Mona Ali Nashaat
72  results:
Search for persons X
?
2

Detecting Security Vulnerabilities in Object-Oriented PHP P..:

, In: 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM),
Nashaat, Mona ; Ali, Karim ; Miller, James - p. 159-164 , 2017
 
?
8

Utilizing Deep Reinforcement Learning for Resource Scheduli..:

, In: Engineering Solutions Toward Sustainable Development; Earth and Environmental Sciences Library,
Nashaat, Mona ; Nashaat, Heba - p. 471-484 , 2024
 
?
10

VisExPreS: A Visual Interactive Toolkit for User-Driven Eva..:

Ghosh, Aindrila ; Nashaat, Mona ; Miller, James.
IEEE Transactions on Visualization and Computer Graphics.  28 (2022)  7 - p. 2791-2807 , 2022
 
?
11

LTE Downlink Scheduling with Soft Policy Gradient Learning:

, In: The 8th International Conference on Advanced Machine Learning and Technologies and Applications (AMLTA2022); Lecture Notes on Data Engineering and Communications Technologies,
 
?
12

Comprehensive Study on Machine Learning-Based Container Sch..:

, In: The 8th International Conference on Advanced Machine Learning and Technologies and Applications (AMLTA2022); Lecture Notes on Data Engineering and Communications Technologies,
Moussa, Walid ; Nashaat, Mona ; Saber, Walaa. - p. 581-592 , 2022
 
?
13

Interpretation of Structural Preservation in Low-Dimensiona..:

Ghosh, Aindrila ; Nashaat, Mona ; Miller, James.
IEEE Transactions on Knowledge and Data Engineering.  34 (2022)  5 - p. 2227-2240 , 2022
 
?
14

Context-Based Evaluation of Dimensionality Reduction Algori..:

Ghosh, Aindrila ; Nashaat, Mona ; Miller, James.
ACM Transactions on Knowledge Discovery from Data (TKDD).  15 (2021)  2 - p. 1-40 , 2021
 
?
15

Context-Based Evaluation of Dimensionality Reduction Algori..:

Ghosh, Aindrila ; Nashaat, Mona ; Miller, James.
ACM Transactions on Knowledge Discovery from Data.  15 (2021)  2 - p. 1-40 , 2021
 
1-15