Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and analysis of a multilevel caching in distributed database systems., , and . ISCC, page 140-145. IEEE Computer Society, (2004)A Survey on Behavioral Biometric Authentication on Smartphones., , and . CoRR, (2018)A survey on behavioral biometric authentication on smartphones., , and . J. Inf. Secur. Appl., (2017)A Behavioral Biometric Authentication Framework on Smartphones., , and . AsiaCCS, page 923-925. ACM, (2017)Handling Uncertainty in Database: An Introduction and Brief Survey., , and . Computer and Information Science, 8 (3): 119-133 (2015)Enhancing Aggregation over Uncertain Databases., , and . CIT/IUCC/DASC/PICom, page 132-139. IEEE, (2015)A new pedagogical design for geo-informatics courses using an e-training support system., , , and . Educ. Inf. Technol., 19 (2): 451-467 (2014)ConteSaG: context-based keyword search over multiple heterogeneous graph-modeled data., , , and . WIMS, page 20:1-20:6. ACM, (2017)Bibliometric analysis of Egyptian publications on Hepatitis C virus from PubMed using data mining of an in-house developed database (HCVDBegy)., , and . Scientometrics, 108 (2): 895-915 (2016)Measuring the Effectiveness of Egyptian Electronic Commerce Websites Using the Web Assessment Method., and . Egypt. Comput. Sci. J., (2005)