Publications & Presentations

Rayes, Ammar

Publications & Presentations

Books:

  1. Book: “Internet of Things From Hype to Reality” A. Rayes & S. Salam, Springer, ISBN-10:3319448587, October 2016, http://www.springer.com/us/book/9783319448589#aboutBook
  2. Book: "Network Modeling and Simulation: A Practical Perspective,", M. Guizani, A. Rayes, B.Khan, and A. Al-Fuqaha, John Wiley & Sons, 2010.  http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470035870.html
  3. Book: “Designing ATM Switching Networks”, M. Guizani &  A. Rayes, ,” McGraw Hill, ISBN 0-07-025217-3, http://www.allbookstores.com/author/Ammar_Rayes.html
  4. Book Chapter: “IP-Based Smart Services”, A. Rayes, Network Embedded Management and Applications, Springer, 2012, http://www.springer.com/engineering/signals/book/978-1-4419-6768-8,
  5. Book Chapter: "Service Provisioning and Survivability in Multi-Domain Optical Networks”, N. Ghani, M. Peng and A. Rayes, http://link.springer.com/chapter/10.1007/978-1-4614-1093-5_13 , Springer, 2011.

Patents:

  1. “Systems and methods for network inventory management utilizing mobile technology II”, U.S. Patent No. 9,123,017, issued on Sep 1, 2015, http://patft.uspto.gov/
  2.  “Method and apparatus for entitled data transfer over the public internet,  U.S. Patent No. 8,612,751, issued on Dec 17, 2013, http://patft.uspto.gov/
  3. “Systems and methods for network inventory management utilizing mobile technology I”, U.S. Patent No. 8,584,942, issued on Nov 19, 2013, http://www.google.com/patents/US8584942
  4. Routing and Analyzing Business-to-Business Service Requests,”  U.S. Patent Application No. 9,106,516, Allowed on August 11, 2015. http://patft.uspto.gov/
  5.  “System and method for providing a script-based collection for devices in a network environment”, U.S. Patent No. 8,589,544, issued on Nov 19, 2013, http://patft.uspto.gov/
  6. Topology-aware attack mitigation”,  U.S. Patent No. 8,261,355, issued on Sep 4, 2012, http://patft.uspto.gov/
  7. System and method for providing a script-based collection for devices in a network environment II”,  U.S. Patent No. 8,332,511, issued on Dec 11, 2012, http://patft.uspto.gov/
  8. "Method and Apparatus for Measuring the Availability of a Network Element or Service,”  U.S. Patent No. 7,620,714, Issued on Novermber 17, 2009, http://patft.uspto.gov/
  9. Data Privacy for Smart Services”, U.S. Patent Application No. CPOL 974591, Issued on July 5,  2011.
  10.  “Isolation Approach for Network Users Associated with Elevated “Isolation Approach for Network Users Associated with Elevated Risk,”   U.S. Patent No. 7,607,021, Issued on October 20, 2009, http://patft.uspto.gov/
  11. Approach for determining the real time availability of a group of network elements,”  U.S. Patent No. 7,974,216, Issued on July 3, 2011, http://patft.uspto.gov/
  12. “Link Sizing using Joint Consideration of User Behavior and Traffic Characteristics,” U.S.  Patent No. US 7,492,711, Issued on February 17, 2009, http://patft.uspto.gov/
  13. “Policy-Based Security Management Controller,”  U.S. Patent No. 7,237,267, Issued on June 26, 2007, http://patft.uspto.gov/
  14. “Method and Apparatus for Preventing Spoofing of Network Addresses,” U.S. Patent No. 7,234,163, Issued on June 19, 2007, http://patft.uspto.gov/
  15. “Method and system for Re-establishing Communication Link in a Network by Using Viral Communication”,  U.S. Patent 7,151,884, Issued on December 19, 2006, http://patft.uspto.gov/
  16. “Method of Estimating Call Level Traffic Intensity Based on Channel Link Measurements,” U.S. Patent No. 6,560,204,  Issued on May 6, 2003, http://patft.uspto.gov/
  17. “Network Designer for Communication Networks,” U.S. Patent No. 5,787,161, 19 claims, Issued on July 28, 1998, http://patft.uspto.gov/
  18. “IPTV Subscriber and Security Management”,U.S. Patent Application US20080060026 A1,  Filed on August 29, 2006.
  19. Method and Apparatus for Smart Services Big Data Structuring”, U.S. Patent Application No. CPOL 992831/0370.1761C, filed on March 7, 2014.
  20. Automatic creation and management of a "community of things", for IoT App Enablement”,  U.S. Patent Application No. CPOL 992628/0370.1768C, filed on July 14, 2014.
  21. Mapping Occupancy/Utilization of Physical Resources Based on Energy Data”,  CPOL 997068, Filed on Sep 10, 2015.
  22. “Enhanced Cloud Demand Prediction for Smart Data Centers”,  CPOL 956802, filed on Sep 28, 2015. 
  23. “Auto Generation of Intellectual Capital Using Advanced Enterprise Ontology”, CPOL 999902, Published on September 16, 2015.
  24. “Smart Energy Management in Data Centers”, CPOL 1001065.

 

Selected Refereed Journal Papers:

  1. "Advanced Security Management in Metro Ethernet Networks," TheInternational Journal of Network Management,January2010, Volume 2. Number 1, pp. 65-80, http://airccse.org/journal/nsa/1010s6.pdf.
  2. "Multi-domain restoration with crankback in IP/MPLS networks," Optical Switching and Networking Journal Management, August 2010, with F. Xua, M. Pengb, M. Esmaeili, and N. Ghan.
  3. “Traffic Grooming, Routing, and Wavelength Assignment in WDM Transport Networks with Sparse Grooming Resources”, ComputerCommunications Journal, March 2007, with O. Awwad, A. Al-Fuqaha,  and  W. Alanqar, http://www.sciencedirect.com/science.
  4. “Opportunistic Channel Selection Strategy for Better QoS in Cooperative Networks with Cognitive Radio Capabilities”, IEEEJOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26,NO. 1, JANUARY 2008, PP 156-167, A. Al-Fuqaha, B. Khan, M. Guizani, O. Awwad, and G. Ben Brahim, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4413148&isnumber=4413132
  5. "A novel steady-state genetic algorithm approach to the reliability optimization design problem of computer networks,"InternationalJournal of Network Management, Volume 19 ,  Issue 1, January 2009, Pages 39-55, with H. M. Alazemi and A. M. Mutawa, http://portal.acm.org/citation.cfm?id=1498629, .
  6. "Operation Management of IP Broadband Access Networks," Computer Communications Journal, Volume 26, Issue 7, Pages 679-690, May 2003.
  7. “Link Sizing for Multi-Media Traffic Transported Over IP,” Cluster Computing: The Journal of Networks, software Tools andApplications, Special Issue on “Internet Scalability: Advances in Parallel, Distributed, and Mobile Systems,” Vol. 4, No. 4, October 2001, with M. Guizani, and A. I. Alfuqaha.
  8. "Application of Shadow Price in Capacity Expansion of State- Dependent Routing," Journal of Network and Systems Management, Vol. 4, No. 1, March 1996, with P. Min.
  9. "Estimation of Exogenous Traffic Based on Link Measurements," IEEETransactions on Communications, Vol. 43, No. 8,  pp. 2381-2390, August 1995, with M. Hegde and P. Min.
  10. “Analysis of Routing Policies in Broadband Networks," IEEE Journal onElectrical and Computer Engineering,  Vol. 20, No. 3, pp. 125-136, August, 1995, with A. Mandure and P. Min.
  11. “State-Dependent Routing: Traffic Dynamics  and Performance Benefits," Journal of Network and Systems Management, Vol. 2,  No. 2, pp. 125-149,  June 1994, with M. Hegde and P. Min.
  12. “Capacity Expansion uses Joint Consideration of User Behavior and Traffic Characteristics,” submitted to the International Journal ofInternet Protocol Technology,Special Issue on "Management of IP Networks and Services".
  13. “Joint Considration of User and Packet Behavior for Capacity Analysis of Wireless Networks", submited to appear in the Journal of WirelessCommunications and Mobile Computing Journal, with M. Cheung.
  14. “Distributed Topology Control in Large-Scale Hybrid RF/FSO Networks: SIMT GPU-Based Particle Swarm Optimization Approach", submited to appear in the International Journal of CommunicationSystems, with O. Awwad, A. Fuqaha, G. Ben-Brahim, and B. Khan.

 

Selected Refereed Conference Papers:

  1. "Prediction of Performance Degradation in Telecommunication Networks Using Joint," IEEE 2010 International Workshop on
    Management of Emerging Networks and Services
    , with a. Al-Fuqaha, D. Kountanis, H. Abed, A. Kamel, and R. Salih.
  2. “Intelligent Service Monitoring and Support,” Accepted for publication, IEEE ICC 2009 Conference, with A. Al-Fuqaha, M. Guizani, and D. Kountanis.
  3. "Topology-aware Attack Mitigation in Large Enterprise Networks" Accepted for publication, International ICST Conference onSecurity and Privacy, with Z. Qian, Z.M. Moe, and D. Jeffe.
  4. “Performance of WDM Mesh Networks with Limited Traffic Grooming Resources,” IEEE WOCN 2007, Singapore, July 2-4, 2007, with O. Awwad and Ala Al-Fuqaha, http://ieeexplore.ieee.org/xpl/RecentCon.jsp?punumber=4284119
  5. “Using Energy-Efficient Overlays to Reduce Packet Error Rates in Wireless Ad-Hoc Networks,” IEEE ICC 2006, Istanbul, Turkey, June 10-15, 2006, with G. Ben Brahim, B. Khan, M. Guizani.
  6. “Autonomous systems and self management - hype or reality?” The First International Conference on Digital Telecommunications , July 6, 2006 - Silicon Valley, USA
  7. “Link Sizing using Joint Consideration of User Behavior and Traffic Characteristics,” Proceedings of the 4th Generation Mobile Forum, July 2005, San Diego, CA, USA, with Michael Cheung.
  8. "Applying a service-on-demand policy management framework to an ETTx environment," IEEE/IFIP Network Operations and Management Symposium 2004, pp. 101-114, with M. Cheung, A. Clemm, and G. Lin, http://dblp.uni-trier.de/search/author?author=ammar+rayes
  9.  “Security Management in IP Metro Ethernet / ETTx Networks,” Proceedings of the 19thInternational Conference on Securityand Management, vol. 1, pp. 183-189, June 2004, Las Vegas, Nevada, USA, with Michael Cheung.
  10. “Capacity Expansion using Joint Consideration of User Behavior and Traffic Characteristics,” Proceedings of the 6th World WirelessCongress, May 2005, Palo Alto, CA, USA, with Michael Cheung.
  11.  “Intrusion Detection and Prevention in IP Metro Ethernet / ETTx Networks,” Proceedings of the 20thInternational Conference onSecurity and Management, pp. 75-79, June 2003, Las Vegas, Nevada, USA, with Michael Cheung.
  12. “Managing Ethernet-to-the-Home Networks,” Global OSS, Orlando, Florida, March 2002.
  13. “Common Management Architecture for Third Generation IP-based Wireless Networks,” IEEE Wireless Communications andNetworking Conference (WCN-2000), Chicago, Illinois, September 2000.
  14. “Operations and Management of GPRS Wireless Data Networks,” IEEEWireless Communications and Networking Conference (WCN-2000), Chicago, Illinois, September 2000, with S. Nayak.
  15. “Integrated Management of IP Based Networks" Proceedings of the Service Provider Solutions of NetWorld & Interop 99, Atlanta, Georgia, September 1999.
  16. Performance of Rate Control Multipoint Routing Algorithm in Broadband Networks," Proceedings of the 32nd Annual Conference onInformation Science and Systems, Princeton University, Princeton, New Jersey, March 1998, with A. Maunder and P. Min.
  17. "Analysis of Rate Controlling Link - Leaky Bucket with Finite Server," proceedings of the Annual Conference on Information Scienceand Systems, John Hopkins University, Baltimore, Maryland, pp. 33-38, March 1997, with A. Mandure.
  18. "Analysis and Modeling of Internet Traffic on the Public Switched Telephone Networks," Proceedings of The International TeletrafficCongress, ITC-15,Washington DC, pp. 643-652, June 1997, with J. Gorden and K. Murti.
  19. "Capacity Expansion of Least Busy Alternate Routing With Shadow Price," proceedings of the IEEE 1995 GLOBECOM Conference, Singapore, pp. 1369-1373, November 1995, with P. Min.
  20. "Integrated Methodology for Supporting ATM network Performance Management and Planning," proceedings of the Twenty-nine AnnualConference on Information Science and Systems, John Hopkins University, Baltimore, Maryland, pp. 460,  March 1995.
  21. "Routing and Bandwidth Management in ATMNetworks," IEEESymposium on Planning and Design of Broadband Networks, Montebello, Quebec, Canada, November 1994.
  22. "Real-Time Traffic Estimation in Circuit-Switched Networks," Proceedings ofThe International Teletraffic Congress, ITC-14, Antibes Juan-Pins, France, pp. 1175-1184, June 1994, with P. Min and M. Hegde.
  23. "Capacity Expansion under State-Dependent Routing Schemes," Proceedings of the Twenty-eight Annual Conference onInformation Science and Systems, Princeton University, Princeton, New Jersey, pp. 237-241, March 1994, with P. Min.
  24. "Performance Analysis of State-Dependent Routing," Proceedings of the Twenty-seventh Annual Conference on Information Scienceand Systems, John Hopkins University, Baltimore, Maryland, pp. 695-700, March 1993, with M. Hegde and P. Min.
  25. "Model Based Estimation of Exogenous Traffic," Proceedings of the Twenty-seventh Annual Conference on Information Science andSystems, John Hopkins University, Baltimore, Maryland, pp. 126-131, March 1993, with P. Min and M. Hegde.
  26. "ISDN Planning in Cluster Networks," Proceedings of BellcoreSymposium on Performance Modeling,Bellcore, Livingstone, New Jersey, pp. 217-226, May 1990, with R. Gowin.

Selected Refereed Technical Magazine Papers and Panels

  1. "Panel: Does the world still need generic management protocols," IEEE/IFIP Network Operations and Management Symposium 2006, http://www.ieee-noms.org/2006/.
  2. “Integrated Management of IP Based Networks,” IEEECommunications, April 2000, Vol. 38, No. 4, pp. 48-53, with K. Sage.
  3. “Advances in Internet Telephony,” Guest Editorial in the Special Issue of the IEEE Communication, Vol. 38, No. 4, pp. 44-46, April 2000, with M. Guizani and M. Atiquzzaman.
  4. “Internet Telephony: Guest Editorial,” IEEE Communications, April 2000, Vol. 38, No. 4, pp. 44-46, with M. Guizani and M. Atiq.
  5. Running the Special Issue:     IEEE Communication, Special Issue on “Advances in Internet Telephony,” (Co-Edited with M. Guizani —University of Florida and M. Atiq—University of Dayton), Vol. 38, No. 4, April 2000