default search action
Mohammad El-Ramly
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j3]Abdullah Al-Boghdady, Khaled Wassif, Mohammad El-Ramly:
The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices. Sensors 21(7): 2329 (2021)
2010 – 2019
- 2019
- [c19]Ahmed Ibrahim, Mohammad El-Ramly, Amr Badr:
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications? AICCSA 2019: 1-7 - [c18]Mohamed Samir, Mohammad El-Ramly, Amr Kamel:
Investigating the Use of Deep Neural Networks for Software Defect Prediction. AICCSA 2019: 1-6 - [c17]Hebatollah Mostafa, Mohammad El-Ramly, Abeer Mohamed Elkorany, Hassan Shaban:
Behavio2Auth: Sensor-based Behavior Biometric Authentication for Smartphones. ArabWIC 2019: 11:1-11:6 - 2013
- [c16]Farag Zakaria Safy, Mohammad El-Ramly, Akram Salah:
Runtime Monitoring of SOA Applications: Importance, Implementations and Challenges. SOSE 2013: 315-319
2000 – 2009
- 2009
- [p2]Mohammad El-Ramly, Eleni Stroulia, Hani Samir:
Legacy Systems Interaction Reengineering. Human-Centered Software Engineering 2009: 316-333 - 2008
- [p1]Reiko Heckel, Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly, Georgios Koutsoukos, Luís Andrade:
Architectural Transformations: From Legacy to Three-Tier and Services. Software Evolution 2008: 139-170 - 2007
- [c15]Rui Correia, Carlos M. P. Matos, Reiko Heckel, Mohammad El-Ramly:
Architecture Migration Driven by Code Categorization. ECSA 2007: 115-122 - 2006
- [c14]Mohammad El-Ramly, Rihab Eltayeb, Hisham A. Alla:
An Experiment in Automatic Conversion of Legacy Java Programs to C#. AICCSA 2006: 1037-1045 - [c13]Mohammad El-Ramly:
Experience in teaching a software reengineering course. ICSE 2006: 699-702 - [i3]Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly, Reiko Heckel:
Rule-based Model Extraction from Source Code. Aspects For Legacy Applications 2006 - [i2]Andrew Walenstein, Mohammad El-Ramly, James R. Cordy, William S. Evans, Kiarash Mahdavi, Markus Pizka, Ganesan Ramalingam, Jürgen Wolff von Gudenberg:
Similarity in Programs. Duplication, Redundancy, and Similarity in Software 2006 - 2005
- [c12]Luís Andrade, João Gouveia, Miguel Antunes, Mohammad El-Ramly, Georgios Koutsoukos:
Forms2Net - Migrating Oracle Forms to Microsoft .NET. GTTSE 2005: 261-277 - [c11]Serge Demeyer, Filip Van Rysselberghe, Tudor Gîrba, Jacek Ratzinger, Radu Marinescu, Tom Mens, Bart Du Bois, Dirk Janssens, Stéphane Ducasse, Michele Lanza, Matthias Rieger, Harald C. Gall, Mohammad El-Ramly:
The LAN-simulation: A Refactoring Teaching Example. IWPSE 2005: 123-134 - [i1]Mohammad El-Ramly:
Experiences in Teaching Program Transformation for Software Reengineering. Transformation Techniques in Software Engineering 2005 - 2004
- [j2]Mohammad El-Ramly, Eleni Stroulia:
Analysis of Web-usage behavior for focused Web sites: a case study. J. Softw. Maintenance Res. Pract. 16(1-2): 129-150 (2004) - [c10]Wolfgang Prenninger, Mohammad El-Ramly, Marc Horstmann:
Case Studies. Model-Based Testing of Reactive Systems 2004: 439-461 - [c9]Mohammad El-Ramly, Eleni Stroulia:
Mining Software Usage Data. MSR 2004: 64-68 - 2003
- [j1]Eleni Stroulia, Mohammad El-Ramly, Paul Iglinski, Paul G. Sorenson:
User Interface Reverse Engineering in Support of Interface Migration to the Web. Autom. Softw. Eng. 10(3): 271-301 (2003) - 2002
- [c8]Eleni Stroulia, Mohammad El-Ramly, Paul G. Sorenson:
From Legacy to Web through Interaction Modeling. ICSM 2002: 320- - [c7]Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenson:
Mining System-User Interaction Traces for Use Case Models. IWPC 2002: 21-29 - [c6]Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenson:
From run-time behavior to usage scenarios: an interaction-pattern mining approach. KDD 2002: 315-324 - [c5]Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenson:
Recovering software requirements from system-user interaction traces. SEKE 2002: 447-454 - [c4]Nan Niu, Eleni Stroulia, Mohammad El-Ramly:
Understanding Web Usage for Dynamic Web-Site Adaptation: A Case Study. WSE 2002: 53- - 2001
- [c3]Mohammad El-Ramly, Paul Iglinski, Eleni Stroulia, Paul G. Sorenson, Bruce Matichuk:
Modeling the System-User Dialog Using Interaction Traces. WCRE 2001: 208- - 2000
- [c2]Eleni Stroulia, Mohammad El-Ramly, Paul G. Sorenson, Roland Penner:
Legacy systems migration in CelLEST. ICSE 2000: 790
1990 – 1999
- 1999
- [c1]Eleni Stroulia, Mohammad El-Ramly, Lanyan Kong, Paul G. Sorenson, Bruce Matichuk:
Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach. WCRE 1999: 292-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint