default search action
Kassem Saleh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Khadeejah Abdullah, Kassem Saleh, Paul Manuel:
Blockchain Adoption in Education with Enhancing Data Privacy. WorldCIST (3) 2024: 445-455 - 2021
- [j44]Nidal Nasser, Nargis Khan, Lutful Karim, Mohamed ElAttar, Kassem Saleh:
An efficient Time-sensitive data scheduling approach for Wireless Sensor Networks in smart cities. Comput. Commun. 175: 112-122 (2021)
2010 – 2019
- 2019
- [c11]Nidal Nasser, Nargis Khan, Mohamed El-Attar, Kassem Saleh, Amjad Abujamous:
An Efficient Data Scheduling Scheme for Cloud- Based Big Data Framework for Smart City. GLOBECOM 2019: 1-6 - 2013
- [j43]Jehad Al-Dallal, Kassem Saleh:
State-expansion-based techniques for synthesizing concurrent protocol specifications in distributed systems. Int. J. Commun. Syst. 26(9): 1176-1195 (2013) - [j42]Nidal Nasser, Anwar Alyatama, Kassem Saleh:
Zone-based routing protocol with mobility consideration for wireless sensor networks. Telecommun. Syst. 52(4): 2541-2560 (2013) - 2012
- [j41]Jehad Al-Dallal, Kassem Saleh:
Synthesizing Distributed Protocol Specifications from a UML State Machine Modeled Service Specification. J. Comput. Sci. Technol. 27(6): 1150-1168 (2012) - [j40]Anwar Alyatama, Kassem Saleh, Nidal Nasser:
A Novel Hierarchical and Heterogeneous Mobile Agent-Based Wireless Sensor Networks (HHMA-WSN) Architecture. J. Next Gener. Inf. Technol. 3(4): 1-9 (2012) - 2011
- [c10]Nidal Nasser, Anwar Alyatama, Kassem Saleh:
Mobility and routing in Wireless Sensor Networks. CCECE 2011: 573-578
2000 – 2009
- 2009
- [j39]Ibrahim Al Kattan, Ahmed Al Nunu, Kassem Saleh:
A Stochastic Model for Improving Information Security in Supply Chain Systems. Int. J. Inf. Syst. Supply Chain Manag. 2(3): 35-49 (2009) - 2008
- [j38]Jehad Al-Dallal, Kassem Saleh:
Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications. J. Comput. Networks Commun. 2008: 794960:1-794960:13 (2008) - [c9]Sk. Md. Mizanur Rahman, Nidal Nasser, Kassem Saleh:
Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks. WiMob 2008: 423-428 - 2004
- [j37]Kassem Saleh, Christo El-Morr, Aref Mourtada, Yahya Morad:
A mobile-agent platform and a game application specifications using M-UML. Electron. Libr. 22(1): 32-42 (2004) - [j36]Kassem Saleh, Christo El-Morr:
M-UML: an extension to UML for the modeling of mobile agent-based software systems. Inf. Softw. Technol. 46(4): 219-227 (2004) - 2003
- [c8]Kassem Saleh, Christo El-Morr, Aref Mourtada, Yahya Morad:
Specifications for a Mobile-Agent Platform and an Internet-Based Mobile Electronic Voting Application. International Conference on Internet Computing 2003: 730-736 - 2002
- [j35]Kassem Saleh:
Documenting electronic commerce systems and software using the unified modeling language. Inf. Softw. Technol. 44(5): 303-311 (2002) - [j34]Kassem Saleh, Robert L. Probert, W. Li, W. Fong:
An approach for high-yield requirements capture for e-commerce and its application. Int. J. Digit. Libr. 3(4): 302-308 (2002) - 2001
- [j33]Kassem Saleh, Salim Tariq, Muhammad K. Dhodhi:
Current issues in high-speed networks. Comput. Commun. 24(17): 1687-1688 (2001) - [j32]Muhammad K. Dhodhi, Salim Tariq, Kassem Saleh:
Bottlenecks in next generation DWDM-based optical networks. Comput. Commun. 24(17): 1726-1733 (2001) - [j31]Kassem Saleh, Abdel Aziz Boujarwah, Jehad Al-Dallal:
Anomaly detection in concurrent Java programs using dynamic data flow analysis. Inf. Softw. Technol. 43(15): 973-981 (2001) - [c7]Kassem Saleh, Rainer Koppler, C. Demarais:
Distributed Object Computing and its Application in Electronic Commerce Systems. AICCSA 2001: 495-498 - [c6]Muhammad K. Dhodhi, Ahmed E. Kamal, Kassem Saleh, Salim Tariq:
MSA: a modular switching architecture for packet transport over ultra-dense WDM networks. ICC 2001: 609-613 - 2000
- [j30]Hasan Ural, Kassem Saleh, Alan W. Williams:
Test generation based on control and data dependencies within system specifications in SDL. Comput. Commun. 23(7): 609-627 (2000) - [j29]Abdulazeez S. Boujarwah, Kassem Saleh, Jehad Al-Dallal:
Dynamic data flow analysis for Java programs. Inf. Softw. Technol. 42(11): 765-775 (2000) - [c5]Abdulazeez S. Boujarwah, Kassem Saleh, Jehad Al-Dallal:
Testing Java Programs Using Dynamic Data Flow Analysis. SAC (2) 2000: 725-727
1990 – 1999
- 1999
- [j28]Rachida Dssouli, Kassem Saleh, El Mostapha Aboulhamid, Abdeslam En-Nouaary, C. Bourhfir:
Test development for communication protocols: towards automation. Comput. Networks 31(17): 1835-1872 (1999) - [j27]Abdulazeez S. Boujarwah, Kassem Saleh, Jehad Al-Dallal:
Testing Syntax and Semantic Coverage of Java Language Compilers. Inf. Softw. Technol. 41(1): 15-28 (1999) - [j26]Kassem Saleh:
Object model in Java: elements and application. Inf. Softw. Technol. 41(4): 235-241 (1999) - [j25]Kassem Saleh, Robert L. Probert:
Communications software engineering (CSE). Inf. Softw. Technol. 41(11-12): 695-696 (1999) - [j24]Rachida Dssouli, Kamel Karoui, Kassem Saleh, Omar Cherkaoui:
Communications software design for testability: specification transformations and testability measures. Inf. Softw. Technol. 41(11-12): 729-743 (1999) - [j23]Kassem Saleh, Robert L. Probert, Khaled Al-Saqabi:
Recovery of CFSM-based protocol and service design from protocol execution traces. Inf. Softw. Technol. 41(11-12): 839-852 (1999) - [j22]Mansour H. A. Jaragh, Kassem Saleh:
Synthesis of communications protocol converters using the timed Petri net model. J. Syst. Softw. 47(1): 53-69 (1999) - [j21]Kassem Saleh, Robert L. Probert, Hassib Khanafer:
The distributed object computing paradigm: concepts and applications. J. Syst. Softw. 47(2-3): 125-131 (1999) - [c4]Kassem Saleh, Hassib Khanafer, Robert L. Probert, Hasan Ural:
Corba-Based Telecom Application of Distributed Object Computing. Applied Informatics 1999: 58-60 - 1998
- [j20]Kassem Saleh, Mansour H. A. Jaragh:
Synthesis of communications protocol converters: survey and assessment. Comput. Commun. 21(8): 741-757 (1998) - [j19]Kassem Saleh, Mansour H. A. Jaragh:
Synthesis of protocol converters: an annotated bibliography. Comput. Stand. Interfaces 19(2): 105-117 (1998) - [j18]Kassem Saleh, Khaled Al-Saqabi:
Error detection and diagnosis for fault tolerance in distributed systems. Inf. Softw. Technol. 39(14-15): 975-983 (1998) - 1997
