Can you get consultants to update their CV more often by asking them how they are doing?: A design study on how behavior changing design can impact consultant CV writing A Forsberg KTH Royal Institute of Technology, 2023 | | 2023 |
Energy Consumption of Micro Frontends: A comparison of micro frontends and single-page applications M Tennander KTH Royal Institute of Technology, 2023 | | 2023 |
Investigating differences in performance between monolithic and serverless based architectures J Manousian KTH Royal Institute of Technology, 2022 | | 2022 |
A performance evaluation of concurrent programming with the Swift actor model A Diaz KTH Royal Institute of Technology, 2022 | | 2022 |
Design of an algorithm for edge-node resource orchestration within an Operator Platform S Olander Ålund KTH Royal Institute of Technology, 2022 | | 2022 |
Visualizing issue tracking data using a process mining tool to support the agile maturity assessment within the Scaled Agile Framework: A case study O Hovmark KTH Royal Institute of Technology, 2022 | | 2022 |
Improve game performance tracking tools: Heatmap as a tool N Wessman KTH Royal Institute of Technology, 2022 | | 2022 |
Evaluation of Rust and WebAssembly when building a Progressive Web Application: An analysis of performance and memory usage NT Asegehegn KTH Royal Institute of Technology, 2022 | 1 | 2022 |
Deep Learning for Predicting Electrical Power in 5G R Mellberg KTH Royal Institute of Technology, 2022 | 1 | 2022 |
Cybersecurity in the technology subject from the Swedish perspective: investigation, analysis, and evaluation tool W Mushtaq | 2 | 2020 |
A Novel VOBE Framework for Road Safety Management H Mahmud, WAH Alsalihy International Journal of Multidisciplinary and Current Research (IJMCR) 3 …, 2015 | | 2015 |
Enhancement of Redundant Reader Elimination by Using Hybrid Algorithm in RFID Systems WAH Alsalihy, NA Askar Wireless personal communications 72 (2), 1139-1156, 2013 | 9 | 2013 |
Integrating Identity-based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6 WAH Alsalihy, MS Alsayfi Wireless personal communications 68 (3), 655-669, 2013 | 15 | 2013 |
Message Broadcasting Protocols in VANET G Samara, WAH Alsalihy Information Technology Journal 11 (9), 1235-1242, 2012 | 21 | 2012 |
A New Security Mechanism for Vehicular Communication Networks G Samara, WAHA Alsalihy Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 …, 2012 | 32 | 2012 |
Security Verification of the Return Routability Protocol by Murphi WAH Alsalihy, MI Younis Scientific Research and Essays (SRE) 7 (21), 1986-1996, 2012 | 1 | 2012 |
Online Manuscript Access EI Kareem, WAH Alsalihy, A Jantan | | 2012 |
A New Fair Load Balancing Method for Multiple Component Carriers in 3GPP LTE-Advanced System SA Alomari, WAHA Alsalihy, MA Al-Madi, P Sumari | | 2012 |
Multi-Connect Architecture (MCA) associative memory: A modified hopfield neural network EIA Kareem, WAHA Alsalihy, A Jantan Intelligent Automation & Soft Computing 18 (3), 279-296, 2012 | 14 | 2012 |
A Study on Pre-4 G(LTE and WiMAX) Protocols towards 4 G-ITU Requirements MAQ Al-Madi, WAHA Alsalihy International Journal of Advancements in Computing Technology 4 (13), 2012 | 5 | 2012 |