Riham Mansour

Affiliations:
  • Microsoft Research Advanced Technology Lab, Cairo, Egypt


According to our database1, Riham Mansour authored at least 19 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Information Uses and Gratifications Related to Crisis: Student Perceptions since the Egyptian Uprising.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019

SimVecs: Similarity-Based Vectors for Utterance Representation in Conversational AI Systems.
Proceedings of the 23rd Conference on Computational Natural Language Learning, 2019

2017
Curator: Enhancing Micro-Blogs Ranking by Exploiting User's Context.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2017

2015
Feature Selection for Twitter Sentiment Analysis: An Experimental Study.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2015

TRUPI: Twitter Recommendation Based on Users' Personal Interests.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2015

Inference models for Twitter user's home location prediction.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Augmenting Business Entities with Salient Terms from Twitter.
Proceedings of the COLING 2014, 2014

2013
Between a Rock and a Cell Phone: Communication and Information Technology Use during the 2011 Uprisings in Tunisia and Egypt.
Int. J. Inf. Syst. Crisis Response Manag., 2013

Quantified extreme scenario based design approach.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Revisiting the Old Kitchen Sink: Do we Need Sentiment Domain Adaptation?
Proceedings of the Recent Advances in Natural Language Processing, 2013

2012
Between a rock and a cell phone: Communication and information technology use during the 2011 Egyptian uprising.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

2011
ChameleonSoft: A moving target defense system.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements.
IET Softw., 2010

Towards safe and productive development of secure software: FADES and model-based software engineering.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Formal Analysis and Design for Engineering Security.
PhD thesis, 2009

Integrating Formal Analysis and Design to Preserve Security Properties.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Formal derivation of security design specifications from security requirements.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...