• A deep learning system for recognizing facial expression in real-time 

      Miao, Yu; Dong, Haiwei; Al Jaam, Jihad Mohamad; El Saddik, Abdulmotaleb ( Association for Computing Machinery , 2019 , Article)
      This article presents an image-based real-time facial expression recognition system that is able to recognize the facial expressions of several subjects on a webcam at the same time. Our proposed methodology combines a ...
    • A Generative Approach to Enrich Arabic Story Text with Visual Aids 

      Zakraoui, Jezia; Al Maadeed, Somaya; Abou El-Seoud, Mohamed Samir; Alja'am, Jihad M.; Salah, Moutaz ( Association for Computing Machinery , 2021 , Conference Paper)
      Enriching the script of a story with visual aids is an effective approach for promoting language learning and literacy development for young children and learners. In this paper, we propose a new system, that can generate ...
    • A meta-framework for modeling the human reading process in sentiment analysis 

      Baly, Ramy; Hobeica, Roula; Hajj, Hazem; El-Hajj, Wassim; Shaban, Khaled Bashir; ... more authors ( Association for Computing Machinery , 2016 , Article)
      This article introduces a sentiment analysis approach that adopts the way humans read, interpret, and extract sentiment from text. Our motivation builds on the assumption that human interpretation should lead to the most ...
    • A predictive control approach for fault management of computing systems 

      Jia, Rui; Abdelwahed, Sherif; Erradi, Abdelkarim ( Association for Computing Machinery , 2015 , Conference Paper)
      In this paper, a model-based predictive control approach for fault management in computing systems is presented. The proposed approach can incorporate existing fault diagnosis methods and fault recovery actions to facilitate ...
    • A quality of experience model for haptic virtual environments 

      Hamam, Abdelwahab; Saddik, Abdulmotaleb El; Alja'am, Jihad ( Association for Computing Machinery , 2014 , Article)
      Haptic-based Virtual Reality (VR) applications have many merits. What is still obscure, from the designer's perspective of these applications, is the experience the users will undergo when they use the VR system. Quality ...
    • A sentiment treebank and morphologically enriched recursive deep models for effective sentiment analysis in Arabic 

      Baly, Ramy; Hajj, Hazem; Habash, Nizar; Shaban, Khaled Bashir; El-Hajj, Wassim ( Association for Computing Machinery , 2017 , Article)
      Accurate sentiment analysis models encode the sentiment of words and their combinations to predict the overall sentiment of a sentence. This task becomes challenging when applied to morphologically rich languages (MRL). ...
    • A service computing manifesto: The next 10 years 

      Bouguettaya, Athman; Singh, Munindar P.; Huhns, Michael N.; Sheng, Quan Z.; Dong, Hai; ... more authors ( Association for Computing Machinery , 2017 , Article Review)
      Mapping out the challenges and strategies for the widespread adoption of service computing is an important task. Service computing is a key paradigm that offers cross-disciplinary computational abstractions, architectures, ...
    • A survey of opinion mining in Arabic: A comprehensive system perspective covering challenges and advances in tools, resources, models, applications, and visualizations 

      Badaro G.; Baly R.; Hajj H.; El-Hajj W.; Shaban K.B.; ... more authors ( Association for Computing Machinery , 2019 , Article Review)
      Opinion-mining or sentiment analysis continues to gain interest in industry and academics. While there has been significant progress in developing models for sentiment analysis, the field remains an active area of research ...
    • Anonymity and privacy in bitcoin escrow trades 

      Sabry F.; Labda W.; Erbad A.; Al Jawaheri H.; Malluhi Q. ( Association for Computing Machinery , 2019 , Conference Paper)
      As a decentralized cryptocurrency, Bitcoin has been in market for around a decade. Bitcoin transactions are thought to be pseudoanonymous, however, there were many attempts to deanonymize these transactions making use of ...
    • AROMA: A recursive deep learning model for opinion mining in Arabic as a low resource language 

      Al-Sallab, Ahmad; Baly, Ramy; Hajj, Hazem; Shaban, Khaled Bashir; El-Hajj, Wassim; ... more authors ( Association for Computing Machinery , 2017 , Article Review)
      While research on English opinion mining has already achieved significant progress and success, work on Arabic opinion mining is still lagging. This is mainly due to the relative recency of research efforts in developing ...
    • Cloud computing without seeing 

      Malluhi, Qutaibah; Khan, Khaled M. ( Association for Computing Machinery , 2011 , Conference Paper)
      In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
    • Constraint-enhanced role engineering via answer set programming 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Association for Computing Machinery , 2012 , Conference Paper)
      Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild 

      Pour M.S.; Mangino A.; Friday K.; Rathbun M.; Bou-Harb E.; ... more authors ( Association for Computing Machinery , 2019 , Conference Paper)
      The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructure realms. Several challenges impede addressing IoT security at large, including, the lack of IoT-centric ...
    • Digital library initiative: A project for educators in qatar 

      Tabet, Myrna; Kanan, Tarek; Alhoori, Hamed; Lukesh, Susan S.; Thompson, Carole; ... more authors ( Association for Computing Machinery , 2013 , Article)
      This article presents the first phase of an exciting initiative in the Arabian Gulf State of Qatar that brings together four academic institutions working to develop a digital library infrastructure of people, services, ...
    • Efficient Test Collection Construction via Active Learning 

      Rahman, Md Mustafizur; Kutlu, Mucahid; Elsayed, Tamer; Lease, Matthew ( Association for Computing Machinery , 2020 , Conference Paper)
      To create a new IR test collection at low cost, it is valuable to carefully select which documents merit human relevance judgments. Shared task campaigns such as NIST TREC pool document rankings from many participating ...
    • Flipping introductory programming class: Potentials, challenges, and research gaps 

      Alhazbi S.; Halabi O. ( Association for Computing Machinery , 2018 , Conference Paper)
      This paper discusses the suitability of adopting flipped classroom model as instructional method to teach introductory computer programming courses at higher education. It explores how the potentials of this model can be ...
    • Fun to learn: Project-based learning in robotics for computer engineers 

      Qidwai, Uvais ( Association for Computing Machinery , 2011 , Article)
      This article shares my experiences with the project-based methodology of teaching the same material that a standard text in robotics would teach and will comparatively elaborate the improvement observed in the group of ...
    • Input forager: A user-driven interaction adaptation approach for head worn displays 

      Al-Sada, Mohammed; Ishizawa, Fumiko; Tsurukawa, Junichi; Nakajima, Tatsuo ( Association for Computing Machinery , 2016 , Conference Paper)
      Input Forager is a user-driven adaptation approach that enables users to flexibly borrow different embedded inputs from smartwatches, smartphones and tablets, then map borrowed inputs to interaction-events that effect Head ...
    • IoT for smart city services: Lifecycle approach 

      Hefnawy, Ahmed; Bouras, Abdelaziz; Cherifi, Chantal ( Association for Computing Machinery , 2016 , Conference Paper)
      "Internet of Things" (IoT) and "Smart City" are widely recognized to address the complexity of modern city operation. Concentration of population, scarcity of resources and environmental concerns are the main challenges ...