- [j17]Ahmed Khoumsi, Kassem Saleh:
Two formal methods for the synthesis of discrete event systems. Comput. Networks ISDN Syst. 29(7): 759-780 (1997) - [j16]Khaled Al-Saqabi, Syed Mansoor Sarwar, Kassem Saleh:
Distributed gang scheduling in networks of heterogenous workstations. Comput. Commun. 20(5): 338-348 (1997) - [j15]Abdulazeez S. Boujarwah, Kassem Saleh:
Compiler test case generation methods: a survey and assessment. Inf. Softw. Technol. 39(9): 617-625 (1997) - 1996
- [j14]Kassem Saleh:
Synthesis of communications protocols: an annotated bibliography. Comput. Commun. Rev. 26(5): 40-59 (1996) - [j13]Kassem Saleh:
Editorial. Comput. Commun. 19(14): 1131-1133 (1996) - [j12]Abdulazeez S. Boujarwah, Nadia Al-Seif, Kassem Saleh:
Modelling the semantics of multitasking facilities in Concurrent C using Petri nets. Inf. Softw. Technol. 38(1): 3-9 (1996) - [j11]Kassem Saleh, Abdulazeez S. Boujarwah:
Communications software reverse engineering: a semi-automatic approach. Inf. Softw. Technol. 38(6): 379-390 (1996) - [j10]Khaled Al-Saqabi, Kassem Saleh:
An efficient process migration algorithm for homogeneous clusters. Inf. Softw. Technol. 38(9): 569-580 (1996) - [j9]Khaled Al-Saqabi, Kassem Saleh, Imtiaz Ahmad:
Recovery From Concurrent Failures in Communication Protocols. J. Syst. Softw. 35(1): 55-65 (1996) - [c3]Kassem Saleh, M. Ilangovan, Robert L. Probert:
Recovery of Communications Protocol Design from Run Time Protocol Traces. ICECCS 1996: 265-272 - 1995
- [j8]Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal:
Recovery Approach to the Design of Stabilizing Communication Protocols. Comput. Commun. 18(4): 276-287 (1995) - [j7]Robert L. Probert, Kassem Saleh, Hualong Yu:
Validation-directed specification of communications systems. Inf. Softw. Technol. 37(8): 403-410 (1995) - [j6]Imtiaz Ahmad, Muhammad K. Dhodhi, Kassem Saleh:
An evolutionary technique for local microcode compaction. Microprocess. Microsystems 19(8): 467-474 (1995) - [c2]Muhammad K. Dhodhi, Imtiaz Ahmad, Kassem Saleh:
Task Scheduling Using an Evolutionary Technique. Parallel and Distributed Computing and Systems 1995: 21-23 - 1994
- [j5]Kassem Saleh, Hasan Ural, Anjali Agarwal:
Modified distributed snapshots algorithm for protocol stabilization. Comput. Commun. 17(12): 863-870 (1994) - [j4]Abdulazeez S. Boujarwah, Kassem Saleh:
Compiler test suite: evaluation and use in an automated test environment. Inf. Softw. Technol. 36(10): 607-614 (1994) - [j3]Kassem Saleh, Anjali Agarwal:
Efficient checkpointing procedures for fault tolerant distributed systems. Microprocess. Microprogramming 40(6): 427-438 (1994) - [j2]Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal:
An efficient recovery procedure for fault tolerance in distributed systems. J. Syst. Softw. 25(1): 39-50 (1994) - 1991
- [j1]Robert L. Probert, Kassem Saleh:
Synthesis of Communication Protocols: Survey and Assessment. IEEE Trans. Computers 40(4): 468-476 (1991) - 1990
- [c1]Kassem Saleh, Robert L. Probert:
Synthesis of Error-Recoverable Protocol Specifications from Service Specifications. ICCI 1990: 415-424
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint