default search action
Moheb R. Girgis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Moheb R. Girgis, Tarek M. Mahmoud, Hagar M. Azzam:
SA-Based QoS Aware Workflow Scheduling of Collaborative Tasks in Grid Computing. Int. J. Comput. 23(1): 61-71 (2024) - [j23]Moheb R. Girgis, Tarek M. Mahmoud, Hagar M. Azzam:
GA-based QOS-aware workflow scheduling of deadline tasks in grid computing. Knowl. Inf. Syst. 66(5): 2859-2884 (2024) - 2020
- [j22]Moheb R. Girgis, Bahgat A. Abdel Latef, Tahany Akl:
A GUI Testing Strategy and Tool for Android Apps. Int. J. Comput. 19: 355-364 (2020) - [c7]Moheb R. Girgis, Enas F. El-Geldawi, Rofida Mohammed Gamal:
A Comparative Study of Various Deep Learning Architectures for 8-state Protein Secondary Structures Prediction. AISI 2020: 501-513
2010 – 2019
- 2019
- [j21]Ahmed S. Ghiduk, Moheb R. Girgis, Marwa H. Shehata:
Employing Dynamic Symbolic Execution for Equivalent Mutant Detection. IEEE Access 7: 163767-163777 (2019) - 2017
- [j20]Ahmed S. Ghiduk, Moheb R. Girgis, Marwa H. Shehata:
Higher order mutation testing: A Systematic Literature Review. Comput. Sci. Rev. 25: 29-48 (2017) - [c6]Hatem A. EL-Azab, Moheb R. Girgis, Essameldin F. Elfakharany, Mohamed Elemam Shehab:
Turning a Highly Reliable, Self-Repairing μ-Kernel OS into a Multicore-Based OS. ICCTA 2017: 39-49 - 2010
- [j19]Moheb R. Girgis, Tarek M. Mahmoud, Tarek Abd El-Hafeez:
A New Effective System for Filtering Pornography Images from Web Pages and PDF Files. Int. J. Web Appl. 2(1): 1-13 (2010) - [j18]Ahmed S. Ghiduk, Moheb R. Girgis:
Using Genetic Algorithms and Dominance Concepts for Generating Reduced Test Data. Informatica (Slovenia) 34(3): 377-385 (2010) - [i1]Moheb R. Girgis, Tarek M. Mahmoud, Youssef S. Takroni, Hassan S. Hassan:
Performance evaluation of a new route optimization technique for mobile IP. CoRR abs/1004.0771 (2010)
2000 – 2009
- 2009
- [j17]Moheb R. Girgis, Adel A. Sewisy, Romany Fouad Mansour:
A robust method for partial deformed fingerprints verification using genetic algorithm. Expert Syst. Appl. 36(2): 2008-2016 (2009) - [c5]Ahmed Swilem, Moheb R. Girgis, Elnomairy A. Zanaty, Rania Ramadan:
An algorithm for mean pyramids vector quantization using Hadamard transform and tree structure. ICIP 2009: 1929-1932 - 2007
- [j16]Abdelaziz M. Khamis, Moheb R. Girgis, Ahmed S. Ghiduk:
Automatic Software Test Data Generation for Spanning Sets Coverage Using Genetic Algorithms. Comput. Informatics 26(4): 383-401 (2007) - [j15]Moheb R. Girgis, Abd El-Mgeid A. Aly, Bahgat A. Abdel Latef, Boutros R. El-Gamil:
Biological Model for Information Retrieval. J. Digit. Inf. Manag. 5(3): 123-129 (2007) - [c4]Ahmed S. Ghiduk, Mary Jean Harrold, Moheb R. Girgis:
Using Genetic Algorithms to Aid Test-Data Generation for Data-Flow Coverage. APSEC 2007: 41-48 - [c3]Mohammed Kayed, Chia-Hui Chang, Khaled Shaalan, Moheb R. Girgis:
FiVaTech: Page-Level Web Data Extraction from Template Pages. ICDM Workshops 2007: 15-20 - 2006
- [j14]Chia-Hui Chang, Mohammed Kayed, Moheb R. Girgis, Khaled F. Shaalan:
A Survey of Web Information Extraction Systems. IEEE Trans. Knowl. Data Eng. 18(10): 1411-1428 (2006) - [c2]Moheb R. Girgis, Abd El-Mgeid A. Aly, Bahgat A. Abdel Latef, Boutros R. El-Gamil:
Biological Environment For Information Retrieval. ISDA (2) 2006: 1182-1188 - 2005
- [j13]Ahmed Younes, Moheb R. Girgis:
A tool for computing computer network reliability. Int. J. Comput. Math. 82(12): 1455-1465 (2005) - [j12]Moheb R. Girgis:
Automatic Test Data Generation for Data Flow Testing Using a Genetic Algorithm. J. Univers. Comput. Sci. 11(6): 898-915 (2005) - [j11]Ennumeri A. Zanaty, Moheb R. Girgis:
Collect the Fitted Surfaces Into Complex Based On C0 Continuity. J. Univers. Comput. Sci. 11(6): 1102-1114 (2005) - 2003
- [j10]Ahmed Younes, Moheb R. Girgis:
A Tool for Computing the Reliability of Computer Networks. Egypt. Comput. Sci. J. 25(1) (2003) - [j9]Moheb R. Girgis, A. A. Aly:
A Feature Selection and Classification Technique for Text Categorization. Int. J. Cooperative Inf. Syst. 12(4): 441-454 (2003) - 2001
- [j8]Moheb R. Girgis, Ahmed Younes:
Data Flow Testing of Knowledge-Based Systems. Egypt. Comput. Sci. J. 23(1) (2001) - [j7]Ahmed Younes, Moheb R. Girgis, M. R. Hassan:
An Approach to Find an Optimum Design Network Using Genetic Algorithm. Egypt. Comput. Sci. J. 23(1) (2001) - 2000
- [j6]Ahmed Younes, Moheb R. Girgis, M. R. Hassan:
An Approach to the Verification and Correction of Knowledge-Based Systems. Egypt. Comput. Sci. J. 22(1) (2000) - [j5]Ahmed A. A Radwan, Moheb R. Girgis, Alla A. Ghanem:
A Study of the Area of Drawing Level Graphs. Egypt. Comput. Sci. J. 22(2) (2000) - [j4]Ahmed A. A Radwan, Tarek M. Mahmoud, Moheb R. Girgis, Enas F. El-Geldawi:
Improving the Efficiency of the Flow Deviation Method for Solving the Optimal Routing Problem in a Packet-switched Computer Network. Egypt. Comput. Sci. J. 22(2) (2000)
1990 – 1999
- 1993
- [j3]Moheb R. Girgis:
Using Symbolic Execution and Data Flow Criteria to Aid Test Data Selection. Softw. Test. Verification Reliab. 3(2): 101-112 (1993) - [j2]Moheb R. Girgis:
Corrigendum for "Constraint-Based Automatic Test Data Generation". (R. A. De Millo and A. J. Offutt, IEEE Trans. Software Eng. vol. 17. no. pp 900-910, Sept. 1991.). IEEE Trans. Software Eng. 19(6): 640 (1993) - 1992
- [j1]Moheb R. Girgis:
An experimental evaluation of a symbolic execution system. Softw. Eng. J. 7(4): 285-290 (1992)
1980 – 1989
- 1986
- [b1]Moheb R. Girgis:
Studies of program test coverage criteria and the development of an automated support system. University of Liverpool, UK, 1986 - 1985
- [c1]Moheb R. Girgis, Martin R. Woodward:
An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis. ICSE 1985: 313-319
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint