default search action
Mohamed El-Menshawy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Nagat Drawel, Amine Laarej, Jamal Bentahar, Mohamed El-Menshawy:
Corrigendum to "Transformation-based model checking temporal trust in multi-agent systems" [Journal of Systems and Software Volume 192, October 2022, 111383]. J. Syst. Softw. 213: 112052 (2024) - 2022
- [j18]Nagat Drawel, Amine Laarej, Jamal Bentahar, Mohamed El-Menshawy:
Transformation-based model checking temporal trust in multi-agent systems. J. Syst. Softw. 192: 111383 (2022) - [c19]Lynn Shehab, Diana Salhab, Elyar Pourrahimian, Mohamed El-Menshawy, Farook Hamzeh:
Agent-Based Modeling and Simulation of Multidimensional Impacts of Construction Labor Productivity Factors. WSC 2022: 1-12 - [c18]Elyar Pourrahimian, Malak Al Hattab, Salam Khalife, Mohamed El-Menshawy, Simaan M. AbouRizk:
Using Simulation-Based Forecasting to Project Singapore's Future Residential Construction Demand and Impacts on Sustainability. WSC 2022: 843-854 - 2020
- [j17]Mohamed G. Malhat, Mohamed El-Menshawy, Hamdy M. Mousa, Ashraf El-Sisi:
A new approach for instance selection: Algorithms, evaluation, and comparisons. Expert Syst. Appl. 149: 113297 (2020) - [j16]Warda El Kholy, Mohamed El-Menshawy, Jamal Bentahar, Mounia Elqortobi, Amine Laarej, Rachida Dssouli:
Model checking intelligent avionics systems for test cases generation using multi-agent systems. Expert Syst. Appl. 156: 113458 (2020)
2010 – 2019
- 2018
- [j15]Mohamed El-Menshawy, Jamal Bentahar, Warda El Kholy, Amine Laarej:
Model checking real-time conditional commitment logic using transformation. J. Syst. Softw. 138: 189-205 (2018) - [c17]Nagat Drawel, Jamal Bentahar, Mohamed El-Menshawy, Amine Laarej:
Verifying Temporal Trust Logic using CTL Model Checking. TRUST@AAMAS 2018: 62-74 - 2017
- [j14]Mohamed Adel Serhani, Mohamed El-Menshawy, Abdelghani Benharref, Saad Harous, Alramzana Nujum Navaz:
New algorithms for processing time-series big EEG data within mobile health monitoring systems. Comput. Methods Programs Biomed. 149: 79-94 (2017) - [j13]Ahmed Saleh Bataineh, Jamal Bentahar, Mohamed El-Menshawy, Rachida Dssouli:
Specifying and verifying contract-driven service compositions using commitments and model checking. Expert Syst. Appl. 74: 151-184 (2017) - [j12]Warda El Kholy, Jamal Bentahar, Mohamed El-Menshawy, Hongyang Qu, Rachida Dssouli:
SMC4AC: A New Symbolic Model Checker for Intelligent Agent Communication. Fundam. Informaticae 152(3): 223-271 (2017) - [c16]Saad Harous, Mohamed Adel Serhani, Mohamed El-Menshawy, Abdelghani Benharref:
Hybrid obesity monitoring model using sensors and community engagement. IWCMC 2017: 888-893 - 2016
- [j11]Mohamed Adel Serhani, Mohamed El-Menshawy, Abdelghani Benharref:
SME2EM: Smart mobile end-to-end monitoring architecture for life-long diseases. Comput. Biol. Medicine 68: 137-154 (2016) - 2015
- [j10]Mohamed El-Menshawy, Abdelghani Benharref, Mohamed Adel Serhani:
An automatic mobile-health based approach for EEG epileptic seizures detection. Expert Syst. Appl. 42(20): 7157-7174 (2015) - [j9]Warda El Kholy, Mohamed El-Menshawy, Jamal Bentahar, Hongyang Qu, Rachida Dssouli:
Formal Specification and Automatic Verification of Conditional Commitments. IEEE Intell. Syst. 30(2): 36-44 (2015) - [j8]Mohamed El-Menshawy, Jamal Bentahar, Warda El Kholy, Pinar Yolum, Rachida Dssouli:
Computational logics and verification techniques of multi-agent commitments: survey. Knowl. Eng. Rev. 30(5): 564-606 (2015) - [c15]Ana Vazquez, Mohamed El-Menshawy, Jamal Bentahar:
Automatic Transformation of Cloud Computing Service Composition to Verifiable Models. FiCloud 2015: 173-180 - [c14]Mohamed Adel Serhani, Mohamed El-Menshawy, Abdelghani Benharref, Alramzana Nujum Navaz:
Real time EEG compression for energy-aware continous mobile monitoring. ICM 2015: 291-294 - [c13]Warda El Kholy, Mohamed El-Menshawy, Amine Laarej, Jamal Bentahar, Faisal Al-Saqqar, Rachida Dssouli:
Real-Time Conditional Commitment Logic. PRIMA 2015: 547-556 - 2014
- [j7]Faisal Al-Saqqar, Jamal Bentahar, Khalid Sultan, Mohamed El-Menshawy:
On the interaction between knowledge and social commitments in multi-agent systems. Appl. Intell. 41(1): 235-259 (2014) - [j6]Khalid Sultan, Jamal Bentahar, Mohamed El-Menshawy:
Model checking probabilistic social commitments for intelligent agent communication. Appl. Soft Comput. 22: 397-409 (2014) - [j5]Warda El Kholy, Jamal Bentahar, Mohamed El-Menshawy, Hongyang Qu, Rachida Dssouli:
Modeling and verifying choreographed multi-agent-based web service compositions regulated by commitment protocols. Expert Syst. Appl. 41(16): 7478-7494 (2014) - [j4]Warda El Kholy, Jamal Bentahar, Mohamed El-Menshawy, Hongyang Qu, Rachida Dssouli:
Conditional Commitments: Reasoning and Model Checking. ACM Trans. Softw. Eng. Methodol. 24(2): 9:1-9:49 (2014) - [c12]Warda El Kholy, Mohamed El-Menshawy, Jamal Bentahar, Hongyang Qu, Rachida Dssouli:
Verifying Multiagent-Based Web Service Compositions Regulated by Commitment Protocols. ICWS 2014: 49-56 - 2013
- [j3]Mohamed El-Menshawy, Jamal Bentahar, Warda El Kholy, Rachida Dssouli:
Reducing model checking commitments for agent communication to model checking ARCTL and GCTL*. Auton. Agents Multi Agent Syst. 27(3): 375-418 (2013) - [j2]Mohamed El-Menshawy, Jamal Bentahar, Warda El Kholy, Rachida Dssouli:
Verifying conformance of multi-agent commitment-based protocols. Expert Syst. Appl. 40(1): 122-138 (2013) - [c11]Warda El Kholy, Mohamed El-Menshawy, Jamal Bentahar, Hongyang Qu, Rachida Dssouli:
Representing and reasoning about communicative conditional commitments. AAMAS 2013: 1169-1170 - [c10]Khalid Sultan, Mohamed El-Menshawy, Jamal Bentahar:
Reasoning about social commitments in the presence of uncertainty. SoMeT 2013: 29-35 - 2012
- [j1]Jamal Bentahar, Mohamed El-Menshawy, Hongyang Qu, Rachida Dssouli:
Communicative commitments: Model checking and complexity analysis. Knowl. Based Syst. 35: 21-34 (2012) - 2011
- [c9]Mohamed El-Menshawy, Jamal Bentahar, Hongyang Qu, Rachida Dssouli:
On the verification of social commitments and time. AAMAS 2011: 483-490 - [c8]Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssouli:
Model Checking Commitment Protocols. IEA/AIE (2) 2011: 37-47 - 2010
- [c7]Mohamed El-Menshawy, Wei Wan, Jamal Bentahar, Rachida Dssouli:
Symbolic model checking for agent interactions. AAMAS 2010: 1555-1556 - [c6]Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssouli:
Symbolic Model Checking Commitment Protocols Using Reduction. DALT 2010: 185-203 - [c5]Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssouli:
Modeling and Verifying Business Interactions via Commitments and Dialogue Actions. KES-AMSTA (2) 2010: 11-21
2000 – 2009
- 2009
- [c4]Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssouli:
A New Semantics of Social Commitments Using Branching Space-Time Logic. Web Intelligence/IAT Workshops 2009: 492-496 - [c3]Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssouli:
Verifiable Semantic Model for Agent Interactions Using Social Commitments. LADS 2009: 128-152 - [c2]Jamal Bentahar, Mohamed El-Menshawy, Rachida Dssouli:
An Integrated Semantics of Social Commitments and Associated Operations. MALLOW 2009 - [c1]Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssouli:
Enhancing Engineering Methodology for Communities of Web Services. MALLOW 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint