Jemal Hussien
Jemal Hussien
Full Professor, Deakin University, Australia
Verified email at deakin.edu.au - Homepage
TitleCited byYear
Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing
A Beloglazov, J Abawajy, R Buyya
Future generation computer systems 28 (5), 755-768, 2012
24322012
Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges
R Buyya, A Beloglazov, J Abawajy
arXiv preprint arXiv:1006.0308, 2010
6722010
Fault-tolerant scheduling policy for grid computing systems
JH Abawajy
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
1942004
User preference of cyber security awareness delivery methods
J Abawajy
Behaviour & Information Technology 33 (3), 237-248, 2014
1772014
Failure-aware resource provisioning for hybrid Cloud infrastructure
B Javadi, J Abawajy, R Buyya
Journal of parallel and distributed computing 72 (10), 1318-1331, 2012
1592012
Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study
E Baccarelli, PGV Naranjo, M Scarpiniti, M Shojafar, JH Abawajy
IEEE access 5, 9882-9910, 2017
1562017
A rough set approach for selecting clustering attribute
T Herawan, MM Deris, JH Abawajy
Knowledge-Based Systems 23 (3), 220-231, 2010
1452010
Federated internet of things and cloud computing pervasive patient health monitoring system
JH Abawajy, MM Hassan
IEEE Communications Magazine 55 (1), 48-53, 2017
1162017
A multi-tier phishing detection and filtering approach
R Islam, J Abawajy
Journal of Network and Computer Applications 36 (1), 324-335, 2013
1092013
Determining service trustworthiness in intercloud computing environments
J Abawajy
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1002009
Power graphs: A survey
J Abawajy, A Kelarev, M Chowdhury
Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013
962013
An efficient replicated data access approach for large-scale distributed systems
MM Deris, JH Abawajy, A Mamat
Future Generation Computer Systems 24 (1), 1-9, 2008
892008
A layered security approach for cloud computing infrastructure
M Yildiz, J Abawajy, T Ercan, A Bernoth
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
852009
Parallel job scheduling on multicluster computing systems
JH Abawajy, SP Dandamudi
null, 11, 2003
852003
Big data in complex systems
AE Hassanien, AT Azar, V Snasael, J Kacprzyk, JH Abawajy
SBD 9, 2015
812015
Establishing trust in hybrid cloud computing environments
J Abawajy
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
692011
Placement of file replicas in data grid environments
JH Abawajy
International conference on computational science, 66-73, 2004
682004
An Approach to Support a Single Service Provider Address Image for Wide Area Networks Environment
JH Abawajy
Proceedings International Conference on Parallel Computing in Electrical …, 2000
672000
A data fusion method in wireless sensor networks
D Izadi, JH Abawajy, S Ghanavati, T Herawan
Sensors 15 (2), 2964-2979, 2015
652015
Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems
NR Sabar, J Abawajy, J Yearwood
IEEE Transactions on Evolutionary Computation 21 (2), 315-327, 2016
642016
The system can't perform the operation now. Try again later.
Articles 1–20