Aakash Ahmad
Geciteerd door
Geciteerd door
Cloud migration research: a systematic review
P Jamshidi, A Ahmad, C Pahl
IEEE transactions on cloud computing 1 (2), 142-157, 2013
Autonomic resource provisioning for cloud-based software
P Jamshidi, A Ahmad, C Pahl
Proceedings of the 9th international symposium on software engineering for …, 2014
A framework for classifying and comparing architecture-centric software evolution research
P Jamshidi, M Ghafari, A Ahmad, C Pahl
2013 17th European Conference on Software Maintenance and Reengineering, 305-314, 2013
Software architectures for robotic systems: A systematic mapping study
A Ahmad, MA Babar
Journal of Systems and Software 122, 16-39, 2016
A framework for architecture-driven migration of legacy systems to cloud-enabled software
A Ahmad, MA Babar
Proceedings of the WICSA 2014 Companion Volume, 1-8, 2014
Smart Societies, Infrastructure, Technologies and Applications: First International Conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings
R Mehmood, B Bhaduri, I Katib, I Chlamtac
Springer, 2018
The prevalence and characteristics of overweight and obesity among students in Qatar
M Al-Thani, A Al-Thani, S Alyafei, W Al-Chetachi, SE Khalifa, A Ahmed, ...
Public Health 160, 143-149, 2018
Classification and comparison of architecture evolution reuse knowledge—a systematic review
A Ahmad, P Jamshidi, C Pahl
Journal of Software: Evolution and Process 26 (7), 654-691, 2014
A Pattern Language for Evolution Reuse in Component-Based Software Archiecures
A Ahmad
Dublin City University, 2015
Architecting software for the internet of thing based systems
A Alreshidi, A Ahmad
Future Internet 11 (7), 153, 2019
Graph-based pattern identification from architecture change logs
A Ahmad, P Jamshidi, C Pahl
International Conference on Advanced Information Systems Engineering, 200-213, 2012
Classification and mapping of adaptive security for mobile computing
M Sajjad, A Ahmad, AW Malik, AB Altamimi, I Alseadoon
IEEE Transactions on Emerging Topics in Computing 8 (3), 814-832, 2018
Graph-based implicit knowledge discovery from architecture change logs
A Ahmad, P Jamshidi, M Arshad, C Pahl
Proceedings of the WICSA/ECSA 2012 Companion Volume, 116-123, 2012
Is cheap labour behind the scene?-Low-cost automated attacks on Yahoo CAPTCHAs
J Yan, E Salah, A Ahmad
School of Computing Science Technical Report Series, 2008
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8 (1), 1-24, 2018
Security and privacy for mhealth and uhealth systems: A systematic mapping study
LH Iwaya, A Ahmad, MA Babar
IEEE Access 8, 150081-150112, 2020
Cloud-based detection of road bottlenecks using OBD-II telematics
AM Sohail, KS Khattak, A Iqbal, ZH Khan, A Ahmad
2019 22nd International Multitopic Conference (INMIC), 1-7, 2019
Pattern-driven Reuse in Architecture-centric Evolution for Service Software
CP Aakash Ahmad, Pooyan Jamshidi
7th International Conference on Software Paradigm Trends (ICSOFT), 279 - 284, 2012
Formal analysis of language-based android security using theorem proving approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
A framework for acquisition and application of software architecture evolution knowledge: 14
A Ahmad, P Jamshidi, C Pahl
ACM SIGSOFT Software Engineering Notes 38 (5), 1-7, 2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20