth-Aware Architecture for Connected Component Labeling. ISVLSI (Selected papers) 2010: 133-149
2000 – 2009
- 2009
- [c2]Ahmed Al-Maashri, Guangyu Sun, Xiangyu Dong, Vijay Narayanan, Yuan Xie:
3D GPU architecture using cache stacking: Performance, cost, power and thermal analysis. ICCD 2009: 254-259 - 2008
- [j1]Afaq Ahmad, Ahmed Al-Maashri:
Investigating some special sequence lengths generated in an external exclusive-NOR type LFSR. Comput. Electr. Eng. 34(4): 270-280 (2008) - 2006
- [c1]Ahmed Al-Maashri, Mohamed Ould-Khaoua:
Performance Analysis of MANET Routing Protocols in the Presence of Self-Similar Traffic. LCN 2006: 801-807
Coauthor Index
aka: Vijaykrishnan Narayanan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint