default search action
Ahmed Awad 0001
Person information
- affiliation: British University in Dubai, UAE
- affiliation (former): University of Tartu, Estonia
- affiliation (former): Cairo University, Giza, Egypt
- affiliation (PhD 2010): Hasso Plattner Institute, Potsdam, Germany
Other persons with the same name
- Ahmed Awad — disambiguation page
- Ahmed Awad 0002 — An-Najah National University, Nablus, Palestine (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c53]Kristo Raun, Riccardo Tommasini, Ahmed Awad:
Adaptive Handling of Out-of-order Streams in Conformance Checking. DOLAP 2024: 9-17 - [i6]Nesma M. Zaki, Iman M. A. Helal, Ehab E. Hassanein, Ahmed Awad:
Validating Temporal Compliance Patterns: A Unified Approach with MTLf over various Data Models. CoRR abs/2406.08530 (2024) - 2023
- [c52]Mariia Bakhtina, Kin Long Leung, Raimundas Matulevicius, Ahmed Awad, Petr Svenda:
A Decentralised Public Key Infrastructure for X-Road. ARES 2023: 128:1-128:8 - [c51]Kristo Raun, Max Nielsen, Andrea Burattin, Ahmed Awad:
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments. CAiSE 2023: 437-453 - [c50]Belal Mohamed, Mohamed ElHelw, Ahmed Awad:
Towards Scalable Process Mining Pipelines. DASC/PiCom/CBDCom/CyberSciTech 2023: 175-182 - [c49]Kristo Raun, Riccardo Tommasini, Ahmed Awad:
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams. DEBS 2023: 49-60 - [c48]Feras M. Awaysheh, Riccardo Tommasini, Ahmed Awad:
Big Data Analytics from the Rich Cloud to the Frugal Edge. EDGE 2023: 319-329 - [c47]Tawfik Yasser, Tamer Arafa, Mohamed El-Helw, Ahmed Awad:
Keyed Watermarks: A Fine-grained Tracking of Event-time in Apache Flink. NILES 2023: 23-28 - [c46]Mariia Bakhtina, Raimundas Matulevicius, Ahmed Awad, Petteri Kivimäki:
On the Shift to Decentralised Identity Management in Distributed Data Exchange Systems. SAC 2023: 864-873 - 2022
- [j15]Ahmed Awad, Riccardo Tommasini, Samuele Langhi, Mahmoud Kamel, Emanuele Della Valle, Sherif Sakr:
D2IA: User-defined interval analytics on distributed streams. Inf. Syst. 104: 101679 (2022) - [j14]Iman M. A. Helal, Ahmed Awad:
Online correlation for unlabeled process events: A flexible CEP-based approach. Inf. Syst. 108: 102031 (2022) - [c45]Mahmoud Mahgoub, Hassan Moharram, Passent Elkafrawy, Ahmed Awad:
Benchmarking Concept Drift Detectors for Online Machine Learning. MEDI 2022: 43-57 - [c44]Nesma M. Zaki, Iman M. A. Helal, Ehab E. Hassanein, Ahmed Awad:
Efficient Checking of Timed Ordered Anti-patterns over Graph-Encoded Event Logs. MEDI 2022: 147-161 - [c43]Hassan Moharram, Ahmed Awad, Passent Mohammed El-Kafrawy:
Optimizing ADWIN for steady streams. SAC 2022: 450-459 - [e2]Philippe Fournier-Viger, Ahmed Hassan Yousef, Ladjel Bellatreche, Ahmed Awad, Abderrahim Ait Wakrime, Yassine Ouhammou, Idir Aït-Sadoune:
Advances in Model and Data Engineering in the Digitalization Era - MEDI 2022 Short Papers and DETECT 2022 Workshop Papers, Cairo, Egypt, November 21-24, 2022, Proceedings. Communications in Computer and Information Science 1751, Springer 2022, ISBN 978-3-031-23118-6 [contents] - [i5]Heidy Hazem, Ahmed Awad, Ahmed Hassan Yousef:
A Distributed Real-Time Recommender System for Big Data Streams. CoRR abs/2204.04633 (2022) - [i4]Nesma M. Zaki, Iman M. A. Helal, Ahmed Awad, Ehab E. Hassanein:
