Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Soumaia Al AyyatThe American University in CairoEmail verificata su aucegypt.edu
- Rajendra K RajProfessor of Computer Science, Rochester Institute of TechnologyEmail verificata su cs.rit.edu
- Khaled HarrasComputer Science Faculty at Carnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Brett A. BeckerUniversity College DublinEmail verificata su ucd.ie
- AHMED RAFEAAmerican University in CairoEmail verificata su aucegypt.edu
- Mostafa HamzaSoftware Engineering, MicrosoftEmail verificata su ucalgary.ca
- Cruz IzuSchool of Computer Science, The University of AdelaideEmail verificata su adelaide.edu.au
- Michael RobsonSmith CollegeEmail verificata su smith.edu
- Juan ChenNational University of Defense Technology, ChinaEmail verificata su nudt.edu.cn
- Neena ThotaUniversity of Massachusetts, AmherstEmail verificata su cs.umass.edu
- Shahram RahimiDepartment Head and Professor, Mississippi State UniversityEmail verificata su cse.msstate.edu
- Aysha AlsaftyLecturer of Computer ScienceEmail verificata su aucegypt.edu
- Rafik A SalamaUniversity of OxfordEmail verificata su ndm.ox.ac.uk
- Casey BennettCollege of Computing & Digital Media, DePaul UniversityEmail verificata su depaul.edu
- Allen ParrishExecutive Director, Alabama Cyber Institute, The University of AlabamaEmail verificata su ua.edu
- Teresa PereiraLecturer at University of MinhoEmail verificata su dsi.uminho.pt
- Karen DavisComputer Science and Software Engineering, Miami University (formerly at University of Cincinnati)Email verificata su miamioh.edu
- Amgad MadkourMicrosoftEmail verificata su microsoft.com
- Mohamed AlTantawyAgoloEmail verificata su agolo.com
- Slim AbdennadherProfessor of Computer Science, German International University in CairoEmail verificata su giu-uni.de
Segui
Sherif G. Aly
Professor, The American University in Cairo
Email verificata su aucegypt.edu - Home page