フォロー
Mohammad El-Ramly
Mohammad El-Ramly
Associate Professor of Computer Sciences, Cairo University
確認したメール アドレス: fci-cu.edu.eg
タイトル
引用先
引用先
From legacy to web through interaction modeling
E Stroulia, M El-Ramly, P Sorenson
International Conference on Software Maintenance, 2002. Proceedings., 320-329, 2002
772002
Reverse engineering legacy interfaces: An interaction-driven approach
E Stroulia, M El-Ramly, L Kong, P Sorenson, B Matichuk
Sixth Working Conference on Reverse Engineering (Cat. No. PR00303), 292-302, 1999
761999
User interface reverse engineering in support of interface migration to the web
E Stroulia, M El-Ramly, P Iglinski, P Sorenson
Automated Software Engineering 10, 271-301, 2003
742003
Recovering software requirements from system-user interaction traces
M El-Ramly, E Stroulia, P Sorenson
Proceedings of the 14th international conference on Software engineering and …, 2002
742002
From run-time behavior to usage scenarios: an interaction-pattern mining approach
M El-Ramly, E Stroulia, P Sorenson
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
732002
Mining system-user interaction traces for use case models
M El-Ramly, E Stroulia, P Sorenson
Proceedings 10th International Workshop on Program Comprehension, 21-29, 2002
582002
Modeling the system-user dialog using interaction traces
M El-Ramly, P Iglinski, E Stroulia, P Sorenson, B Matichuk
Proceedings Eighth Working Conference on Reverse Engineering, 208-217, 2001
572001
The LAN-simulation: a refactoring teaching example
S Demeyer, F Van Rysselberghe, T Girba, J Ratzinger, R Marinescu, ...
Eighth International Workshop on Principles of Software Evolution (IWPSE'05 …, 2005
562005
Architectural transformations: From legacy to three-tier and services
T Mens, S Demeyer, R Heckel, R Correia, C Matos, M El-Ramly, ...
Software Evolution, 139-170, 2008
542008
Similarity in programs
A Walenstein, M El-Ramly, JR Cordy, WS Evans, K Mahdavi, M Pizka, ...
Schloss Dagstuhl–Leibniz-Zentrum für Informatik, 2007
522007
The presence, trends, and causes of security vulnerabilities in operating systems of IoT’s low-end devices
A Al-Boghdady, K Wassif, M El-Ramly
Sensors 21 (7), 2329, 2021
492021
Mining software usage data
M El-Ramly, E Stroulia
26th International Conference on Software Engineering-W17S Workshop …, 2004
492004
Understanding web usage for dynamic web-site adaptation: A case study
N Niu, E Stroulia, M El-Ramly
Proceedings. Fourth International Workshop on Web Site Evolution, 53-62, 2002
402002
Automatic short answer scoring based on paragraph embeddings
S Hassan, AA Fahmy, M El-Ramly
International Journal of Advanced Computer Science and Applications 9 (10 …, 2018
382018
An experiment in automatic conversion of legacy Java programs to C
M El-Ramly, R Eltayeb, HA Alla
IEEE International Conference on Computer Systems and Applications, 2006 …, 2006
342006
Analysis of Web‐usage behavior for focused Web sites: a case study
M El‐Ramly, E Stroulia
Journal of Software Maintenance and Evolution: Research and Practice 16 (1‐2 …, 2004
332004
Interaction-pattern mining: Extracting usage scenarios from run-time behavior traces
M El-Ramly, E Stroulia, P Sorenson
Proc. of the 8th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data …, 2002
302002
Investigating the use of deep neural networks for software defect prediction
M Samir, M El-Ramly, A Kamel
2019 IEEE/ACS 16th International Conference on Computer Systems and …, 2019
232019
Forms2Net–migrating oracle forms to microsoft. NET
L Andrade, J Gouveia, M Antunes, M El-Ramly, G Koutsoukos
International Summer School on Generative and Transformational Techniques in …, 2005
232005
CairoDep: Detecting depression in Arabic posts using BERT transformers
M El-Ramly, H Abu-Elyazid, Y Mo’men, G Alshaer, N Adib, KA Eldeen, ...
2021 Tenth International Conference on Intelligent Computing and Information …, 2021
222021
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20