Остановите войну!
for scientists:
default search action
Nasir Ali
Publications
- 2024
- [j35]Nasir Ali, Qingsong Wang, Qiang Gao, Ke Ma:
Diagnosis of Multicomponent Faults in SRM Drives Based on Auxiliary Current Reconstruction Under Soft-Switching Operation. IEEE Trans. Ind. Electron. 71(3): 2265-2276 (2024) - [i1]Sameer Neupane, Mithun Saha, Nasir Ali, Timothy Hnat, Shahin Alan Samiei, Anandatirtha Nandugudi, David M. Almeida, Santosh Kumar:
Momentary Stressor Logging and Reflective Visualizations: Implications for Stress Management with Wearables. CoRR abs/2401.16307 (2024) - 2022
- [c17]Saurab Dulal, Nasir Ali, Adam Robert Thieme, Tianyuan Yu, Siqi Liu, Suravi Regmi, Lixia Zhang, Lan Wang:
Building a secure mHealth data sharing infrastructure over NDN. ICN 2022: 114-124 - [c16]Nasir Ali, Qiang Gao, Ke Ma:
Detection and Discrimination of Multiple Faults in Switched Reluctance Motor Drives for Safety-Critical Applications. ICIT 2022: 1-6 - 2019
- [j23]Nasir Ali, Haipeng Cai, Abdelwahab Hamou-Lhadj, Jameleddine Hassine:
Exploiting Parts-of-Speech for effective automated requirements traceability. Inf. Softw. Technol. 106: 126-141 (2019) - 2017
- [j20]Stuart McIlroy, Weiyi Shang, Nasir Ali, Ahmed E. Hassan:
User reviews of top mobile apps in Apple and Google app stores. Commun. ACM 60(11): 62-67 (2017) - [j18]Stuart McIlroy, Weiyi Shang, Nasir Ali, Ahmed E. Hassan:
Is It Worth Responding to Reviews? Studying the Top Free Apps in Google Play. IEEE Softw. 34(3): 64-71 (2017) - [c15]Timothy Hnat, Syed Monowar Hossain, Nasir Ali, Simona Carini, Tyson Condie, Ida Sim, Mani B. Srivastava, Santosh Kumar:
mCerebrum and Cerebral Cortex: A Real-time Collection, Analytic, and Intervention Platform for High-frequency Mobile Sensor Data. AMIA 2017 - [c14]Nasir Ali, Qiang Gao, Xu Cai, Pavol Makys, Marek Stulrajter:
Power converter fault diagnosis of switched reluctance motor drives using high-frequency signal injection. IECON 2017: 5078-5083 - [p2]Md. Mahbubur Rahman, Nasir Ali, Rummana Bari, Nazir Saleheen, Mustafa al'Absi, Emre Ertin, Ashley Kennedy, Kenzie L. Preston, Santosh Kumar:
mDebugger: Assessing and Diagnosing the Fidelity and Yield of Mobile Sensor Data. Mobile Health - Sensors, Analytic Methods, and Applications 2017: 121-143 - 2016
- [j17]Stuart McIlroy, Nasir Ali, Hammad Khalid, Ahmed E. Hassan:
Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews. Empir. Softw. Eng. 21(3): 1067-1106 (2016) - [j16]Surafel Lemma Abebe, Nasir Ali, Ahmed E. Hassan:
An empirical study of software release notes. Empir. Softw. Eng. 21(3): 1107-1142 (2016) - [j15]Stuart McIlroy, Nasir Ali, Ahmed E. Hassan:
Fresh apps: an empirical study of frequently-updated mobile apps in the Google play store. Empir. Softw. Eng. 21(3): 1346-1370 (2016) - [j14]Yuan Tian, Nasir Ali, David Lo, Ahmed E. Hassan:
On the unreliability of bug severity data. Empir. Softw. Eng. 21(6): 2298-2323 (2016) - [c13]Nazir Saleheen, Supriyo Chakraborty, Nasir Ali, Md. Mahbubur Rahman, Syed Monowar Hossain, Rummana Bari, Eugene H. Buder, Mani B. Srivastava, Santosh Kumar:
mSieve: differential behavioral privacy in time series of mobile sensor data. UbiComp 2016: 706-717 - 2015
- [j12]Nasir Ali, Zohreh Sharafi, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
An empirical study on the importance of source code entities for requirements traceability. Empir. Softw. Eng. 20(2): 442-478 (2015) - 2014
- [j10]Lucia, David Lo, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, Collin McMillan:
Leveraging machine learning and information retrieval techniques in software evolution tasks: summary of the first MALIR-SE workshop, at ASE 2013. ACM SIGSOFT Softw. Eng. Notes 39(1): 1-2 (2014) - 2013
- [j9]Nasir Ali, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Trustrace: Mining Software Repositories to Improve the Accuracy of Requirement Traceability Links. IEEE Trans. Software Eng. 39(5): 725-741 (2013) - [c12]Nasir Ali, Fehmi Jaafar, Ahmed E. Hassan:
Leveraging historical co-change information for requirements traceability. WCRE 2013: 361-370 - 2012
- [c11]Nasir Ali, Zohreh Sharafi, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
An empirical study on requirements traceability using eye-tracking. ICSM 2012: 191-200 - [c10]Abdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabane, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Esma Aïmeur:
Support vector machines for anti-pattern detection. ASE 2012: 278-281 - [c9]Nasir Ali, Aminata Sabane, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Improving Bug Location Using Binary Class Relationships. SCAM 2012: 174-183 - [c8]Abdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabane, Yann-Gaël Guéhéneuc, Esma Aïmeur:
SMURF: A SVM-based Incremental Anti-pattern Detection Approach. WCRE 2012: 466-475 - [p1]Nasir Ali, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Factors Impacting the Inputs of Traceability Recovery Approaches. Software and Systems Traceability 2012: 99-127 - 2011
- [c6]Nasir Ali, Wei Wu, Giuliano Antoniol, Massimiliano Di Penta, Yann-Gaël Guéhéneuc, Jane Huffman Hayes:
MoMS: Multi-objective miniaturization of software. ICSM 2011: 153-162 - [c5]Nasir Ali, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Trust-Based Requirements Traceability. ICPC 2011: 111-120 - [c3]Nasir Ali, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Requirements Traceability for Object Oriented Systems by Partitioning Source Code. WCRE 2011: 45-54
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 20:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint