default search action
Ayesha Sadiq
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Ayesha Sadiq, Sajid Gul Khawaja, Muhammad Usman Akram, Norah Saleh Alghamdi, Aimal Khan, Arsalan Shaukat:
Machine Learning and Signal Processing Based Analysis of sEMG Signals for Daily Action Classification. IEEE Access 10: 40506-40516 (2022) - 2021
- [j4]Ayesha Sadiq, Muhammad Umar Javed, Rabiya Khalid, Ahmad Almogren, Muhammad Shafiq, Nadeem Javaid:
Blockchain Based Data and Energy Trading in Internet of Electric Vehicles. IEEE Access 9: 7000-7020 (2021) - 2020
- [j3]Ayesha Sadiq, Yuan-Fang Li, Sea Ling:
A survey on the use of access permission-based specifications for program verification. J. Syst. Softw. 159 (2020) - [c6]Ayesha Sadiq, Nadeem Javaid, Omaji Samuel, Adia Khalid, Noman Haider, Muhammad Imran:
Efficient Data Trading and Storage in Internet of Vehicles using Consortium Blockchain. IWCMC 2020: 2143-2148 - [c5]Haichi Wang, Zan Wang, Jun Sun, Shuang Liu, Ayesha Sadiq, Yuan-Fang Li:
Towards Generating Thread-Safe Classes Automatically. ASE 2020: 943-955 - [i2]Asad Mansoor Khan, Ayesha Sadiq, Sajid Gul Khawaja, Muhammad Usman Akram, Ali Saeed Khan:
Physical Action Categorization using Signal Analysis and Machine Learning. CoRR abs/2008.06971 (2020)
2010 – 2019
- 2019
- [b1]Ayesha Sadiq:
Automatic Inference of Symbolic Permissions for Single-threaded Java Programs. Monash University, Australia, 2019 - [c4]Ayesha Sadiq, Li Li, Yuan-Fang Li, Ijaz Ahmed, Sea Ling:
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs. ASE 2019: 1098-1101 - [i1]Ayesha Sadiq, Yuan-Fang Li, Sea Ling, Li Li, Ijaz Ahmed:
Sip4J: Statically inferring permission-based specifications for sequential Java programs. CoRR abs/1902.05311 (2019) - 2018
- [j2]Syed Asad Hussain, Naeem Akhtar Khan, Ayesha Sadiq, Farooq Ahmad:
Simulation, modeling and analysis of master node election algorithm based on signal strength for VANETs through Colored Petri nets. Neural Comput. Appl. 29(11): 1243-1259 (2018) - [c3]Ijaz Ahmed, Ayesha Sadiq, Muhammad Atif, Mudasser Naseer, Muhammad Adnan:
Voice morphing: An illusion or reality. ICACS 2018: 1-6 - 2017
- [c2]Farooq Ahmad, Ayesha Sadiq, Ana María Martínez Enríquez, Aslam Muhammad, Muhammad Waqas Anwar, Usama Ujaz Bajwa, Mudasser Naseer, Sher Afzal Khan:
Component Based Architecture for the Control of Crossing Regions in Railway Networks. ICMLA 2017: 540-545 - 2016
- [c1]Ayesha Sadiq, Yuan-Fang Li, Sea Ling, Ijaz Ahmed:
Extracting Permission-Based Specifications from a Sequential Java Program. ICECCS 2016: 215-218 - 2014
- [j1]Ayesha Sadiq, Farooq Ahmad, Sher Afzal Khan, José C. Valverde, Tabbasum Naz, Muhammad Waqas Anwar:
Modeling and analysis of departure routine in air traffic control based on Petri nets. Neural Comput. Appl. 25(5): 1099-1109 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint