default search action
Hazem Said
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Amr Al-Anwar, Jagat Jyoti Rath, Hazem Said, Karl Henrik Johansson, Matthias Althoff:
Publishers' Note to "Distributed set-based observers using diffusion strategies" [Journal of the Franklin Institute 360 (2023) 6976-6993]. J. Frankl. Inst. 361(6): 106669 (2024) - 2023
- [j5]Amr Alanwar, Victor Gaßmann, Xingkang He, Hazem Said, Henrik Sandberg, Karl Henrik Johansson, Matthias Althoff:
Privacy-preserving set-based estimation using partially homomorphic encryption. Eur. J. Control 71: 100786 (2023) - [j4]Amr Al-Anwar, Jagat Jyoti Rath, Hazem Said, Karl Henrik Johansson, Matthias Althoff:
Distributed set-based observers using diffusion strategies. J. Frankl. Inst. 360(10): 6976-6993 (2023) - 2022
- [c19]Zag ElSayed, Murat Ozer, Nelly Elsayed, Hazem Said:
Zydeco-Style Spike Sorting Low Power VLSI Architecture for IoT BCI Implants. WF-IoT 2022: 1-6 - [i3]Jones Yeboah, Izunna Okpala, Sylvia Worlali Azumah, Victor Adewopo, Hazem Said:
The Framework For The Discipline Of Software Engineering in Connection to Information Technology Discipline. CoRR abs/2206.09303 (2022) - 2021
- [c18]Hazem Said, Michael Zidar, Said Varlioglu, Cornelius Itodo:
A Framework for the Discipline of Information Technology. SIGITE 2021: 53-54 - 2020
- [c17]Maha A. Metawei, Hazem Said, Mohamed Taher, Hesham Eldeeb, Salwa M. Nassar:
Survey on Hybrid Classical-Quantum Machine Learning Models. CCCI 2020: 1-6 - [c16]Amr Alanwar, Hazem Said, Ankur Mehta, Matthias Althoff:
Event-Triggered Diffusion Kalman Filters. ICCPS 2020: 206-215 - [c15]Rebekah Michael, Hazem Said:
Gendered Performance Differences in Information Technology Courses. SIGITE 2020: 87-92 - [i2]Amr Alanwar, Jagat Jyoti Rath, Hazem Said, Matthias Althoff:
Distributed Set-Based Observers Using Diffusion Strategy. CoRR abs/2003.10347 (2020) - [i1]Amr Alanwar, Victor Gaßmann, Xingkang He, Hazem Said, Henrik Sandberg, Karl Henrik Johansson, Matthias Althoff:
Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption. CoRR abs/2010.11097 (2020)
2010 – 2019
- 2019
- [c14]Amr Alanwar, Hazem Said, Matthias Althoff:
Distributed Secure State Estimation Using Diffusion Kalman Filters and Reachability Analysis. CDC 2019: 4133-4139 - [c13]Hazem Said:
Case Study: The Evolution of the IT Discipline in a Research University. SIGITE 2019: 132-137 - 2018
- [c12]Islam Nashaat, Inas Mohammed, Mohamed Dessouky, Hazem Said:
Mismatch-Aware Placement of Device Arrays Using Genetic Optimization. SMACD 2018: 177-180 - 2016
- [j3]Mohamed Hanafy, Hazem Said, Ayman M. Wahba:
New Methodology for Complete Properties Extraction from Simulation Traces Guided with Static Analysis. J. Electron. Test. 32(6): 705-719 (2016) - [j2]Hazem Said:
Rethinking IT education: lessons from music education. Inroads 7(1): 34-37 (2016) - [c11]Chengcheng Li, Hazem Said, Rebekah Michael, Marcus Johnson, Helen Meyer:
Competency based IT experienes. FIE 2016: 1-4 - [c10]Islam Nashaat Salah El Din, Mohamed Dessouky, Hazem Said:
Optimally matched current mirror layout pattern generation using genetic optimization. ICM 2016: 145-148 - 2015
- [j1]Hazem Said, Lauren Kirgis, Brian Verkamp, Lawrence J. Johnson:
Online vs. Face-to-Face Delivery of Information Technology Courses: Students' Assessment. J. Inf. Technol. Educ. Res. 14: 297-312 (2015) - [c9]Mohamed Hanafy, Hazem Said, Ayman M. Wahba:
Complete Properties Extraction from Simulation Traces for Assertions Auto-generation. NATW 2015: 1-6 - 2012
- [c8]Amber Settle, Deborah LaBelle, Hazem Said, Sheila S. Sicilia:
Best practices in teaching information technology development. SIGITE Conference 2012: 113-114
2000 – 2009
- 2006
- [c7]Sherif Hammouda, Hazem Said, Mohamed Dessouky, Mohamed Tawfik, Quang Nguyen, Wael M. Badawy, Hazem M. Abbas, Hussein I. Shahein:
Chameleon ART: a non-optimization based analog design migration framework. DAC 2006: 885-888 - [c6]Mark Stockman, Soleda Leung, John Nyland, Hazem Said:
The information technology minor: filling a need in the workforce of today. SIGITE Conference 2006: 31-34 - 2004
- [c5]Hazem Said, Louise Chaytor, Daniel Humpert, John Nyland, Robert Schlemmer, Mark Stockman, Chris Christopherson, Patrick Kumpf, Annu Prabhakar, Vali Tadayon, Soleda Leung, Sam Geonetta, Russell E. McMahon, Tamisra Sanyal, Tom Wulf:
An implementation of a core curriculum in an information technology degree program. SIGITE Conference 2004: 94-100 - [c4]Mark Stockman, Chris Christopherson, Hazem Said, John Nyland:
An implementation of a networking track in an information technology degree program. SIGITE Conference 2004: 138-143 - [c3]Hazem Said, Russell E. McMahon, Soleda Leung, Annu Prabhakar, Tamisra Sanyal, Mark Stockman, Tom Wulf:
An implementation of a software development track in an information technology degree program. SIGITE Conference 2004: 206-210 - [c2]Mark Stockman, Louise Chaytor, Daniel Humpert, John Nyland, Robert Schlemmer, Hazem Said, Chris Christopherson, Patrick Kumpf, Annu Prabhakar, Vali Tadayon, Soleda Leung, Sam Geonetta, Russell E. McMahon, Tamisra Sanyal, Tom Wulf:
An implementation of secondary tracks in an information technology degree program. SIGITE Conference 2004: 231-234 - [c1]Soleda Leung, Hazem Said, Mark Stockman:
Enroute to making an IT baccalaureate program. SIGITE Conference 2004: 255-260
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint