default search action
Sabah S. Al-Fedaghi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i85]Sabah Al-Fedaghi:
Exploring Conceptual Modeling Metaphysics: Existence Containers, Leibniz's Monads and Avicenna's Essence. CoRR abs/2405.01549 (2024) - [i84]Sabah Al-Fedaghi:
Preconceptual Modeling in Software Engineering: Metaphysics of Diagrammatic Representations. CoRR abs/2405.09269 (2024) - [i83]Sabah Al-Fedaghi:
Toward Conceptual Modeling for Propositional Logic: Propositions as Events. CoRR abs/2409.15705 (2024) - 2023
- [i82]Sabah Al-Fedaghi:
Stoic Conceptual Modeling Applied to Business Process Modeling Notation (BPMN). CoRR abs/2301.02062 (2023) - [i81]Sabah Al-Fedaghi:
Antithesis of Object Orientation: Occurrence-Only Modeling Applied in Engineering and Medicine. CoRR abs/2302.07087 (2023) - [i80]Sabah Al-Fedaghi:
Redrafting Requirements Modeling Using a Single Multilevel Diagram. CoRR abs/2304.02188 (2023) - [i79]Sabah Al-Fedaghi:
In Pursuit of Unification of Conceptual Models: Sets as Machines. CoRR abs/2306.13833 (2023) - [i78]Sabah Al-Fedaghi:
Ontology for Conceptual Modeling: Reality of What Thinging Machines Talk About, e.g., Information. CoRR abs/2308.09483 (2023) - [i77]Sabah Al-Fedaghi:
Diagrammatic Modelling of Causality and Causal Relations. CoRR abs/2310.11042 (2023) - 2022
- [i76]Sabah Al-Fedaghi, Bader BehBehani:
Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging. CoRR abs/2201.09055 (2022) - [i75]Sabah Al-Fedaghi:
Conceptual Modeling of Events Based on One-Category Ontology. CoRR abs/2203.00850 (2022) - [i74]Sabah Al-Fedaghi:
Change in Conceptual Modeling and Systems Reconfiguration. CoRR abs/2204.04034 (2022) - [i73]Sabah Al-Fedaghi:
State-Based Behavior Modeling in Software and Systems Engineering. CoRR abs/2205.07018 (2022) - [i72]Sabah Al-Fedaghi:
Conceptual Modeling with Constraints. CoRR abs/2206.02277 (2022) - [i71]Sabah Al-Fedaghi:
Conceptual Modeling of Actions. CoRR abs/2206.13373 (2022) - [i70]Sabah Al-Fedaghi:
Conceptual Modeling of Objects. CoRR abs/2208.00304 (2022) - [i69]Sabah Al-Fedaghi:
Conceptual Modeling of Aggregation: an Exploration. CoRR abs/2208.11171 (2022) - [i68]Sabah Al-Fedaghi:
Conceptual Modeling of the Whole-Part Relationship. CoRR abs/2209.07223 (2022) - [i67]Sabah Al-Fedaghi:
Conceptual Modeling Applied to Data Semantics. CoRR abs/2210.01335 (2022) - [i66]Sabah Al-Fedaghi:
Lupascian Non-Negativity Applied to Conceptual Modeling: Alternating Static Potentiality and Dynamic Actuality. CoRR abs/2210.15406 (2022) - [i65]Sabah Al-Fedaghi:
Modeling System Events and Negative Events Using Thinging Machines Based on Lupascian Logic. CoRR abs/2211.12586 (2022) - [i64]Sabah Al-Fedaghi:
Conceptual Modeling Founded on the Stoic Ontology: Reality with Dynamic Existence and Static Subsistence. CoRR abs/2212.05300 (2022) - 2021
- [j19]Sabah S. Al-Fedaghi, Ghadeer Aldamkhi:
Conceptual Modeling of an IP Phone Communication System: A Case Study. Int. J. Interdiscip. Telecommun. Netw. 13(3): 83-94 (2021) - [i63]Sabah Al-Fedaghi:
Advancing Behavior Engineering: Toward Integrated Events Modeling. CoRR abs/2101.01325 (2021) - [i62]Sabah Al-Fedaghi:
Conceptual Temporal Modeling Applied to Databases. CoRR abs/2102.00262 (2021) - [i61]Sabah Al-Fedaghi:
UML Modeling to TM Modeling and Back. CoRR abs/2102.02982 (2021) - [i60]Sabah Al-Fedaghi:
Conceptual Modeling for Computer Organization and Architecture. CoRR abs/2103.01773 (2021) - [i59]Sabah Al-Fedaghi:
Diagrammatic Formalism for Complex Systems: More than One Way to Eventize a Railcar System. CoRR abs/2103.02820 (2021) - [i58]Sabah Al-Fedaghi:
Conceptual Model with Built-in Process Mining. CoRR abs/2103.16956 (2021) - [i57]Sabah Al-Fedaghi:
Modeling in Systems Engineering: Conceptual Time Representation. CoRR abs/2104.00799 (2021) - [i56]Sabah Al-Fedaghi:
Model Multiplicity (UML) Versus Model Singularity in System Requirements and Design. CoRR abs/2105.00616 (2021) - [i55]Sabah Al-Fedaghi:
UML Sequence Diagram: An Alternative Model. CoRR abs/2105.15152 (2021) - [i54]Sabah Al-Fedaghi:
Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction. CoRR abs/2106.00267 (2021) - [i53]Sabah Al-Fedaghi:
Validation: Conceptual versus Activity Diagram Approaches. CoRR abs/2106.16160 (2021) - [i52]Sabah Al-Fedaghi:
TMUML: A Singular TM Model with UML Use Cases and Classes. CoRR abs/2107.00757 (2021) - [i51]Sabah Al-Fedaghi:
Beyond SDLC: Process Modeling and Documentation Using Thinging Machines. CoRR abs/2107.13633 (2021) - [i50]Sabah Al-Fedaghi:
Conceptual Data Modeling: Entity-Relationship Models as Thinging Machines. CoRR abs/2109.14717 (2021) - [i49]Sabah Al-Fedaghi, Mahdi Modhaffar:
Software Engineering Meets Systems Engineering: Conceptual Modeling Applied to Engineering Operations. CoRR abs/2110.13995 (2021) - 2020
- [c66]Sabah Al-Fedaghi, Majd Makdessi:
Modeling Business Process and Events. CSOC (1) 2020: 366-379 - [i48]Sabah Al-Fedaghi:
Modeling Events and Events of Events in Software Engineering. CoRR abs/2001.11962 (2020) - [i47]Sabah Al-Fedaghi, Hadeel Alnasser:
Modeling Network Security: Case Study of Email System. CoRR abs/2003.13509 (2020) - [i46]Sabah Al-Fedaghi:
Modeling the Realization and Execution of Functions and Functional Requirements. CoRR abs/2004.00078 (2020) - [i45]Sabah Al-Fedaghi, Dana Al-Qemlas:
Modeling Network Architecture: A Cloud Case Study. CoRR abs/2004.10350 (2020) - [i44]Sabah Al-Fedaghi:
Three Levels of Modeling: Static (Structure/Trajectories of Flow), Dynamic (Events) and Behavioral (Chronology of Events). CoRR abs/2005.00149 (2020) - [i43]Sabah Al-Fedaghi:
Causality in Static Models as an Initial Constraint on the Chronology of Events in System Behavior. CoRR abs/2005.02961 (2020) - [i42]Sabah Al-Fedaghi:
Modeling Physical/Digital Systems: Formal Event-B vs. Diagrammatic Thinging Machine. CoRR abs/2005.10351 (2020) - [i41]Sabah Al-Fedaghi, Jassim Al-Fadhli:
Thinging-Oriented Modeling of Unmanned Aerial Vehicles. CoRR abs/2006.00369 (2020) - [i40]Sabah Al-Fedaghi, Bader BehBehani:
How to Document Computer Networks. CoRR abs/2006.16860 (2020) - [i39]Sabah Al-Fedaghi, Esraa Haidar:
Thinging-Based Conceptual Modeling: Case Study of a Tendering System. CoRR abs/2007.00168 (2020) - [i38]Sabah Al-Fedaghi:
Modeling the Semantics of States and State Machines. CoRR abs/2007.07138 (2020) - [i37]Sabah Al-Fedaghi:
Conceptual Modeling of Time for Computational Ontologies. CoRR abs/2007.10151 (2020) - [i36]Sabah Al-Fedaghi:
Dissipating with Relations: Implication for the Entity-Relationship Model. CoRR abs/2008.00135 (2020) - [i35]Sabah Al-Fedaghi:
Changes, States, and Events: The Thread from Staticity to Dynamism in the Conceptual Modeling of Systems. CoRR abs/2008.05017 (2020) - [i34]Sabah Al-Fedaghi:
Computer Program Decomposition and Dynamic/Behavioral Modeling. CoRR abs/2009.03669 (2020) - [i33]Sabah Al-Fedaghi:
Underpinning Theories of Software Engineering: Dynamism in Physical Sources of the Shannon Weaver Communication Model. CoRR abs/2010.08538 (2020) - [i32]Sabah Al-Fedaghi:
Towards Conceptual Modeling Semantics: Eventizing Tarski's Truth Schema. CoRR abs/2011.01608 (2020) - [i31]Sabah Al-Fedaghi, Manar AlSaraf:
High-Level Description of Robot Architecture. CoRR abs/2011.12837 (2020) - [i30]Sabah Al-Fedaghi:
Exploration in Algorithm Engineering: Modeling Algorithms. CoRR abs/2012.01908 (2020) - [i29]Sabah Al-Fedaghi:
Conceptual Software Engineering Applied to Movie Scripts and Stories. CoRR abs/2012.11319 (2020)
2010 – 2019
- 2019
- [j18]Sabah Al-Fedaghi, Esraa Haidar:
Programming Is Diagramming Is Programming. J. Softw. 14(9): 410-422 (2019) - [c65]Sabah Al-Fedaghi, Yazan Mohamad:
Business Process Mapping: A Case Study. AICCSA 2019: 1-8 - [c64]Sabah Al-Fedaghi, Basmah AlMusallam:
Modeling Computer Security Service Desk. CoDIT 2019: 906-911 - [c63]Sabah S. Al-Fedaghi, Yousef Atiyah:
Modeling with Thinging for Intelligent Monitoring System. VTC Spring 2019: 1-7 - [i28]Sabah Al-Fedaghi:
User Interface as a Thinging Machine. CoRR abs/1901.11476 (2019) - [i27]Sabah Al-Fedaghi, Ali Abdullah Alkhaldi:
Thinging for Computational Thinking. CoRR abs/1903.01900 (2019) - [i26]Sabah Al-Fedaghi:
Existential Ontology and Thinging Modeling in Software Engineering. CoRR abs/1903.10822 (2019) - [i25]Sabah Al-Fedaghi:
Toward Maximum Grip Process Modeling in Software Engineering. CoRR abs/1906.11157 (2019) - [i24]Sabah Al-Fedaghi:
Five Generic Processes for Behavior Description in Software Engineering. CoRR abs/1907.11893 (2019) - [i23]Sabah Al-Fedaghi:
Thing/Machine-s (Thimacs) Applied to Structural Description in Software Engineering. CoRR abs/1909.01416 (2019) - [i22]Sabah Al-Fedaghi, MennatAllah Bayoumi:
Authentication Modeling with Five Generic Processes. CoRR abs/1910.01597 (2019) - [i21]Sabah Al-Fedaghi:
Thinging the Use Case Model. CoRR abs/1910.02637 (2019) - [i20]Sabah Al-Fedaghi:
Thinging as a Way of Modeling in Poiesis: Applications in Software Engineering. CoRR abs/1912.06492 (2019) - 2018
- [c62]Sabah Al-Fedaghi, Yousef Alduwaisan:
Modeling of an enterprise and information system: process specification based on the flow of things. ICGDA 2018: 142-150 - [c61]Sabah Al-Fedaghi, Reem Al-Azmi:
Control of Waste Water Treatment as a Flow Machine: A Case Study. ICAC 2018: 1-8 - [c60]Sabah Al-Fedaghi, Mousa Alsulaimi:
Privacy Thinging Applied to the Processing Cycle of Bank Cheques. ICSRS 2018: 67-74 - [c59]Sabah Al-Fedaghi, Haya Alahmad:
Integrated Modeling Methodologies and Languages. IMCOM 2018: 59:1-59:8 - [c58]Sabah Al-Fedaghi, Dana Shbeeb:
Petri Nets and Machines of Things that Flow. IntelliSys (2) 2018: 238-252 - [i19]Sabah S. Al-Fedaghi:
Privacy Things: Systematic Approach to Privacy and Personal Identifiable Information. CoRR abs/1803.10060 (2018) - [i18]Sabah Al-Fedaghi:
Thinging for Software Engineers. CoRR abs/1807.10673 (2018) - [i17]Sabah Al-Fedaghi:
Thinging Ethics for Software Engineers. CoRR abs/1810.02685 (2018) - [i16]Sabah Al-Fedaghi, Dana Shbeeb:
Petri Nets and Machines of Things That Flow. CoRR abs/1810.09652 (2018) - [i15]Sabah Al-Fedaghi:
Thinging vs Objectfying in Software Engineering. CoRR abs/1810.11093 (2018) - [i14]Sabah Al-Fedaghi, Yousef Atiyah:
Tracking Systems as Thinging Machine: A Case Study of a Service Company. CoRR abs/1811.11940 (2018) - [i13]Sabah S. Al-Fedaghi, Mahmoud BehBehani:
Thinging Machine applied to Information Leakage. CoRR abs/1811.12701 (2018) - [i12]Sabah Al-Fedaghi, Nourah Al-Huwais:
Conceptual Modeling of Inventory Management Processes as a Thinging Machine. CoRR abs/1812.00569 (2018) - [i11]Sabah Al-Fedaghi, Mona Al-Otaibi:
Conceptual Modeling of a Procurement Process: Case study of RFP for Public Key Infrastructure. CoRR abs/1812.01792 (2018) - 2017
- [j17]Sabah Al-Fedaghi:
Toward Understanding Dynamic Behavior in Abstract Machines. Int. J. Knowl. Syst. Sci. 8(4): 54-72 (2017) - [j16]Sabah Al-Fedaghi:
Flow-Based Provenance. Informing Sci. Int. J. an Emerg. Transdiscipl. 20: 19-36 (2017) - [c57]Sabah Al-Fedaghi:
Logic Representation: Aristotelian Syllogism by Diagram. ACIT/CSII/BCD 2017: 49-54 - [c56]Sabah Al-Fedaghi:
Enterprise Architecture: An Alternative to ArchiMate Conceptualization. CSOC (3) 2017: 68-77 - [c55]Sabah Al-Fedaghi, Haya Alahmad:
Orientation in Conceptual Modeling Frameworks. DASC/PiCom/DataCom/CyberSciTech 2017: 1298-1303 - [c54]Sabah Al-Fedaghi:
Sets with members as machines with things that flow. ICC 2017: 48:1-48:10 - [c53]Sabah Al-Fedaghi, Sari Sultan:
Flow machine diagrams for VHDL code. ICC 2017: 162:1-162:6 - [i10]Sabah Al-Fedaghi:
Business Process Modeling: Blueprinting. CoRR abs/1704.02973 (2017) - [i9]Sabah Al-Fedaghi:
Modeling Events as Machines. CoRR abs/1704.08588 (2017) - [i8]Sabah Al-Fedaghi, Haya Alahmad:
Process Description, Behavior, and Control. CoRR abs/1707.08618 (2017) - [i7]Sabah Al-Fedaghi, Abdulaziz AlQallaf:
Conceptual Modeling for Control of a Physical Engineering Plant: A Case Study. CoRR abs/1709.03575 (2017) - [i6]Sabah Al-Fedaghi:
Diagramming the Class Diagram: Toward a Unified Modeling Methodology. CoRR abs/1710.00202 (2017) - [i5]Sabah Al-Fedaghi:
Software Engineering Modeling Applied to English Verb Classification (and Poetry). CoRR abs/1710.09856 (2017) - 2016
- [c52]Sabah Al-Fedaghi:
Thing-Oriented Learning: Application to Mathematical Objects. CSE/EUC/DCABES 2016: 464-467 - [c51]Sabah Al-Fedaghi:
Toward Computing Oriented Representation of Sets. CSOC (1) 2016: 23-34 - [c50]Sabah Al-Fedaghi:
Design functional decomposition based on flow. SMC 2016: 2693-2698 - 2015
- [j15]Sabah Al-Fedaghi, Heba AlMeshari:
Social Networks in which Users are not Small Circles. Informing Sci. Int. J. an Emerg. Transdiscipl. 18: 205-224 (2015) - [j14]Sabah Al-Fedaghi:
On Collaboration in Software: Annotation vs. Flow-Based Diagrams. J. Softw. 10(11): 1327-1335 (2015) - [c49]Sabah Al-Fedaghi:
Integrating Constraints in Schematics of Systems. CSOC (2) 2015: 165-174 - [c48]Sabah Al-Fedaghi:
Conceptual maps for physical security. ICITST 2015: 343-348 - [c47]Sabah Al-Fedaghi:
System states rediagrammed. INISTA 2015: 1-7 - [c46]Sabah Al-Fedaghi:
High-Level Representation of Time in Diagrammatic Specification. SCSE 2015: 478-486 - [c45]Sabah Al-Fedaghi, Mohamad Almutairy:
Toward conceptual representation of patterns. SNPD 2015: 485-492 - [c44]Sabah Al-Fedaghi:
Security as a flow machine. WCICSS 2015: 76-81 - 2014
- [j13]Sabah Al-Fedaghi:
Communication-oriented business model based on flows. Int. J. Bus. Inf. Syst. 15(3): 325-337 (2014) - [j12]Sabah Al-Fedaghi:
Information system requirements: a flow-based diagram versus supplementation of use case narratives with activity diagrams. Int. J. Bus. Inf. Syst. 17(3): 306-322 (2014) - [j11]Sabah Al-Fedaghi:
Design Principles in Health Information Technology: An Alternative to UML Use Case Methodology. Int. J. Heal. Inf. Syst. Informatics 9(1): 30-41 (2014) - [c43]Sabah Al-Fedaghi:
A Semiotics Approach to Semantic Mismatches. ICISO 2014: 11-21 - [c42]Sabah Al-Fedaghi, Heba Al Meshari:
Characterizing social networks based on interior processes of nodes. ICITST 2014: 215-221 - [c41]Sabah Al-Fedaghi, Noura Aljallal:
Multilevel semantic foundation for digital logic diagrams. ICSAI 2014: 417-424 - [c40]Sabah Al-Fedaghi, Altaf Alrashed:
Visualization of Execution of Programming Statements. ITNG 2014: 363-370 - 2013
- [c39]Sabah Al-Fedaghi:
How to Diagram a Dramatic Story. HCI (29) 2013: 531-535 - [c38]Sabah Al-Fedaghi:
Alternative Representation of Aspects. ITNG 2013: 280-285 - [c37]Sabah Al-Fedaghi:
Schematizing Proofs Based on Flow of Truth Values in Logic. SMC 2013: 194-200 - [i4]Sabah Al-Fedaghi:
Conceptual Understanding of Computer Program Execution: Application to C++. CoRR abs/1304.5893 (2013) - 2012
- [j10]Sabah S. Al-Fedaghi:
Toward a New Methodology of Software Evolution. J. Next Gener. Inf. Technol. 3(4): 78-87 (2012) - [c36]Sabah Al-Fedaghi:
Perceived Privacy. ITNG 2012: 355-360 - [i3]Sabah Al-Fedaghi:
Diagrammatization of the Transmission Control Protocol. CoRR abs/1210.2005 (2012) - 2010
- [j9]Sabah S. Al-Fedaghi:
Modeling in Ethics Engineering. Int. J. Web Appl. 2(4): 221-236 (2010) - [c35]Sabah Saleh Al-Fedaghi:
Information Privacy and its Value. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 - [c34]Sabah S. Al-Fedaghi:
Alternative Model for Information Ethics. eKNOW 2010: 62-67 - [c33]Sabah S. Al-Fedaghi:
Diagrammatical framework for information system attacks. ICITST 2010: 1-7 - [c32]Sabah S. Al-Fedaghi:
System-based Approach to Software Vulnerability. SocialCom/PASSAT 2010: 1072-1079
2000 – 2009
- 2009
- [j8]Sabah S. Al-Fedaghi:
Interpretation of Information Processing Regulations. J. Softw. Eng. Appl. 2(2): 67-76 (2009) - [c31]Sabah S. Al-Fedaghi:
Flow-Based Supply Chains. CSO (2) 2009: 589-596 - [c30]Sabah S. Al-Fedaghi, Faisal Alhaqan:
Privacy Sensitivity: Application in Arabic. IALP 2009: 156-161 - [c29]Sabah S. Al-Fedaghi:
Integrating Services: Control vs. Flow. IRI 2009: 68-73 - [c28]Sabah S. Al-Fedaghi:
Conceptualizing Software Life Cycle. UNISCON 2009: 438-457 - [c27]Sabah S. Al-Fedaghi:
Unblocking Data Flow Diagrams. Software Engineering Research and Practice 2009: 270-273 - [c26]Sabah S. Al-Fedaghi:
Conceptualization in State Machines, Statecharts, and Flow Model. SITIS 2009: 250-256 - [i2]Sabah S. Al-Fedaghi, Bernhard Thalheim:
Personal Information Databases. CoRR abs/0909.4196 (2009) - [i1]Sabah S. Al-Fedaghi, Alaa Alsaqa, Zahraa Fadel:
Conceptual Model for Communication. CoRR abs/0912.0599 (2009) - 2008
- [j7]Sabah S. Al-Fedaghi:
Scrutinizing the Rule: Privacy Realization in HIPAA. Int. J. Heal. Inf. Syst. Informatics 3(2): 32-47 (2008) - [j6]Sabah S. Al-Fedaghi, Anfal Ashkanani:
Modelling of personal identifiable information in a resource description framework. Int. J. Metadata Semant. Ontologies 3(2): 109-121 (2008) - [c25]Bernhard Thalheim, Sabah S. Al-Fedaghi, Khaled Al-Saqabi:
Information Stream Based Model for Organizing Security. ARES 2008: 1405-1412 - [c24]Sabah S. Al-Fedaghi:
On Information Lifecycle Management. APSCC 2008: 335-342 - [c23]Sabah S. Al-Fedaghi:
Software Engineering Interpretation of Information Processing Regulations. COMPSAC 2008: 271-274 - [c22]Sabah Al-Fedaghi:
From Information Processing to Information Flow: Application to Consumer Mind. ICEBE 2008: 602-605 - [c21]Sabah S. Al-Fedaghi:
Integration of information needs and seeking. IRI 2008: 473-478 - [c20]Sabah Al-Fedaghi:
Scrutinizing UML Activity Diagrams. ISD 2008: 59-67 - [c19]Sabah S. Al-Fedaghi:
Knowledge Maturity Based on Processing and Creation of Information. KES (1) 2008: 294-303 - [c18]Sabah S. Al-Fedaghi:
Modeling communication: one more piece falling into place. SIGDOC 2008: 103-110 - [c17]Sabah S. Al-Fedaghi, Bernhard Thalheim:
Databases of Personal Identifiable Information. SITIS 2008: 617-624 - [c16]Sabah Al-Fedaghi:
Informational human-machine interaction. SMC 2008: 396-403 - 2007
- [j5]Sabah S. Al-Fedaghi:
Conferences under scrutiny. Commun. ACM 50(7): 123-126 (2007) - [c15]Sabah S. Al-Fedaghi:
Beyond Purpose-Based Privacy Access Control. ADC 2007: 23-32 - [c14]Sabah S. Al-Fedaghi, Zainab Meraj:
CARPI: Capture, Archival and Retrieval of Personal Information. BTW Workshops 2007: 179-198 - [c13]Sabah S. Al-Fedaghi, Ali M. NourEddine:
MYHEALTH: Personal Management of Health Information. CBMS 2007: 289-294 - [c12]Sabah Al-Fedaghi:
Dismantling the Twelve Privacy Purposes. IFIPTM 2007: 207-222 - [c11]Sabah S. Al-Fedaghi:
How sensitive is your personal information? SAC 2007: 165-169 - [r2]Sabah S. Al-Fedaghi:
Personal Information Ethics. Encyclopedia of Information Ethics and Security 2007: 513-519 - [r1]Sabah S. Al-Fedaghi:
Taxonomy of Computer and Information Ethics. Encyclopedia of Information Ethics and Security 2007: 631-637 - 2006
- [c10]Sabah S. Al-Fedaghi, Majed Y. Ahmad:
Personal Information Modeling in Semantic Web. ASWC 2006: 668-681 - [c9]Sabah Saleh Al-Fedaghi, Mahmoud M. Taha:
Personal Information eWallet. SMC 2006: 2855-2862 - [c8]Sabah S. Al-Fedaghi:
Security Model for Informational Privacy. WISI 2006: 154-155 - 2005
- [c7]Sabah S. Al-Fedaghi, Gunar Fiedler, Bernhard Thalheim:
Privacy Enhanced Information Systems. EJC 2005: 94-111 - [c6]Sabah S. Al-Fedaghi:
The "Right to be Let Alone" and Private Information. ICEIS (3) 2005: 98-107 - [c5]Sabah S. Al-Fedaghi:
How to Calculate the Information Privacy. PST 2005: 3-13 - [c4]Sabah S. Al-Fedaghi:
A Systematic Approach to Anonymity. WOSIS 2005: 160-172 - [c3]Sabah S. Al-Fedaghi:
Privacy as a Base for Confidentiality. WEIS 2005
1990 – 1999
- 1991
- [j4]Adnan Amin, Sabah S. Al-Fedaghi:
Machine Recognition of Printed Arabic Text Utilizing Natural Language Morphology. Int. J. Man Mach. Stud. 35(6): 769-788 (1991) - 1990
- [j3]Sabah S. Al-Fedaghi, Humoud B. Al-Sadoun:
Morphological compression of Arabic text. Inf. Process. Manag. 26(2): 303-316 (1990)
1980 – 1989
- 1983
- [c2]Sabah S. Al-Fedaghi:
An Entity-Relationship Approach to Modelling Petroleum Engineering Database. ER 1983: 761-779 - 1981
- [j2]Sabah S. Al-Fedaghi, Peter Scheuermann:
Mapping Considerations in the Design of Schemas for the Relational Model. IEEE Trans. Software Eng. 7(1): 99-111 (1981) - [c1]Sabah S. Al-Fedaghi:
Some Characteristics of Matrices of Files with Multi-Valued Attributes. FODO 1981: 121-135
1970 – 1979
- 1979
- [j1]Sabah S. Al-Fedaghi, Y. H. Chin:
Algorithmic approach to the consecutive retrieval property. Int. J. Parallel Program. 8(4): 279-301 (1979)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint