Aakash Ahmad
Aakash Ahmad
Assistant Professor - Lancaster University Leipzig
Verified email at
Cited by
Cited by
Cloud migration research: a systematic review
P Jamshidi, A Ahmad, C Pahl
IEEE transactions on cloud computing 1 (2), 142-157, 2013
Autonomic resource provisioning for cloud-based software
P Jamshidi, A Ahmad, C Pahl
Proceedings of the 9th international symposium on software engineering for …, 2014
Software architectures for robotic systems: A systematic mapping study
A Ahmad, MA Babar
Journal of Systems and Software 122, 16-39, 2016
A framework for classifying and comparing architecture-centric software evolution research
P Jamshidi, M Ghafari, A Ahmad, C Pahl
2013 17th European Conference on Software Maintenance and Reengineering, 305-314, 2013
A framework for architecture-driven migration of legacy systems to cloud-enabled software
A Ahmad, MA Babar
Proceedings of the WICSA 2014 Companion Volume, 1-8, 2014
Smart Societies, Infrastructure, Technologies and Applications: First International Conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings
R Mehmood, B Bhaduri, I Katib, I Chlamtac
Springer, 2018
Classification and comparison of architecture evolution reuse knowledge—a systematic review
A Ahmad, P Jamshidi, C Pahl
Journal of Software: Evolution and Process 26 (7), 654-691, 2014
Architecting software for the internet of thing based systems
A Alreshidi, A Ahmad
Future Internet 11 (7), 153, 2019
Security and privacy for mHealth and uHealth systems: a systematic mapping study
LH Iwaya, A Ahmad, MA Babar
IEEE Access 8, 150081-150112, 2020
A Pattern Language for Evolution Reuse in Component-Based Software Archiecures
A Ahmad
Dublin City University, 2015
Cloud-based detection of road bottlenecks using OBD-II telematics
AM Sohail, KS Khattak, A Iqbal, ZH Khan, A Ahmad
2019 22nd International Multitopic Conference (INMIC), 1-7, 2019
Classification and mapping of adaptive security for mobile computing
M Sajjad, A Ahmad, AW Malik, AB Altamimi, I Alseadoon
IEEE Transactions on Emerging Topics in Computing 8 (3), 814-832, 2018
Graph-based pattern identification from architecture change logs
A Ahmad, P Jamshidi, C Pahl
Advanced Information Systems Engineering Workshops: CAiSE 2012 International …, 2012
Software Engineering for Internet of Things
M Fahmideh, AA Abbasi, A Behnaz, J Grundy, W Susilo
IEEE Transactions on Software Engineering, 2022
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8, 1-24, 2018
Graph-based implicit knowledge discovery from architecture change logs
A Ahmad, P Jamshidi, M Arshad, C Pahl
Proceedings of the WICSA/ECSA 2012 Companion Volume, 116-123, 2012
Formal analysis of language-based android security using theorem proving approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective
B Aljedaani, A Ahmad, M Zahedi, MA Babar
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 208-217, 2020
Pattern-driven Reuse in Architecture-centric Evolution for Service Software
CP Aakash Ahmad, Pooyan Jamshidi
7th International Conference on Software Paradigm Trends (ICSOFT), 279 - 284, 2012
Ethics of AI: A systematic literature review of principles and challenges
AA Khan, S Badshah, P Liang, M Waseem, B Khan, A Ahmad, ...
Proceedings of the International Conference on Evaluation and Assessment in …, 2022
The system can't perform the operation now. Try again later.
Articles 1–20