Dr. Asadullah Shaikh
Dr. Asadullah Shaikh
Associate Professor, Najran University, Najran, Saudi Arabia
Verified email at nu.edu.sa - Homepage
Title
Cited by
Cited by
Year
Verification-driven slicing of UML/OCL models
A Shaikh, R Clarisó, UK Wiil, N Memon
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
622010
The role of service oriented architecture in telemedicine healthcare system
A Shaikh, M Memon, N Memon, M Misbahuddin
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
502009
Evaluation of tools and slicing techniques for efficient verification of UML/OCL class diagrams
A Shaikh, UK Wiil, N Memon
Advances in Software Engineering 2011, 2011
212011
UOST: UML/OCL aggressive slicing technique for efficient verification of models
A Shaikh, UK Wiil, N Memon
International Workshop on System Analysis and Modeling, 173-192, 2010
192010
Strengths and weaknesses of maturity driven process improvement effort
A Shaikh, A Ahmed, N Memon, M Memon
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
142009
A system design for a telemedicine health care system
A Shaikh, M Misbahuddin, MS Memon
International Multi Topic Conference, 295-305, 2008
142008
Evaluating and ranking cloud-based e-learning critical success factors (CSFs) using combinatorial approach
QN Naveed, MRNM Qureshi, A Shaikh, AO Alsayed, S Sanober, ...
IEEE Access 7, 157145-157157, 2019
92019
Ontology based requirement interdependency representation and visualization
S Soomro, A Hafeez, A Shaikh, SHA Musavi
International Multi Topic Conference, 259-270, 2013
92013
Implementation of failure enterprise systems in organizational perspective framework
S Saeed, A Shaikh, MA Memon, MH Memon, FA Abassi, SMR Naqvi
International journal of advanced computer science and applications 8 (5), 54-63, 2017
82017
UMLtoCSP (UOST) a tool for efficient verification of UML/OCL class diagrams through model slicing
A Shaikh, UK Wiil
Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
82012
Jam: mitigating jellyfish attacks in wireless ad hoc networks
F Samad, QA Ahmed, A Shaikh, A Aziz
International Multi Topic Conference, 432-444, 2012
82012
Overview of slicing and feedback techniques for efficient verification of UML/OCL class diagrams
A Shaikh, UK Wiil
Ieee Access 6, 23864-23882, 2018
72018
Ontology-Based Finite Satisfiability of UML Class Model
AH Khan, SHA Musavi, AU Rehman, A Shaikh
IEEE Access 6, 3040-3050, 2018
62018
The impact of SOA on a system design for a telemedicine healthcare system
A Shaikh
Network Modeling Analysis in Health Informatics and Bioinformatics 4 (1), 15, 2015
52015
A feedback technique for unsatisfiable UML/OCL class diagrams
A Shaikh, UK Wiil
Software: Practice and Experience 44 (11), 1379-1393, 2014
52014
Factors Affecting Academic Integrity in E-Learning of Saudi Arabian Universities. An Investigation Using Delphi and AHP
A Muhammad, A Shaikh, QN Naveed, MRN Qureshi
IEEE Access 8, 16259-16268, 2020
42020
Hash based optimization for faster access to inverted index
S Shah, A Shaikh
2016 International Conference on Inventive Computation Technologies (ICICT …, 2016
42016
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
A Ghaffar, W Mohamed Ridza, A Shaikh
Journal of Software Engineering and Applications 6, 21, 2013
42013
The security aspects in web-based architectural design using service oriented architecture
A Shaikh, A Soomro, S Ali, N Memon
2009 13th International Conference Information Visualisation, 461-466, 2009
42009
Technique for Tumor Detection Upon Brain MRI Image by Utilizing Support Vector Machine
S Saeed, A Shaikh, MA Memon, SMR Naqvi
Quaid-E-Awam University Research Journal of Engineering, Science …, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20