scispace - formally typeset
I

Imad Aad

Researcher at Nokia

Publications -  80
Citations -  4492

Imad Aad is an academic researcher from Nokia. The author has contributed to research in topics: IEEE 802.11 & Wireless network. The author has an hindex of 28, co-authored 80 publications receiving 4394 citations. Previous affiliations of Imad Aad include NTT DoCoMo & French Institute for Research in Computer Science and Automation.

Papers
More filters
Proceedings ArticleDOI

Differentiation mechanisms for IEEE 802.11

TL;DR: This work presents three service differentiation schemes for IEEE 802.11 based on scaling the contention window according to the priority of each flow or user, and simulates and analyzes the performance of each scheme with TCP and UDP flows.

The Mobile Data Challenge: Big Data for Mobile Computing Research

TL;DR: An overview of the Mobile Data Challenge (MDC), a large-scale research initiative aimed at generating innovations around smartphone-based research, as well as community-based evaluation of related mobile data analysis methodologies, is presented.
Journal ArticleDOI

Eviction of Misbehaving and Faulty Nodes in Vehicular Networks

TL;DR: This paper proposes protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system, and shows that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.
Proceedings ArticleDOI

On selfish behavior in CSMA/CA networks

TL;DR: A game-theoretic approach is used to investigate the problem of the selfish behavior of nodes in CSMA/CA networks, and a simple, localized and distributed protocol is developed that successfully guides multiple selfish nodes to a Pareto-optimal Nash equilibrium.
Proceedings ArticleDOI

Denial of service resilience in ad hoc networks

TL;DR: This paper design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause, and quantifies via simulations and analytical modeling the scalability of doS attacks as a function of key performance parameters such as mobility, system size, node density, and counter-DoS strategy.