default search action
Rabih Bashroush
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j20]Nour Rteil, Rabih Bashroush, Rich Kenny, Astrid Wynne:
Interact: IT infrastructure energy and cost analyzer tool for data centers. Sustain. Comput. Informatics Syst. 33: 100618 (2022) - [j19]Rabih Bashroush, Nour Rteil, Rich Kenny, Astrid Wynne:
Optimizing Server Refresh Cycles: The Case for Circular Economy With an Aging Moore's Law. IEEE Trans. Sustain. Comput. 7(1): 189-200 (2022) - 2021
- [j18]Joseph Doyle, Rabih Bashroush:
Case Studies for Achieving a Return on Investment With a Hardware Refresh in Organizations With Small Data Centers. IEEE Trans. Sustain. Comput. 6(4): 599-611 (2021) - [c30]Eoin Woods, Rabih Bashroush:
How Software Architects Focus Their Attention. ECSA 2021: 312-326
2010 – 2019
- 2019
- [j17]Daniel Schatz, Rabih Bashroush:
Security predictions - A way to reduce uncertainty. J. Inf. Secur. Appl. 45: 107-116 (2019) - [j16]Irene Kilanioti, Alejandro Fernández-Montes, Damián Fernández-Cerero, Christos Mettouris, Valentina Nejkovic, Rabih Bashroush, George A. Papadopoulos:
A survey on cost-effective context-aware distribution of social data streams over energy-efficient data centres. Simul. Model. Pract. Theory 93: 42-64 (2019) - [p1]Irene Kilanioti, Alejandro Fernández-Montes, Damián Fernández-Cerero, Anthony Karageorgos, Christos Mettouris, Valentina Nejkovic, Nikolas Albanis, Rabih Bashroush, George A. Papadopoulos:
Towards Efficient and Scalable Data-Intensive Content Delivery: State-of-the-Art, Issues and Challenges. High-Performance Modelling and Simulation for Big Data Applications 2019: 88-137 - 2018
- [j15]Daniel Schatz, Rabih Bashroush:
Corporate Information Security Investment Decisions: A Qualitative Data Analysis Approach. Int. J. Enterp. Inf. Syst. 14(2): 1-20 (2018) - [j14]Daniel Schatz, Rabih Bashroush:
A Structural Model Approach for Assessing Information Security Value in Organizations. Int. J. Strateg. Decis. Sci. 9(4): 47-69 (2018) - [j13]Umaima Haider, John D. McGregor, Rabih Bashroush:
The ALI Architecture Description Language. ACM SIGSOFT Softw. Eng. Notes 43(4): 52 (2018) - [j12]Rabih Bashroush:
A Comprehensive Reasoning Framework for Hardware Refresh in Data Centers. IEEE Trans. Sustain. Comput. 3(4): 209-220 (2018) - 2017
- [j11]Rabih Bashroush, Muhammad Garba, Rick Rabiser, Iris Groher, Goetz Botterweck:
CASE Tool Support for Variability Management in Software Product Lines. ACM Comput. Surv. 50(1): 14:1-14:45 (2017) - [j10]Daniel Schatz, Rabih Bashroush:
Economic valuation for information security investment: a systematic literature review. Inf. Syst. Frontiers 19(5): 1205-1228 (2017) - [j9]Daniel Schatz, Rabih Bashroush, Julie A. Wall:
Towards a More Representative Definition of Cyber Security. J. Digit. Forensics Secur. Law 12(2): 53-74 (2017) - [j8]Rabih Bashroush, Eoin Woods:
Architectural Principles for Energy-Aware Internet-Scale Applications. IEEE Softw. 34(3): 14-17 (2017) - [c29]Eoin Woods, Rabih Bashroush:
A Model for Prioritization of Software Architecture Effort. ECSA 2017: 183-190 - [c28]Joseph Doyle, Syed Islam, Rabih Bashroush, Donal O'Mahony:
Cloud Strife: Expanding the Horizons of Cloud Gaming Services. SERVICES 2017: 9-16 - [c27]Nigar Jebraeil, Adel Noureddine, Joseph Doyle, Syed Islam, Rabih Bashroush:
gUML: Reasoning about Energy at Design Time by Extending UML Deployment Diagrams with Data Centre Contextual Information. SERVICES 2017: 59-66 - 2016
- [j7]Daniel Schatz, Rabih Bashroush:
The impact of repeated data breach events on organisations' market value. Inf. Comput. Secur. 24(1): 73-92 (2016) - [j6]Rabih Bashroush, Eoin Woods, Adel Noureddine:
Data Center Energy Demand: What Got Us Here Won't Get Us There. IEEE Softw. 33(2): 18-21 (2016) - [c26]Adel Noureddine, Syed Islam, Rabih Bashroush:
Jolinar: analysing the energy footprint of software applications (demo). ISSTA 2016: 445-448 - [c25]Syed Islam, Adel Noureddine, Rabih Bashroush:
Measuring energy footprint of software features. ICPC 2016: 1-4 - [c24]Muhammad Garba, Adel Noureddine, Rabih Bashroush:
MUSA: A Scalable Multi-touch and Multi-perspective Variability Management Tool. WICSA 2016: 299-302 - 2015
- [j5]Usman Naeem, Rabih Bashroush, Richard Anthony, Muhammad Awais Azam, Abdel-Rahman H. Tawil, Sin Wee Lee, Dennis Mou-Ling:
Activities of daily life recognition using process representation modelling to support intention analysis. Int. J. Pervasive Comput. Commun. 11(3): 347-371 (2015) - [j4]Eoin Woods, Rabih Bashroush:
Modelling large-scale information systems using ADLs - An industrial experience report. J. Syst. Softw. 99: 97-108 (2015) - 2014
- [j3]Abdel-Rahman H. Tawil, Adel Taweel, Usman Naeem, Matthew Montebello, Rabih Bashroush, Ameer Al-Nemrat:
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. J. Intell. Inf. Syst. 43(1): 1-32 (2014) - [c23]Kingsley Okoye, Abdel-Rahman H. Tawil, Usman Naeem, Rabih Bashroush, Elyes Lamine:
A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning. EUSPN/ICTH 2014: 203-210 - [c22]Kingsley Okoye, Abdel-Rahman H. Tawil, Usman Naeem, Rabih Bashroush, Elyes Lamine:
A Semantic Rule-Based Approach Towards Process Mining for Personalised Adaptive Learning. HPCC/CSS/ICESS 2014: 929-936 - 2013
- [j2]Rabih Bashroush, Moustafa Noureddine:
A cost effective cloud data centre capacity planning method based on modality cost analysis. Int. J. Commun. Networks Distributed Syst. 11(3): 250-261 (2013) - [j1]Moustafa Noureddine, Rabih Bashroush:
An authentication model towards cloud federation in the enterprise. J. Syst. Softw. 86(9): 2269-2275 (2013) - 2012
- [c21]Usman Naeem, Abdel-Rahman H. Tawil, Rabih Bashroush, Ameer Al-Nemrat:
Achieving Model Completeness for Hierarchally Structured Activities of Daily Life. PECCS 2012: 51-57 - [c20]Eoin Woods, Rabih Bashroush:
Using an Architecture Description Language to Model a Large-Scale Information System - An Industrial Experience Report. WICSA/ECSA 2012: 239-243 - [e1]Christos K. Georgiadis, Hamid Jahankhani, Elias Pimenidis, Rabih Bashroush, Ameer Al-Nemrat:
Global Security, Safety and Sustainability & e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 99, Springer 2012, ISBN 978-3-642-33447-4 [contents] - 2011
- [c19]Rabih Bashroush, Ameer Al-Nemrat, M. Bachrouch, Hamid Jahankhani:
Visualizing Variability Models Using Hyperbolic Trees. CAiSE Forum 2011: 113-120 - [c18]Fawzi Fawzi, Rabih Bashroush, Hamid Jahankhani:
GSi Compliant RAS for Public Private Sector Partnership. ICGS3/e-Democracy 2011: 67-71 - [c17]Nurdeen M. Ibrahim, Ameer Al-Nemrat, Hamid Jahankhani, Rabih Bashroush:
Sufficiency of Windows Event Log as Evidence in Digital Forensics. ICGS3/e-Democracy 2011: 253-262 - 2010
- [c16]Rabih Bashroush:
A NUI Based Multiple Perspective Variability Modeling CASE Tool. ECSA 2010: 523-526 - [c15]Rabih Bashroush:
A Scalable Multiple Perspective Variability Management CASE Tool. SPLC Workshops 2010: 295
2000 – 2009
- 2008
- [b1]Rabih Bashroush:
A design framework for software product lines. Queen's University Belfast, UK, 2008 - [c14]Mathias Fritzsche, Wasif Gilani, Ivor T. A. Spence, T. John Brown, Peter Kilpatrick, Rabih Bashroush:
Towards Performance Related Decision Support for Model Driven Engineering of Enterprise SOA Applications. ECBS 2008: 57-65 - [c13]Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown, Wasif Gilani, Mathias Fritzsche:
ALI: An Extensible Architecture Description Language for Industrial Applications. ECBS 2008: 297-304 - [c12]Rabih Bashroush, Ivor T. A. Spence:
An Extensible ADL for Service-Oriented Architectures. ISD 2008: 227-237 - [c11]Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, Thomas Brown, Charles Gillan:
A Multiple Views Model for Variability Management in Software Product Lines. VaMoS 2008: 101-110 - 2007
- [c10]T. John Brown, Rachel Gawley, Ivor T. A. Spence, Peter Kilpatrick, Charles Gillan, Rabih Bashroush:
Requirements Modelling and Design Notations for Software Product Lines. VaMoS 2007: 27-35 - [c9]Charles Gillan, Peter Kilpatrick, Ivor T. A. Spence, T. John Brown, Rabih Bashroush, Rachel Gawley:
Challenges in the Application of Feature Modelling in Fixed Line Telecommunications. VaMoS 2007: 141-148 - 2006
- [c8]Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown:
Towards More Flexible Architecture Description Languages for Industrial Applications. EWSA 2006: 212-219 - [c7]T. John Brown, Rachel Gawley, Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, Charles Gillan:
Weaving Behavior into Feature Models for Embedded System Families. SPLC 2006: 52-64 - 2005
- [c6]Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown:
A generic reference software architecture for load balancing over mirrored Web servers: NaSr case study. AICCSA 2005: 132 - [c5]Rabih Bashroush, T. John Brown, Ivor T. A. Spence, Peter Kilpatrick:
ADLARS: An Architecture Description Language for Software Product Lines. SEW 2005: 163-173 - [c4]T. John Brown, Rabih Bashroush, Charles Gillan, Ivor T. A. Spence, Peter Kilpatrick:
Feature-Guided Architecture Development for Embedded System Families. WICSA 2005: 223-226 - 2004
- [c3]Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown:
Towards an automated evaluation process for software architectures. IASTED Conf. on Software Engineering 2004: 54-58 - [c2]Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown:
Using the NaSr architectural style to solve the broken hyperlink problem. IASTED Conf. on Software Engineering and Applications 2004: 139-143 - [c1]Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown:
A Network Architectural Style for Real-time Systems: NaSr. WICSA 2004: 321-324
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint