Abidalrahman Mohammad

According to our database1, Abidalrahman Mohammad authored at least 29 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Nonuniform language in technical writing: Detection and correction.
Nat. Lang. Eng., 2021

2019
Early Detection of Rumor Veracity in Social Media.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Statistical learning for OCR error correction.
Inf. Process. Manag., 2018

Integrating Global Attention for Pairwise Text Comparison.
Proceedings of the ACM Symposium on Document Engineering 2018, 2018

Active High-Recall Information Retrieval from Domain-Specific Text Corpora based on Query Documents.
Proceedings of the ACM Symposium on Document Engineering 2018, 2018

2017
ARAAC: A Rational Allocation Approach in Cloud Data Center Networks.
Future Internet, 2017

Post-Processing OCR Text using Web-Scale Corpora.
Proceedings of the 2017 ACM Symposium on Document Engineering, 2017

High-performance Computational Framework for Phrase Relatedness.
Proceedings of the 2017 ACM Symposium on Document Engineering, 2017

2016
Statistical Learning for OCR Text Correction.
CoRR, 2016

Non-uniform Language Detection in Technical Writing.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

Reddit Temporal N-gram Corpus and its Applications on Paraphrase and Semantic Similarity in Social Media using a Topic-based Latent Semantic Analysis.
Proceedings of the COLING 2016, 2016

What is in a Rumour: Combined Visual Analysis of Rumour Flow and User Activity.
Proceedings of the Short Paper Proceedings of the 33rd Computer Graphics International, Heraklion, Greece, June 28, 2016

Toward understanding how users respond to rumours in social media.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Real Time Filtering of Tweets Using Wikipedia Concepts and Google Tri-gram Semantic Relatedness.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

Efficient Parallelization of the Google Trigram Method for Document Relatedness Computation.
Proceedings of the 44th International Conference on Parallel Processing Workshops, 2015

Similarity-Based Support for Text Reuse in Technical Writing.
Proceedings of the 2015 ACM Symposium on Document Engineering, 2015

Efficient Computation of Co-occurrence Based Word Relatedness.
Proceedings of the 2015 ACM Symposium on Document Engineering, 2015

A Visual Framework for Clustering Memes in Social Media.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
P-GTM: privacy-preserving google tri-gram method for semantic text similarity.
Proceedings of the ACM Symposium on Document Engineering 2014, 2014

2013
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives.
Pers. Ubiquitous Comput., 2013

A dual-mode energy efficient encryption protocol for wireless sensor networks.
Ad Hoc Networks, 2013

2012
Hardware Performance Evaluation of SHA-3 Candidate Algorithms.
J. Information Security, 2012

An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications.
Int. Arab J. Inf. Technol., 2012

Semi-supervised Clustering Ensemble by Voting
CoRR, 2012

C-Sec: Energy efficient link layer encryption protocol for Wireless Sensor Networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
A Secure Platform of Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

A semi-automated approach to transforming database schemas into ontology language.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations.
J. Signal Process. Syst., 2010


  Loading...