default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2020
- Ahmed Abdelhadi:
Multicasting Information for Internet of Things Wireless Networks. ICSIE 2020: 152-158 - Shazly Ahmed, Islam A. T. F. Taj-Eddin, Manal Ahmed Ismail:
MuHyb: A Proposed Mutation Testing Tool for Hybrid Mobile Applications. ICSIE 2020: 67-72 - Layth Nabeel Alrawi, Osama Ibraheem Ashour Ashour:
Comparative Analysis of Machine Learning Techniques using Customer Feedback Reviews of Oil and Gas Companies. ICSIE 2020: 224-228 - Omar Alhuniti, Rawan Ghnemat, M. Samir Abou El-Seoud:
Smart University Scheduling Using Genetic Algorithms. ICSIE 2020: 235-239 - Amira A. Alshazly, Mustafa Y. ElNainay, Adel A. El-Zoghabi, Mohamed S. Abougabal:
A Conceptual View for an Enhanced Cloud Software Life-Cycle Process (CSLCP) Model. ICSIE 2020: 1-5 - Osama Ibraheem Ashour Ashour, Tolga Pusatli:
Adoption of Case Tools & UML: A Local Study. ICSIE 2020: 6-10 - Misbah Mehboob Awan, Farooque Azam, Muhammad Waseem Anwar, Yawar Rasheed:
Formal Requirements Specification: Z Notation Meta Model Facilitating Model to Model Transformation. ICSIE 2020: 61-66 - Mohamed Ellithey Barghoth, Akram Salah, Manal Ahmed Ismail:
Software Project Management Effectiveness Evaluation Tool. ICSIE 2020: 18-24 - Noora Nahidh Behiya, Rabah Abood Ahmed:
Efficient vCPU Utilization for Reducing Energy Consumption in Cloud Data Centers. ICSIE 2020: 84-87 - Hajer Berhouma:
A Generic Model for Software Documentation and its Application in Embedded Systems Developed with Scrum. ICSIE 2020: 33-36 - Christina William Danial, Imane Aly Saroit, Shaimaa M. Mohamed:
Energy Efficient Ant Colony Cloud Offloading Algorithm (EACO). ICSIE 2020: 190-197 - Alley El-Dorry, Mohamed Reda, Sherif Abd El Khalek, Shehab El-Din Mohamed, Radwa Mohamed, Ayman Nabil:
Egyptian Universities Digital Certificate Verification Model Using Blockchain. ICSIE 2020: 79-83 - Sara Adel El-Shorbagy, Nada Sherief, Walid M. Abdelmoez:
Unexplored Gamification Elements in Learning Environments. ICSIE 2020: 102-107 - Samy El-Tawab, Nathan Sprague, Michael Stewart, Mridul Pareek, Philip Zubov:
Enhanced Interface for Autonomously driven Golf Cart in a Networked Controlled Environment. ICSIE 2020: 174-179 - Ayman M. El-Zoghby, Marianne A. Azer:
Survey of Code Reuse Attacks and Comparison of Mitigation Techniques. ICSIE 2020: 88-96 - Hazem Alaa Eldin, Khaled Waleed, Moataz Samir, Mohamed Tarek, Hager Sobeah, Mustafa Abdul Salam:
A Survey on Detection of Red Palm Weevil Inside Palm Trees: Challenges and Applications. ICSIE 2020: 119-125 - Naglaa Fathy, Walaa K. Gad, Nagwa L. Badr, Mohammed Hashem:
Querying Heterogeneous Property Graph Data Sources based on a Unified Conceptual View. ICSIE 2020: 113-118 - Iman Yasser Hegazy, Akram Salah, Amr Kamel:
Enhancing Energy Consumption in IoT. ICSIE 2020: 140-145 - Walaa S. E. Ismaeel:
An Integrated Model for Energy-Efficient Building Practices. ICSIE 2020: 204-208 - Menna Maged Kamel, Alberto Gil-Solla, Manuel Ramos Cabrer:
Tasks Recommendation in Crowdsourcing based on Workers' Implicit Profiles and Performance History. ICSIE 2020: 51-55 - Lobna Khaled, Nashwa Abdelbaki:
Evaluation of Software Static Analyzers. ICSIE 2020: 11-17 - Omar Khaled, Mahmoud El-Sahhar, Mohamed Alaa El-Dine, Youssef Talaat, Yomna M. I. Hassan, Alaa Hamdy:
Cascaded Architecture for Classifying the Preliminary Stages of Diabetic Retinopathy. ICSIE 2020: 108-112 - Salam Ismail Rasheed Khanji, Asad Masood Khattak:
Towards a Novel Intrusion Detection Architecture using Artificial Intelligence. ICSIE 2020: 185-189 - Rolou Lyn Rodriguez Maata, Ronald S. Cordova, Alrence Halibas:
Performance Analysis of Twofish Cryptography Algorithm in Big Data. ICSIE 2020: 56-60 - Ahmed Tarek Mohamed, Khaled Ezzat, Ibrahim H. El-Shal, Wael M. Badawy:
On the Application of Hierarchical Adaptive Structured Mesh "HASM®" Codec for Ultra Large Video Format. ICSIE 2020: 135-139 - Suzila Mohd, Mohamad Syazli Fathi, Aizul Nahar Harun:
Improving Humanitarian Aid Information Management Workflow for Disaster Relief Team. ICSIE 2020: 165-168 - Maged S. Morcos:
A Two Dimensional Performance Measurement Approach for Modeling Technological Strategic Decisions in Organisations. ICSIE 2020: 209-223 - Ahmad Mostafa:
Blockchain-based Distributed Authentication Mechanism for Internet-of-Things Devices. ICSIE 2020: 159-164 - Mourad Mounir, Akram Salah, Amr Kamel, Hanan Moussa:
Framework to Measure Agile Software Process Effectiveness in Critical Systems Development. ICSIE 2020: 25-32 - Rania Rushdy Moussa, Dina Rushdy M. Moawad:
Investigating the Efficiency of Building Energy Simulation Software on Architectural Design Process. ICSIE 2020: 37-40
skipping 12 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-19 11:11 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint