Sabah S. Al-Fedaghi

According to our database1, Sabah S. Al-Fedaghi authored at least 109 papers between 1979 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Modeling Events and Events of Events in Software Engineering.
CoRR, 2020

2019
Programming Is Diagramming Is Programming.
JSW, 2019

Thinging as a Way of Modeling in Poiesis: Applications in Software Engineering.
CoRR, 2019

Thinging the Use Case Model.
CoRR, 2019

Authentication Modeling with Five Generic Processes.
CoRR, 2019

Thing/Machine-s (Thimacs) Applied to Structural Description in Software Engineering.
CoRR, 2019

Five Generic Processes for Behavior Description in Software Engineering.
CoRR, 2019

Toward Maximum Grip Process Modeling in Software Engineering.
CoRR, 2019

Existential Ontology and Thinging Modeling in Software Engineering.
CoRR, 2019

Thinging for Computational Thinking.
CoRR, 2019

User Interface as a Thinging Machine.
CoRR, 2019

Modeling with Thinging for Intelligent Monitoring System.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Modeling Computer Security Service Desk.
Proceedings of the 6th International Conference on Control, 2019

2018
Conceptual Modeling of a Procurement Process: Case study of RFP for Public Key Infrastructure.
CoRR, 2018

Conceptual Modeling of Inventory Management Processes as a Thinging Machine.
CoRR, 2018

Thinging Machine applied to Information Leakage.
CoRR, 2018

Tracking Systems as Thinging Machine: A Case Study of a Service Company.
CoRR, 2018

Thinging vs Objectfying in Software Engineering.
CoRR, 2018

Thinging Ethics for Software Engineers.
CoRR, 2018

Thinging for Software Engineers.
CoRR, 2018

Privacy Things: Systematic Approach to Privacy and Personal Identifiable Information.
CoRR, 2018

Petri Nets and Machines of Things that Flow.
Proceedings of the Intelligent Systems and Applications, 2018

Integrated Modeling Methodologies and Languages.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Control of Waste Water Treatment as a Flow Machine: A Case Study.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Modeling of an enterprise and information system: process specification based on the flow of things.
Proceedings of the International Conference on Geoinformatics and Data Analysis, 2018

2017
Flow-Based Provenance.
InformingSciJ, 2017

Toward Understanding Dynamic Behavior in Abstract Machines.
IJKSS, 2017

Software Engineering Modeling Applied to English Verb Classification (and Poetry).
CoRR, 2017

Diagramming the Class Diagram: Toward a Unified Modeling Methodology.
CoRR, 2017

Conceptual Modeling for Control of a Physical Engineering Plant: A Case Study.
CoRR, 2017

Process Description, Behavior, and Control.
CoRR, 2017

Modeling Events as Machines.
CoRR, 2017

Business Process Modeling: Blueprinting.
CoRR, 2017

Flow machine diagrams for VHDL code.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Sets with members as machines with things that flow.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Orientation in Conceptual Modeling Frameworks.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Enterprise Architecture: An Alternative to ArchiMate Conceptualization.
Proceedings of the Software Engineering Trends and Techniques in Intelligent Systems, 2017

2016
Design functional decomposition based on flow.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Toward Computing Oriented Representation of Sets.
Proceedings of the Artificial Intelligence Perspectives in Intelligent Systems, 2016

Thing-Oriented Learning: Application to Mathematical Objects.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

2015
On Collaboration in Software: Annotation vs. Flow-Based Diagrams.
JSW, 2015

Social Networks in which Users are not Small Circles.
InformingSciJ, 2015

Security as a flow machine.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

Toward conceptual representation of patterns.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

High-Level Representation of Time in Diagrammatic Specification.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

System states rediagrammed.
Proceedings of the International Symposium on Innovations in Intelligent SysTems and Applications, 2015

Conceptual maps for physical security.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Integrating Constraints in Schematics of Systems.
Proceedings of the Software Engineering in Intelligent Systems, 2015

2014
Design Principles in Health Information Technology: An Alternative to UML Use Case Methodology.
IJHISI, 2014

Information system requirements: a flow-based diagram versus supplementation of use case narratives with activity diagrams.
IJBIS, 2014

Communication-oriented business model based on flows.
IJBIS, 2014

Visualization of Execution of Programming Statements.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Multilevel semantic foundation for digital logic diagrams.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Characterizing social networks based on interior processes of nodes.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

A Semiotics Approach to Semantic Mismatches.
Proceedings of the Service Science and Knowledge Innovation, 2014

2013
Conceptual Understanding of Computer Program Execution: Application to C++
CoRR, 2013

Schematizing Proofs Based on Flow of Truth Values in Logic.
Proceedings of the IEEE International Conference on Systems, 2013

Alternative Representation of Aspects.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

How to Diagram a Dramatic Story.
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013

2012
Diagrammatization of the Transmission Control Protocol
CoRR, 2012

Perceived Privacy.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2010
Modeling in Ethics Engineering.
IJWA, 2010

System-based Approach to Software Vulnerability.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Diagrammatical framework for information system attacks.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Alternative Model for Information Ethics.
Proceedings of the Second International Conference on Information, 2010

Information Privacy and its Value.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
Interpretation of Information Processing Regulations.
JSEA, 2009

Conceptual Model for Communication
CoRR, 2009

Personal Information Databases
CoRR, 2009

Conceptualization in State Machines, Statecharts, and Flow Model.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Unblocking Data Flow Diagrams.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009

Conceptualizing Software Life Cycle.
Proceedings of the Information Systems: Modeling, 2009

Integrating Services: Control vs. Flow.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

Privacy Sensitivity: Application in Arabic.
Proceedings of the 2009 International Conference on Asian Language Processing, 2009

Flow-Based Supply Chains.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
Modelling of personal identifiable information in a resource description framework.
IJMSO, 2008

Scrutinizing the Rule: Privacy Realization in HIPAA.
IJHISI, 2008

Informational human-machine interaction.
Proceedings of the IEEE International Conference on Systems, 2008

Databases of Personal Identifiable Information.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Modeling communication: one more piece falling into place.
Proceedings of the 26th Annual International Conference on Design of Communication, 2008

Knowledge Maturity Based on Processing and Creation of Information.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Scrutinizing UML Activity Diagrams.
Proceedings of the Information Systems Development, 2008

Integration of information needs and seeking.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2008

From Information Processing to Information Flow: Application to Consumer Mind.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

Software Engineering Interpretation of Information Processing Regulations.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

On Information Lifecycle Management.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Information Stream Based Model for Organizing Security.
Proceedings of the The Third International Conference on Availability, 2008

2007
Taxonomy of Computer and Information Ethics.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Personal Information Ethics.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Conferences under scrutiny.
Commun. ACM, 2007

How sensitive is your personal information?
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Dismantling the Twelve Privacy Purposes.
Proceedings of the Trust Management, 2007

MYHEALTH: Personal Management of Health Information.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

CARPI: Capture, Archival and Retrieval of Personal Information.
Proceedings of the Datenbanksysteme in Business, 2007

Beyond Purpose-Based Privacy Access Control.
Proceedings of the Database Technologies 2007. Proceedings of the Eighteenth Australasian Database Conference, 2007

2006
Security Model for Informational Privacy.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Personal Information eWallet.
Proceedings of the IEEE International Conference on Systems, 2006

Personal Information Modeling in Semantic Web.
Proceedings of the Semantic Web, 2006

2005
Privacy as a Base for Confidentiality.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

A Systematic Approach to Anonymity.
Proceedings of the Security in Information Systems, 2005

How to Calculate the Information Privacy.
Proceedings of the Third Annual Conference on Privacy, 2005

The "Right to be Let Alone" and Private Information.
Proceedings of the ICEIS 2005, 2005

Privacy Enhanced Information Systems.
Proceedings of the Information Modelling and Knowledge Bases XVII, 2005

1991
Machine Recognition of Printed Arabic Text Utilizing Natural Language Morphology.
International Journal of Man-Machine Studies, 1991

1990
Morphological compression of Arabic text.
Inf. Process. Manag., 1990

1983
An Entity-Relationship Approach to Modelling Petroleum Engineering Database.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

1981
Mapping Considerations in the Design of Schemas for the Relational Model.
IEEE Trans. Software Eng., 1981

Some Characteristics of Matrices of Files with Multi-Valued Attributes.
Proceedings of the Data Base File Organization, 1981

1979
Algorithmic approach to the consecutive retrieval property.
International Journal of Parallel Programming, 1979


  Loading...