Ahmed Taha

According to our database1, Ahmed Taha authored at least 27 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Quantitative Trust Assessment in the Cloud.
PhD thesis, 2018

Two Stream Self-Supervised Learning for Action Recognition.
CoRR, 2018

Kid-Net: Convolution Networks for Kidney Vessels Segmentation from CT-Volumes.
CoRR, 2018

QRES: Quantitative Reasoning on Encrypted Security SLAs.
CoRR, 2018

Kid-Net: Convolution Networks for Kidney Vessels Segmentation from CT-Volumes.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

Segmentation of Renal Structures for Image-Guided Surgery.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

2017
Quantitative Reasoning about Cloud Security Using Service Level Agreements.
IEEE Trans. Cloud Computing, 2017

A novel approach to manage cloud security SLA incidents.
Future Generation Comp. Syst., 2017

Texture Synthesis with Recurrent Variational Auto-Encoder.
CoRR, 2017

Seeded Laplaican: An Eigenfunction Solution for Scribble Based Interactive Image Segmentation.
CoRR, 2017

SLA-Based Service Selection for Multi-Cloud Environments.
Proceedings of the IEEE International Conference on Edge Computing, 2017

A Framework for Ranking Cloud Security Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Alya: Multiphysics engineering simulation toward exascale.
J. Comput. Science, 2016

Novel efficient techniques for real-time cloud security assessment.
Computers & Security, 2016

SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Trust Validation of Cloud IaaS: A Customer-centric Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Identifying and Utilizing Dependencies Across Cloud Security Services.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Seeded Laplacian: An interactive image segmentation approach using eigenfunctions.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Multi-Modality Feature Transform: An Interactive Image Segmentation Approach.
Proceedings of the British Machine Vision Conference 2015, 2015

2014
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
E-research Support Desk: A New Genre in E-reference Services.
World Digital Libraries, 2013

Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Networked Library Services in a Research-intensive University.
The Electronic Library, 2012

2008
E-research: a new genre of digital library services.
World Digital Libraries, 2008

2007
Networked e-information services to support the e-learning process at UAE University.
The Electronic Library, 2007

2006
Building e-Partnership: d-Library Services for eLearning.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006


  Loading...