Change impact on a product and its redesign process: a tool for knowledge capture and reuse N Ahmad, DC Wynn, PJ Clarkson Research in Engineering Design 24 (3), 219-244, 2013 | 172 | 2013 |
Business process modeling, implementation, analysis, and management: the case of business process management tools B Zuhaira, N Ahmad Business Process Management Journal, 2020 | 76 | 2020 |
An efficient privacy mechanism for electronic health records A Anjum, KKR Choo, A Khan, A Haroon, S Khan, SU Khan, N Ahmad, ... Computers & Security 72, 196-211, 2018 | 67 | 2018 |
Improved generalization for secure data publishing S Yaseen, SMA Abbas, A Anjum, T Saba, A Khan, SUR Malik, N Ahmad, ... IEEE Access 6, 27156-27165, 2018 | 58 | 2018 |
Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development A Aslam, N Ahmad, T Saba, AS Almazyad, A Rehman, A Anjum, A Khan IEEE Access 5, 20349-20373, 2017 | 54 | 2017 |
An efficient approach for publishing microdata for multiple sensitive attributes A Anjum, N Ahmad, SUR Malik, S Zubair, B Shahzad The Journal of Supercomputing 74, 5127-5155, 2018 | 52 | 2018 |
Perspectives on usability guidelines for smartphone applications: An empirical investigation and systematic literature review N Ahmad, A Rextin, UE Kulsoom Information and Software Technology 94, 130-149, 2018 | 52 | 2018 |
Measuring the impact of scope changes on project plan using EVM S Tariq, N Ahmad, MU Ashraf, AM Alghamdi, AS Alfakeeh IEEE Access 8, 154589-154613, 2020 | 37 | 2020 |
Calculating Completeness of Agile Scope in Scaled Agile Development S Amjad, N Ahmad, T Saba, A Anjum, U Manzoor, MA Balubaid, ... IEEE Access 6, 5822-5847, 2018 | 36 | 2018 |
A Game-based Thermal-aware Resource Allocation Strategy for Data Centers S Akbar, SUR Malik, SU Khan, R Choo, A Anjum, N Ahmad IEEE Transactions on Cloud Computing, 2019 | 30 | 2019 |
τ-safety: A privacy model for sequential publication with arbitrary updates A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ... Computers & Security 66, 20-39, 2017 | 30 | 2017 |
Calculating completeness of software project scope definition I ul Hassan, N Ahmad, B Zuhaira Information and Software Technology 94, 208-233, 2018 | 28 | 2018 |
Information models used to manage engineering change: A review of the literature 2005–2010 N Ahmad, DC Wynn, PJ Clarkson International Conference on Engineering Design, Copenhagen, 2011 | 25 | 2011 |
Anonymous and formally verified dual signature based online e-voting protocol MN Saqib, J Kiani, B Shahzad, A Anjum, N Ahmad Cluster Computing, 1-14, 0 | 22 | |
Development and evaluation of a tool to estimate the impact of design change N Ahmad, DC Wynn, PJ Clarkson 11TH INTERNATIONAL DESIGN CONFERENCE (DESIGN 2010), VOL 1-3, 105-116, 2010 | 17 | 2010 |
Differential Average diversity: an efficient privacy mechanism for electronic health records SA Moqurrab, A Anjum, U Manzoor, S Nefti, N Ahmad, ... Journal of Medical Imaging and Health Informatics 7 (6), 1177-1187, 2017 | 16 | 2017 |
The impact of packaging interdependent change requests on project lead time N Ahmad, DC Wynn, PJ Clarkson Proceedings of the 12th International Dependency and Structure Modelling …, 2010 | 14* | 2010 |
Simulator for modeling, analysis, and visualizations of thermal status in data centers R Ullah, N Ahmad, SUR Malik, S Akbar, A Anjum Sustainable Computing: Informatics and Systems 19, 324-340, 2018 | 11 | 2018 |
Estimating the process cost of implementing engineering change alternatives N Ahmad, DC Wynn, PJ Clarkson 2nd Nordic Conference on Product Lifecycle Management, NordPLM’09, 2009 | 10 | 2009 |
Identifying deviations in software processes B Zuhaira, N Ahmad, T Saba, J Haseeb, SUR Malik, U Manzoor, ... IEEE Access 5, 20319-20332, 2017 | 9 | 2017 |