El-Sayed M. El-Horbaty
According to our database1,
El-Sayed M. El-Horbaty
authored at least 32 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Biometric systems for identification and verification scenarios using spatial footsteps components.
Neural Comput. Appl., 2024
Int. J. Online Biomed. Eng., 2024
2023
Proceedings of the 25th International Conference on Enterprise Information Systems, 2023
2022
CoRR, 2022
RMAWS: An Hybrid Architecture for achieving Web Services Reliability in Mobile Cloud Computing.
CoRR, 2022
2021
An integrated three-tier trust management framework in mobile edge computing using fuzzy logic.
PeerJ Comput. Sci., 2021
A Survey Study and Analysis of Task Scheduling Approaches for the Major Computing Environments.
Proceedings of the 17th International Conference on Web Information Systems and Technologies, 2021
2020
CoRR, 2020
Proceedings of the 3rd International Conference on Informatics & Data-Driven Medicine, Växjö, Sweden, November 19, 2020
2019
Mach. Learn. Knowl. Extr., 2019
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2019
2018
RSAM: An enhanced architecture for achieving web services reliability in mobile cloud computing.
J. King Saud Univ. Comput. Inf. Sci., 2018
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2018
2016
Proceedings of the New Approaches in Intelligent Control, 2016
2015
A Simulation Modeling Approach for Optimization of Storage Space Allocation in Container Terminal.
CoRR, 2015
CoRR, 2015
2014
Cryptographic Cloud Computing Environment as a More Trusted Communication Environment.
Int. J. Grid High Perform. Comput., 2014
CoRR, 2014
A Comparative Study of Meta-heuristic Algorithms for Solving Quadratic Assignment Problem.
CoRR, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the Third International Conference on Cyber Security, 2014
2013
A comparative study between modern encryption algorithms based on cloud computing environment.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2012
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
2003
An Approach on Database Index Schemes.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'03, June 23, 2003
2002
Autoregressive Filter Algorithm for Sifting Digital Images.
Int. J. Comput. Their Appl., 2002
2000
Egypt. Comput. Sci. J., 2000
Egypt. Comput. Sci. J., 2000
Egypt. Comput. Sci. J., 2000
1992