Efficient Checking of Timed Order Compliance Rules over Graph-encoded Event Logs. CoRR abs/2206.09336 (2022) - [i3]Kristo Raun, Ahmed Awad:
I Will Survive: An Online Conformance Checking Algorithm Using Decay Time. CoRR abs/2211.16702 (2022) - 2021
- [j13]Amr M. Sauber, Ahmed Awad, Amr F. Shawish, Passent Mohammed El-Kafrawy:
A Novel Hadoop Security Model for Addressing Malicious Collusive Workers. Comput. Intell. Neurosci. 2021: 5753948:1-5753948:10 (2021) - [j12]Simona Micevska, Ahmed Awad, Sherif Sakr:
SDDM: an interpretable statistical concept drift detection method for data streams. J. Intell. Inf. Syst. 56(3): 459-484 (2021) - [c42]Ahmed Awad, Kristo Raun, Matthias Weidlich:
Efficient Approximate Conformance Checking Using Trie Data Structures. ICPM 2021: 1-8 - [e1]Ladjel Bellatreche, Marlon Dumas, Panagiotis Karras, Raimundas Matulevicius, Ahmed Awad, Matthias Weidlich, Mirjana Ivanovic, Olaf Hartig:
New Trends in Database and Information Systems - ADBIS 2021 Short Papers, Doctoral Consortium and Workshops: DOING, SIMPDA, MADEISD, MegaData, CAoNS, Tartu, Estonia, August 24-26, 2021, Proceedings. Communications in Computer and Information Science 1450, Springer 2021, ISBN 978-3-030-85081-4 [contents] - [i2]Adriano Augusto, Ahmed Awad, Marlon Dumas:
Efficient Checking of Temporal Compliance Rules Over Business Process Event Logs. CoRR abs/2112.04623 (2021) - 2020
- [c41]Heidy Hazem, Ahmed Awad, Ahmed Hassan Yousef, Sherif Sakr:
DISGD: A Distributed Shared-nothing Matrix Factorization for Large Scale Online Recommender Systems. EDBT 2020: 359-362 - [c40]Ahmed Awad, Matthias Weidlich, Sherif Sakr:
Process Mining over Unordered Event Streams. ICPM 2020: 81-88 - [c39]Fadi Baskharon, Ahmed Awad, Chiara Di Francescomarino:
Predicting Remaining Cycle Time from Ongoing Cases: A Survival Analysis-Based Approach. ICPM Workshops 2020: 99-111 - [i1]Iman M. A. Helal, Ahmed Awad:
Correlating Unlabeled Events at Runtime. CoRR abs/2004.09971 (2020)
2010 – 2019
- 2019
- [j11]Ahmed Barnawi, Ahmed Awad, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise, Sherif Sakr:
Correction to: Runtime self-monitoring approach of business process compliance in cloud environments. Clust. Comput. 22(Suppl 1): 2541 (2019) - [c38]Ahmed Ramzy, Ahmed Awad, Amr A. Kamel, Osman Hegazy, Sherif Sakr:
Calculation of Average Road Speed Based on Car-to-Car Messaging. BigComp 2019: 1-8 - [c37]Ahmed Awad, Riccardo Tommasini, Mahmoud Kamel, Emanuele Della Valle, Sherif Sakr:
D ^2 2 IA: Stream Analytics on User-Defined Event Intervals. CAiSE 2019: 346-361 - [c36]Sherif Sakr, Mohamed Ragab, Mohamed Maher, Ahmed Awad:
MINARET: A Recommendation Framework for Scientific Reviewers. EDBT 2019: 538-541 - [c35]Ahmed Awad, Jonas Traub, Sherif Sakr:
Adaptive Watermarks: A Concept Drift-based Approach for Predicting Event-Time Progress in Data Streams. EDBT 2019: 622-625 - [c34]Elkhan Shahverdi, Ahmed Awad, Sherif Sakr:
Big Stream Processing Systems: An Experimental Evaluation. ICDE Workshops 2019: 53-60 - 2018
- [j10]Sherif Sakr, Zakaria Maamar, Ahmed Awad, Boualem Benatallah, Wil M. P. van der Aalst:
Business Process Analytics and Big Data Systems: A Roadmap to Bridge the Gap. IEEE Access 6: 77308-77320 (2018) - [c33]Nehal Afifi, Ahmed Awad, Hisham M. Abdelsalam:
Extending BPSim Based on Workflow Resource Patterns. BIS 2018: 206-222 - [c32]Nehal Afifi, Ahmed Awad, Hisham M. Abdelsalam:
RBPSim: A Resource-aware Extension of BPSim Using Workflow Resource Patterns. ZEUS 2018: 32-39 - 2017
- [c31]Marwa Hussein, Ahmed Awad, Osman Hegazy:
Enabling Compliance Monitoring for Process Execution Engines. RADAR+EMISA@CAiSE 2017: 30-37 - 2016
- [j9]Ahmed Awad, Nesma M. Zaki, Chiara Di Francescomarino:
Analyzing and repairing overlapping work items in process logs. Inf. Softw. Technol. 80: 110-123 (2016) - [c30]Dina Bayomie, Ahmed Awad, Ehab Ezat:
Correlating Unlabeled Events from Cyclic Business Processes Execution. CAiSE 2016: 274-289 - 2015
- [j8]Ahmed Barnawi, Ahmed Awad, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise, Sherif Sakr:
Runtime self-monitoring approach of business process compliance in cloud environments. Clust. Comput. 18(4): 1503-1526 (2015) - [c29]Iman M. A. Helal, Ahmed Awad, Ali El Bastawissi:
Runtime deduction of case ID for unlabeled business process execution events. AICCSA 2015: 1-8 - [c28]Nesma M. Zaki, Ahmed Awad, Ehab Ezat:
Extracting accurate performance indicators from execution logs using process models. AICCSA 2015: 1-8 - [c27]Ahmed Barnawi, Ahmed Awad, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise, Sherif Sakr:
BP-MaaS: A Runtime Compliance-Monitoring System for Business Processes. BPM (Demos) 2015: 25-29 - [c26]Dina Bayomie, Iman M. A. Helal, Ahmed Awad, Ehab Ezat, Ali El Bastawissi:
Deducing Case IDs for Unlabeled Event Logs. Business Process Management Workshops 2015: 242-254 - [c25]Ahmed Tealeb, Ahmed Awad, Galal H. Galal-Edeen:
Towards RAM-Based Variant Generation of Business Process Models. ICSOC Workshops 2015: 91-102 - [c24]Ahmed Awad, Ahmed Barnawi, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise, Sherif Sakr:
Runtime detection of business process compliance violations: an approach based on anti patterns. SAC 2015: 1203-1210 - 2014
- [c23]Ahmed Tealeb, Ahmed Awad, Galal H. Galal-Edeen:
Context-Based Variant Generation of Business Process Models. BMMDS/EMMSAD 2014: 363-377 - [p1]Mohammed AbuJarour, Ahmed Awad:
Web Services and Business Processes: A Round Trip. Web Services Foundations 2014: 3-29 - 2012
- [j7]Ahmed Awad, Sherif Sakr:
On efficient processing of BPMN-Q queries. Comput. Ind. 63(9): 867-881 (2012) - [j6]Ahmed Awad, Rajeev Goré, Zhe Hou, James Thomson, Matthias Weidlich:
An iterative approach to synthesize business process templates from compliance rules. Inf. Syst. 37(8): 714-736 (2012) - [c22]Sherif Sakr, Ahmed Awad, Matthias Kunze:
Querying Process Models Repositories by Aggregated Graph Search. Business Process Management Workshops 2012: 573-585 - 2011
- [j5]Emilian Pascalau, Ahmed Awad, Sherif Sakr, Mathias Weske:
Partial process models to manage business process variants. Int. J. Bus. Process. Integr. Manag. 5(3): 240-256 (2011) - [j4]Ahmed Awad, Matthias Weidlich, Mathias Weske:
Visually specifying compliance rules and explaining their violations for business processes. J. Vis. Lang. Comput. 22(1): 30-55 (2011) - [j3]Ralf Laue, Ahmed Awad:
Visual suggestions for improvements in business process diagrams. J. Vis. Lang. Comput. 22(5): 385-399 (2011) - [c21]Mohammed AbuJarour, Ahmed Awad:
Discovering Linkage Patterns among Web Services Using Business Process Knowledge. IEEE SCC 2011: 314-321 - [c20]Sherif Sakr, Emilian Pascalau, Ahmed Awad, Mathias Weske:
BPModelMasher: Manage Your Process Variants Effectively. BPM (Demos) 2011 - [c19]Andreas Rogge-Solti, Matthias Kunze, Ahmed Awad, Mathias Weske:
Business Process Configuration Wizard and Consistency Checker for BPMN 2.0. BMMDS/EMMSAD 2011: 231-245 - [c18]Cristina Cabanillas, Manuel Resinas, Antonio Ruiz Cortés, Ahmed Awad:
Automatic Generation of a Data-Centered View of Business Processes. CAiSE 2011: 352-366 - [c17]Ahmed Awad, Rajeev Goré, James Thomson, Matthias Weidlich:
An Iterative Approach for Business Process Template Synthesis from Compliance Rules. CAiSE 2011: 406-421 - [c16]Mohammed AbuJarour, Ahmed Awad:
Enriched Service Descriptions Using Business Process Configurations. EMISA 2011: 149-162 - [c15]Ahmed Awad, Sherif Sakr, Matthias Kunze, Mathias Weske:
Design by Selection: A Reuse-Based Approach for Business Process Modeling. ER 2011: 332-345 - [c14]Ahmed Awad, Mohammed AbuJarour:
Revealing Hidden Relations among Web Services Using Business Process Knowledge. ICSOC 2011: 235-249 - 2010
- [j2]Ralf Laue, Ahmed Awad:
Visualization of Business Process Modeling Anti Patterns. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 25 (2010) - [j1]Ahmed Awad, Emilian Pascalau, Mathias Weske:
Towards Instant Monitoring of Business Process Compliance. EMISA Forum 30(2): 10-24 (2010) - [c13]Ahmed Awad, Matthias Weidlich, Mathias Weske:
Consistency Checking of Compliance Rules. BIS 2010: 106-118 - [c12]Emilian Pascalau, Ahmed Awad, Sherif Sakr, Mathias Weske:
On Maintaining Consistency of Process Model Variants. Business Process Management Workshops 2010: 289-300 - [c11]Ahmed Awad, Sherif Sakr:
Querying Graph-Based Repositories of Business Process Models. DASFAA Workshops 2010: 33-44 - [c10]Sherif Sakr, Ahmed Awad:
A framework for querying graph-based business process models. WWW 2010: 1297-1300
2000 – 2009
- 2009
- [c9]Ahmed Awad, Gero Decker, Niels Lohmann:
Diagnosing and Repairing Data Anomalies in Process Models. Business Process Management Workshops 2009: 5-16 - [c8]Ahmed Awad, Mathias Weske:
Visualization of Compliance Violation in Business Process Models. Business Process Management Workshops 2009: 182-193 - [c7]Ahmed Awad, Matthias Weidlich, Mathias Weske:
Specification, Verification and Explanation of Violation for Data Aware Compliance Rules. ICSOC/ServiceWave 2009: 500-515 - [c6]Ahmed Awad, Sergey Smirnov, Mathias Weske:
Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach. OTM Conferences (1) 2009: 6-23 - 2008
- [c5]Ahmed Awad, Frank Puhlmann:
Structural Detection of Deadlocks in Business Process Models. BIS 2008: 239-250 - [c4]Ahmed Awad, Gero Decker, Mathias Weske:
Efficient Compliance Checking Using BPMN-Q and Temporal Logic. BPM 2008: 326-341 - [c3]Ahmed Awad, Artem Polyvyanyy, Mathias Weske:
Semantic Querying of Business Process Models. EDOC 2008: 85-94 - 2007
- [c2]Ahmed Awad:
BPMN-Q: A Language to Query Business Processes. EMISA 2007: 115-128 - 2004
- [c1]Ahmed Gaafar, Sherif Sakr:
Towards a Framework for Mapping Between UML/OCL and XML/XQuery. UML 2004: 241-259
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint