default search action
Ali Muhammad
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Ali Muhammad, Mohamed Kadry Elhattab, Mohamed Amine Arfaoui, Chadi Assi:
Optimizing Age of Information in RIS-Empowered Uplink Cooperative NOMA Networks. IEEE Trans. Netw. Serv. Manag. 21(1): 897-907 (2024) - [j7]Ali Muhammad, Mohamed Kadry Elhattab, Mohamed Amine Arfaoui, Ahmed Al-Hilo, Chadi Assi:
Age of Information Optimization in RIS-Assisted Wireless Networks. IEEE Trans. Netw. Serv. Manag. 21(1): 925-938 (2024) - [i3]Jiayi Zhao, Alison Wun-lam Yeung, Ali Muhammad, Songjiang Lai, Vincent To-Yee NG:
CBAM-SwinT-BL: Small Rail Surface Detect Detection Method Based on Swin Transformer with Block Level CBAM Enhancement. CoRR abs/2409.20113 (2024) - 2023
- [j6]Ali Muhammad, Mohamed Kadry Elhattab, Mohamed Amine Arfaoui, Chadi Assi:
Optimizing Information Freshness in RIS-Assisted Non-Orthogonal Multiple Access-Based IoT Networks. IEEE Netw. Lett. 5(2): 71-75 (2023) - [j5]Ali Muhammad, Iqbal Murtza, Ayesha Saadia, Kashif Kifayat:
Cortex-inspired ensemble based network intrusion detection system. Neural Comput. Appl. 35(21): 15415-15428 (2023) - 2022
- [j4]Ali Muhammad, Ibrahim Sorkhoh, Moataz Samir, Dariush Ebrahimi, Chadi Assi:
Minimizing Age of Information in Multiaccess-Edge-Computing-Assisted IoT Networks. IEEE Internet Things J. 9(15): 13052-13066 (2022) - [c12]Ali Muhammad, Mohamed Kadry Elhattab, Mohamed Amine Arfaoui, Chadi Assi:
Optimizing Information Freshness Leveraging Multi-RISs in NOMA-based IoT Networks. GLOBECOM 2022: 940-945 - [c11]Ali Muhammad, Mohamed Kadry Elhattab, Moataz Shokry, Chadi Assi:
Leveraging Reconfigurable Intelligent Surface to Minimize Age of Information in Wireless Networks. ICC 2022: 2525-2530 - [c10]Fiheon Imroze, Fatemeh Nikbakhtnasrabadi, Sergey Danilin, Ali Muhammad, Meraj Ahmad, Christos Giagkoulovits, Hadi Heidari, Martin Weides:
Packaged CMOS cryogenic characterization for quantum computing applications. ICECS 2022 2022: 1-4 - [c9]Mohsan Ali, Ali Muhammad, Muhammad Asad, Makhdoom Sajawal, Charalampos Alexopoulos, Yannis Charalabidis:
Towards Perso-Arabic Urdu Language Hate Detection Using Machine Learning: A Comparative Study Based on a Large Dataset and Time-Complexity. PCI 2022: 317-321 - [i2]Ali Muhammad, Mohamed Kadry Elhattab, Mohamed Amine Arfaoui, Chadi Assi:
Optimizing Information Freshness in RIS-assisted NOMA-based IoT Networks. CoRR abs/2202.13572 (2022) - [i1]Ali Muhammad, Mohamed Kadry Elhattab, Mohamed Amine Arfaoui, Chadi Assi:
Optimizing Information Freshness Leveraging Multi-RISs in NOMA-based IoT Networks. CoRR abs/2208.01750 (2022) - 2021
- [j3]Ali Muhammad, Ibrahim Sorkhoh, Long Qu, Chadi Assi:
Delay-Sensitive Multi-Source Multicast Resource Optimization in NFV-Enabled Networks: A Column Generation Approach. IEEE Trans. Netw. Serv. Manag. 18(1): 286-300 (2021) - 2020
- [c8]Ali Muhammad, Long Qu, Chadi Assi:
Delay-Aware Multi-Source Multicast Resource optimization in NFV-Enabled Network. ICC 2020: 1-7
2010 – 2019
- 2017
- [c7]Brigitte Jaumard, Ali Muhammad, Rami Fahim:
Topology discovery of Synchronous Optical NETworks. ICNC 2017: 194-199 - 2015
- [p3]Leonardo Mariani, Oliviero Riganelli, Mauro Santoro, Ali Muhammad:
G-RankTest: Dynamic Analysis and Testing of Upgrades in LabVIEW Software. Validation of Evolving Software 2015: 107-121 - [p2]Pietro Braione, Giovanni Denaro, Oliviero Riganelli, Mauro Baluda, Ali Muhammad:
Static/Dynamic Test Case Generation For Software Upgrades via ARC-B and Deltatest. Validation of Evolving Software 2015: 147-184 - [p1]Fabrizio Pastore, Leonardo Mariani, Antti Eero Johannes Hyvärinen, Grigory Fedyukovich, Natasha Sharygina, Stephan Sehestedt, Ali Muhammad:
Regression Checking of Changes in C Software. Validation of Evolving Software 2015: 185-207 - 2014
- [j2]Pietro Braione, Giovanni Denaro, Andrea Mattavelli, Mattia Vivanti, Ali Muhammad:
Software testing with code-based test generators: data and lessons learned from a case study with an industrial software component. Softw. Qual. J. 22(2): 311-333 (2014) - [c6]Fabrizio Pastore, Leonardo Mariani, Antti Eero Johannes Hyvärinen, Grigory Fedyukovich, Natasha Sharygina, Stephan Sehestedt, Ali Muhammad:
Verification-aided regression testing. ISSTA 2014: 37-48 - 2013
- [c5]Hana Chockler, Giovanni Denaro, Meijia Ling, Grigory Fedyukovich, Antti Eero Johannes Hyvärinen, Leonardo Mariani, Ali Muhammad, Manuel Oriol, Ajitha Rajan, Ondrej Sery, Natasha Sharygina, Michael Tautschnig:
PINCETTE - Validating Changes and Upgrades in Networked Software. CSMR 2013: 461-464 - 2012
- [c4]Pietro Braione, Giovanni Denaro, Andrea Mattavelli, Mattia Vivanti, Ali Muhammad:
An industrial case study of the effectiveness of test generators. AST 2012: 50-56
2000 – 2009
- 2009
- [c3]Ali Muhammad, Fahad Al-Humaidan, A. Raouf Khan:
Interactive vs Integrated Development Environment for Scientific Computing. CSC 2009: 254-259 - [c2]Simo-Pekka Leino, Salla Lind, Matthieu Poyade, Sauli Kiviranta, Petteri Multanen, Arcadio Reyes-Lecuona, Ari Mäkiranta, Ali Muhammad:
Enhanced Industrial Maintenance Work Task Planning by Using Virtual Engineering Tools and Haptic User Interfaces. HCI (13) 2009: 346-354 - 2008
- [j1]Khalida Inayat Noor, Ali Muhammad:
On analytic functions with generalized bounded Mocanu variation. Appl. Math. Comput. 196(2): 802-811 (2008)
1990 – 1999
- 1997
- [c1]Ali Muhammad, Graham A. King:
Foreign exchange market forecasting using evolutionary fuzzy networks. CIFEr 1997: 213-219
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint