Items where Subject is "T Technology > T Technology (General)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | E | F | G | H | I | K | M | N | Q | R | S | U | Y | Z
Number of items at this level: 91.

A

Ahmad, Nida and Usman, Muhammad and Ikram, Naveed and , s4578 VALUE-BASED SOFTWARE ARCHITECTURE KNOWLEDGE MANAGEMENT TOOL. In: Proceedings of the IASTED International Conference.

Anwer, Shahzad and Ikram, Naveed and , s4578 (2006) Goal oriented requirement engineering: A critical study of techniques. In: Software Engineering Conference, 2006. APSEC 2006. 13th Asia Pacific.

Arshad, Smeea and Usman, Muhammad and Ikram, Naveed and , s4578 (2012) Knowledge Management Practices in GSD: A Systematic Literature Review. In: ICSEA 2012, The Seventh International Conference on Software Engineering Advances.

B

Bano, Muneera and Ikram, Naveed and , s4578 (2010) Issues and challenges of requirement engineering in service oriented software development. In: Software Engineering Advances (ICSEA), 2010 Fifth International Conference on.

Bano, Muneera and Ikram, Naveed and , s4578 (2011) KM-SORE: knowledge management for service oriented requirements engineering. In: ICSEA 2011, The Sixth International Conference on Software Engineering Advances.

Bano, Muneera and Ikram, Naveed and , s4578 (2012) Software Process Improvement: A systematic literature review. In: Multitopic Conference (INMIC), 2012 15th International.

Bano, Muneera and Imtiaz, Salma and Ikram, Naveed and Niazi, Mahmood and Usman, Muhammad and , s4578 (2012) Causes of requirement change-A systematic literature review. In: Evaluation & Assessment in Software Engineering (EASE 2012), 16th International Conference on.

Bano, Muneera and Imtiaz, Salma and Ikram, Naveed and Niazi, Mahmood and Usman, Muhammad and , s4578 (2012) Causes of requirement change-A systematic literature review. In: Evaluation & Assessment in Software Engineering (EASE 2012), 16th International Conference on.

Bano, Muneera and Zowghi, Didar and Ikram, Naveed and Niazi, Mahmood and , s4578 (2013) What makes service oriented requirements engineering challenging? A qualitative study. IET Software, Vol.8 .

Bashir, Muhammad Bilal and Malik, Tazzaina and Afzal, Tanvir and , s5126 (2013) SSTCSC: A Semantic Structure of Test Cases and Source Code. In: Frontiers of Information Technology (FIT), 2013 11th International Conference on.

Basit, Abdul and Murtaza, Ghulam and Ikram, Naveed and , s4578 (2010) Validation of VRRM process model. In: Proceedings of the 9th WSEAS international conference on Software engineering, parallel and distributed systems.

Bilal, Kashif and Muhammad, Uzair and Khan, Atif and Khan, M. Nasir (2005) Extracting Multiword Expressions in Machine Translation from English to Urdu using Relational Data Approach. In: ENFORMATIKA International Transactions on Engineering, Computing and Technology.

C

Chughtai, Hafiz Muhammad Omer and Malik, Shahzad A. and Yousaf, Muhammad and , s4030 (2009) Performance evaluation of transport layer protocols for video traffic over WiMAX. In: Multitopic Conference, 2009. INMIC 2009. IEEE 13th International.

E

Ejaz, Rahila and Ikram, Naveed and Imtiaz, Salma and , s4578 (2009) Product Line Variability Management using Traceability Information. In: ICSOFT (1).

Elahi, Ehsan and Yousaf, Muhammad and Sheikh, Ambreen and Maaz Rehan, M. and Omer Chughtai, M. and Qayyum, Amir and , s4030 (2010) On the implementation of End-to-End Mobility Management Framework (EMF). In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on.

F

Faiz, R. B. and Edirisinghe, Eran A. (2009) Decision Making for Predictive Maintenance in Asset Information Management. Interdisciplinary Journal of Information, Knowledge & Management, 4.

Faiz, R. B. and Singh, S. (2009) Condition Monitoring of Track Geometry in UK Rail. In: IEEE International Conference of Computing in Engineering, Science and Information.

Faiz, R. B. and Singh, S. (2009) Information analysis of rail track for pre-dictive maintenance. Transactions on Ccmputers, 8 (7). pp. 1123-1133.

Faiz, R. B. and Singh, S. (2009) Predictive Maintenance Management of Rail Profile in UK Rail. In: Computing, Engineering and Information, 2009. ICC'09. International Conference on.

Faiz, R. B. and Singh, S. (2009) Predictive maintenance management of rail track. In: Proceedings of the 3rd international conference on European computing conference.

Faiz, R. B. and Singh, S. (2009) Rail Profile Condition Monitoring Information Analysis of UK Rail Track. In: Computing, Engineering and Information, 2009. ICC'09. International Conference on.

Faiz, R. B. and Singh, S. (2009) Time Based Information Analysis of UK Rail Track. In: Computing, Engineering and Information, 2009. ICC'09. International Conference on.

Faiz, R. B. and Singh, S. (2009) Time Based Predictive Maintenance Management of UK Rail Track. In: Computing, Engineering and Information, 2009. ICC'09. International Conference on.

G

Grunske, Lars and Winter, Kirsten and Yatapanage, Nisansala and Zafar, Saad and Lindsay, Peter A. (2011) Experience with fault injection experiments for FMEA. Software: Practice and Experience, 41 (11). pp. 1233-1258.

H

Hashmi, Zulqarnain and Shaikh, Siraj A. and Ikram, Naveed and , s4578 (2010) Methodologies and Tools for OSS Software: Current State of the Practice. Electronic Communications of the EASST, Volume 33: Foundations and Techniques for Open Source Software Certification. p. 104.

I

Ikram, Naveed and , s4578 (2005) Systems Analysis: Systematic or Systemic. In: Information and Communication Technologies, 2005. ICICT 2005. First International Conference on.

Ikram, Naveed and Ramzan, Saffena and , s4578 (2007) Requirements change management process models: an evaluation. In: Proceedings of the 25th conference on IASTED International Multi-Conference: Software Engineering.

Ikram, Naveed and Ramzan, Saffena and , s4578 (2007) Requirements change management process models: an evaluation. In: Proceedings of the 25th conference on IASTED International Multi-Conference: Software Engineering.

Ikram, Naveed and Siddiqui , Surayya and Khan, Naurin Farooq and , s4578 (2014) Security Requirement Elicitation Techniques: The Comparison of Misuse Cases and Issue Based Information Systems. In: 4th IEEE International Workshop on Empirical Requirements Engineering, Sweden.

Imtiaz, Salma and Bano, Muneera and Ikram, Naveed and Niazi, Mahmood and , s4578 (2013) A tertiary study: experiences of conducting systematic literature reviews in software engineering. In: Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering.

Imtiaz, Salma and Ikram, Naveed and , s4578 (2011) Effective Task Allocation in Distributed Environments: A Traceability Perspective. In: ICSEA 2011, The Sixth International Conference on Software Engineering Advances.

Imtiaz, Salma and Ikram, Naveed and , s4578 (2008) Impact analysis from multiple perspectives: Evaluation of traceability techniques. In: Software Engineering Advances, 2008. ICSEA'08. The Third International Conference on.

K

Khan, Huma Hayat and Malik, Nauman and Usman, Muhammad and Ikram, Naveed and , s4578 (2011) Impact of changing communication media on conflict resolution in distributed software development projects. In: Software Engineering (MySEC), 2011 5th Malaysian Conference in.

Khan, Siffat Ullah and Niazi, Mahmood and Ikram, Naveed and , s4578 (2010) Software development outsourcing relationships trust: a systematic literature review protocol. In: International Conference on Evaluation and Assessment in Software Engineering.

M

Malik, Bushra and Zafar, Saad and , s4576 and , s66 (2012) A Systematic Mapping Study on Software Engineering Education. International Science Index, 6 (11). pp. 2061-2071.

Malik, Bushra and Zafar, Saad and , s66 and , s4576 A Systematic Mapping Study on Software Engineering Education. In: International Conference on Education and Information Technology (ICEIT 2012).

Malik, S. and Rehman, M. J. (2005) Time Stamped Fault Tolerance in Distributed Real Time Systems. In: IEEE International Multitopic Conference, Karachi, Pakistan.

Malik, S. and Rehman, M. J. (2005) A framework for fault tolerance in distributed real time systems. In: Emerging Technologies, 2005. Proceedings of the IEEE Symposium on.

Malik, Sheheryar and Huet, Fabrice and , s5344 (2011) Adaptive Fault Tolerance in Real Time Cloud Computing. In: Services (SERVICES), 2011 IEEE World Congress on.

Malik, Sheheryar and Huet, Fabrice and , s5344 (2011) Virtual Cloud: Rent Out the Rented Resources. In: Internet Technology and Secured Transactions (ICITST), 2011 International Conference for.

Malik, Sheheryar and Huet, Fabrice and Caromel, Denis and , s5344 (2012) Cooperative cloud computing in research and academic environment using Virtual Cloud. In: Emerging Technologies (ICET), 2012 International Conference on.

Malik, Sheheryar and Huet, Fabrice and Caromel, Denis and , s5344 (2012) Latency based dynamic grouping aware cloud scheduling. In: Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on.

Malik, Sheheryar and Huet, Fabrice and Caromel, Denis and , s5344 (2014) Latency based group discovery algorithm for network aware cloud scheduling. Future Generation Computer Systems, 31. pp. 28-39.

Malik, Sheheryar and Huet, Fabrice and Caromel, Denis and , s5344 (2012) RACS: a framework for resource aware cloud computing. In: Internet Technology And Secured Transactions, 2012 International Conferece For.

Malik, Sheheryar and Huet, Fabrice and Caromel, Denis and , s5344 (2012) Reliability aware scheduling in cloud computing. In: Internet Technology And Secured Transactions, 2012 International Conferece For.

Malik, Sheheryar and Shah, Tasneem M. and Iqbal, Zohaib Z. and , s5344 (2008) Improving embedding capacity with minimum degradation of stego-image. In: Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on.

Masood, Isma and Zafar, Saad and , s66 (2011) A Systematic Mapping Study on Patient Data Privacy and Security for Software System Development. In: ICSEA 2011, The Sixth International Conference on Software Engineering Advances.

Muhammad, Uzair and Bilal, Kashif and Khan, Atif and Khan, M. Nasir (2005) AGHAZ: an expert system based approach for the translation of English to Urdu. Transactions On Engineering, Computing And Technology V6 June.

Muhammad, Uzair and Khan, Atif and Khan, M. Nasir and Ayyub, Kashif and Sharif, Muhammad and , s5136 Aghaz1: An Expert System Based Approach for the Translation of Urdu into English. Journal of Information & Communication Technology.

Muhammad, Uzair and Khan, Atif and Khan, M. Nasir and Ayyub, Kashif and Sharif, Muhammad and , s5136 Handling Proper Nouns in Machine Translation from English into Urdu. Journal of Information & Communication Technology .

Munir, Asma and Ikram, Naveed and , s4578 EFFECTIVE COMMUNICATION AND COORDINATION: A COMPARISON OF REQUIREMENTS VALIDATION TECHNIQUES IN GSD. In: Proceedings of the IASTED International Conference.

Murtaza, Ghulam and Basit, Abdul and Ikram, Naveed and , s4578 (2010) Value elicitation in value based software engineering. In: Proceedings of the 9th WSEAS international conference on Software engineering, parallel and distributed systems.

Murtaza, Ghulam and Ikram, Naveed and Basit, Abdul and , s4578 (2010) A framework for eliciting value proposition from stakeholders. WSEAS Transactions on Computers, 9 (6). pp. 557-572.

N

Nazir, Sumaira and Fatima, Nargis and Malik, Sheheryar and , s5344 (2008) Effective Hybrid Review Process (EHRP). In: Computer Science and Software Engineering, 2008 International Conference on.

Niazi, Mahmood and El-Attar, Mohamed and Usma, M. and Ikram, Naveed and , s4578 (2012) GlobReq: A framework for improving requirements engineering in global software development projects: Preliminary results. In: Evaluation & Assessment in Software Engineering (EASE 2012), 16th International Conference on.

Niazi, Mahmood and El-Attar, Mohamed and Usman, Muhammad and Ikram, Naveed and , s4578 (2012) An Empirical Study Identifying High Perceived Value Requirements Engineering Practices in Global Software Development Projects. In: ICSEA 2012, The Seventh International Conference on Software Engineering Advances.

Niazi, Mahmood and Ikram, Naveed and Bano, Muneera and Imtiaz, Salma and Khan, Siffat Ullah and , s4578 (2013) Establishing trust in offshore software outsourcing relationships: an exploratory study using a systematic literature review. IET software, 7 (5). pp. 283-293.

Q

Qureshi, N. and Ikram, N. and Bano, M. and Usman, M. and , s4876 and , s4578 (2011) Empirical Evidence in Software Architecture: A Systematic Literature Review Protocol. In: ICSEA 2011, The Sixth International Conference on Software Engineering Advances.

Qureshi, Nadia and Ikram, Naveed and Bano, Muneera and Usman, Muhammad and , s4578 and , s4876 (2011) Empirical Evidence in Software Architecture: A Systematic Literature Review Protocol. In: ICSEA 2011, The Sixth International Conference on Software Engineering Advances.

Qureshi, Nadia and Usman, Muhammad and Ikram, Naveed and , s4578 and , s4876 (2013) Evidence in software architecture, a systematic literature review. In: Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering.

Qureshi, Nadia and Usman, Muhammad and Ikram, Naveed and , s4578 and , s4876 (2013) Evidence in software architecture, a systematic literature review. In: Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering.

R

Ramzan, S. and Ikram, N. and , s4578 (2005) Making Decision in Requirement Change Management. In: UNSPECIFIED.

Ramzan, S. and Ikram, Naveed and , s4578 (2006) Requirement change management process models: Activities, artifacts and roles. In: Multitopic Conference, 2006. INMIC'06. IEEE.

S

Samad, Javeria and Ikram, Naveed and , s4578 (2006) Managing the risks: An evaluation of risk management processes. In: Multitopic Conference, 2006. INMIC'06. IEEE.

Samad, Javeria and Ikram, Naveed and Usman, Muhammad and , s4578 (2008) VRRM: A VALUE-BASED REQUIREMENTS' RISK MANAGEMENT PROCESS. In: Proceedings of the IASTED International Conference on Software Engineering.

Shah, Peer Azmat and Yousaf, Muhammad and , s4030 (2008) End-to-end mobility management solutions for TCP: an analysis. In: Computer and Information Technology, 2008. ICCIT 2008. 11th International Conference on.

Shah, Peer Azmat and Yousaf, Muhammad and Qayyum, Amir and Hasbullah, Halabi B. and , s4030 (2012) Effectiveness of Multi-homing and Parallel Transmission during and after the Vertical Handover. In: Computer & Information Science (ICCIS), 2012 International Conference on.

Shah, Peer Azmat and Yousaf, Muhammad and Qayyum, Amir and Hasbullah, Halabi B. and , s4030 (2012) Performance comparison of end-to-end mobility management protocols for TCP. Journal of Network and Computer Applications, 35 (6). pp. 1657-1673.

Shah, Peer Azmat and Yousaf, Muhammad and Qayyum, Amir and Malik, Shahzad A. and , s4030 (2009) An analysis of service disruption time for TCP applications using end-to-end mobility management protocols. In: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia.

Sithirasenan, Elankayer and Zafar, Saad and Muthukkumarasamy, Vallipuram and , s66 (2006) Formal verification of the ieee 802.11 i wlan security protocol. In: Software Engineering Conference, 2006. Australian.

U

Usman, M. and Khan, J. and Hardas, M. and Ikram, N. and , s4578 (2010) Pedagogical and Structural Analysis of SE Courses. In: Software Engineering Education and Training (CSEE T), 2010 23rd IEEE Conference on.

Usman, Muhammad and Ikram, Naveed and , s4578 (2006) The Architecture of a Tool for Scenario-Based Software Architecture Evaluation. In: Multitopic Conference, 2006. INMIC'06. IEEE.

Usman, Muhammad and Khan, Javed and Hardas, Manas and Ikram, Naveed and , s4578 (2010) Pedagogical and Structural Analysis of SE Courses. In: 2010 23rd IEEE Conference on Software Engineering Education and Training.

Usman, Muhammad and Khan, Javed and Hardas, Manas and Ikram, Naveed and , s4578 (2010) Pedagogical and Structural Analysis of SE Courses. In: Software Engineering Education and Training (CSEE&T), 2010 23rd IEEE Conference on.

Y

Yasmin, Sadaf and Yousaf, Muhammad and Qayyum, Amir and , s4030 (2010) Security issues related with DNS dynamic updates for mobile nodes: a survey. In: proceedings of the 8th International Conference on Frontiers of Information Technology.

Yatapanage, Nisansala and Winter, Kirsten and Zafar, Saad and , s66 (2010) Slicing behavior tree models for verification. In: 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010.

Yousaf, Muhammad and Bhatti, Sohail and Rehan, Maaz and Qayyum, Amir and Malik, Shahzad A. and , s4030 (2009) An intelligent prediction model for generating LGD trigger of IEEE 802.21 MIH. In: proceedings of 2009 International Conference on Intelligent Computing (ICIC 2009).

Yousaf, Muhammad and Qayyum, Amir and , s4030 (2008) On end-to-end mobility management in 4G heterogeneous wireless networks. In: Networking and Communications Conference, 2008. INCC 2008. IEEE International.

Yousaf, Muhammad and Qayyum, Amir and Malik, Shahzad A. and , s4030 (2012) An architecture for exploiting multihoming in mobile devices for vertical handovers & bandwidth aggregation. Wireless Personal Communications, 66 (1). pp. 57-79.

Yousuf, Farzana and Zaman, Zahid and Ikram, Naveed and , s4578 (2008) Requirements validation techniques in GSD: A survey. In: Multitopic Conference, 2008. INMIC 2008. IEEE International.

Z

Zafar, A. and , s4875 (2013) An experiment in automatic content generation for platform games. In: Proceedings of the IEEE ICET. Islamabad: Pakistan.

Zafar, A. and Mujtaba, H. and , s4875 (2012) Identifying Catastrophic Failures in Offline Level Generation for Mario. In: UNSPECIFIED.

Zafar, Saad and , s66 (2009) A Light-Weight Formal Approach for Modeling, Verifying and Integrating Role-Based Access Control Requirements. In: Software Engineering Conference, 2009. APSEC'09. Asia-Pacific.

Zafar, Saad and Colvin, Robert and Winter, Kirsten and Yatapanage, Nisansala and Dromey, R. Geoff and , s66 (2007) Early validation and verification of a distributed role-based access control model. In: Software Engineering Conference, 2007. APSEC 2007. 14th Asia-Pacific.

Zafar, Saad and Dromey, Geoff and , s66 (2005) Managing Complexity in Modelling Embedded Systems. In: SETE-2005 A Decade of Growth... and Beyond.

Zafar, Saad and Dromey, R. Geoff and , s66 (2005) Integrating safety and security requirements into design of an embedded system. In: Software Engineering Conference, 2005. APSEC'05. 12th Asia-Pacific.

Zafar, Saad and Malik, Bushra and , s66 and , s4576 (2014) Trends on the use of e-Learning in Continuing Medical Education: A Review. Accepted for Publish. (Submitted)

Zafar, Saad and Mehboob, Misbah and Naveed, Asma and Malik, Bushra and , s66 and , s4576 (2013) Security quality model: an extension of Dromey's model. Software Quality Journal. pp. 1-26.

Zafar, Saad and Mehboob, Misbah and Naveed, Asma and Malik, Bushra and , s66 and , s4576 (2013) Security quality model: an extension of Dromey’s model. Software Quality Journal. pp. 1-26. ISSN 0963-9314

Zafar, Saad and Mehboob, Misbah and Naveed, Asma and Malik, B|ushra and , s66 and , s4576 (2013) Security quality model: an extension of Dromey’s model. Software Quality Journal. pp. 1-25. ISSN 0963-9314

Zafar, Saad and Winter, Kirsten and Colvin, Robert and Dromey, R. G. and , s66 (2006) Verification of an Integrated Role-Based Access Control Model. In: Proc. First Asian Working Conference on Verified Software.

This list was generated on Mon Sep 25 12:01:52 2017 PKT.