Follow
Ahmed Tamrawi
Ahmed Tamrawi
EnSoft Corp.
Verified email at ensoftcorp.com - Homepage
Title
Cited by
Cited by
Year
eHealth Cloud Security Challenges: A Survey
Y Al-Issa, A Ottom, Mohammad Ashraf, Tamrawi
Journal of Healthcare Engineering 2019, 15, 2019
2512019
Fuzzy set and cache-based approach for bug triaging
A Tamrawi, TT Nguyen, JM Al-Kofahi, TN Nguyen
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
2272011
Graph-based pattern-oriented, context-sensitive source code completion
AT Nguyen, TT Nguyen, HA Nguyen, A Tamrawi, HV Nguyen, J Al-Kofahi, ...
2012 34th International Conference on Software Engineering (ICSE), 69-79, 2012
2022012
Fuzzy set-based automatic bug triaging (NIER track)
A Tamrawi, TT Nguyen, J Al-Kofahi, TN Nguyen
Proceedings of the 33rd international conference on software engineering …, 2011
1112011
Build code analysis with symbolic evaluation
A Tamrawi, HA Nguyen, HV Nguyen, TN Nguyen
2012 34th International Conference on Software Engineering (ICSE), 650-660, 2012
952012
Fuzzy set approach for automatic tagging in evolving software
JM Al-Kofahi, A Tamrawi, TT Nguyen, HA Nguyen, TN Nguyen
2010 IEEE international conference on software maintenance, 1-10, 2010
572010
SYMake: a build code analysis and refactoring tool for makefiles
A Tamrawi, HA Nguyen, HV Nguyen, TN Nguyen
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
412012
Modeling lessons from verifying large software systems for safety and security
S Kothari, P Awadhutkar, A Tamrawi, J Mathews
2017 Winter Simulation Conference (WSC), 1431-1442, 2017
172017
Projected control graph for accurate and efficient analysis of safety and security vulnerabilities
A Tamrawi, S Kothari
2016 23rd Asia-Pacific Software Engineering Conference (APSEC), 113-120, 2016
142016
A “Human-in-the-loop” approach for resolving complex software anomalies
S Kothari, A Deepak, A Tamrawi, B Holland, S Krishnan
2014 IEEE international conference on systems, man, and cybernetics (SMC …, 2014
132014
Event-flow graphs for efficient path-sensitive analyses
A Tamrawi, S Kothari
arXiv preprint arXiv:1404.1279, 2014
102014
Comb: Computing relevant program behaviors
B Holland, P Awadhutkar, S Kothari, A Tamrawi, J Mathews
Proceedings of the 40th International Conference on Software Engineering …, 2018
92018
Projected control graph for computing relevant program behaviors
A Tamrawi, S Kothari
Science of Computer Programming 163, 93-114, 2018
82018
Human-machine resolution of invisible control flow?
S Kothari, A Tamrawi, J Mathews
2016 IEEE 24th International Conference on Program Comprehension (ICPC), 1-4, 2016
82016
Let's verify linux: Accelerated learning of analytical reasoning through automation and collaboration
S Kothari, A Tamrawi, J Sauceda, J Mathews
Proceedings of the 38th International Conference on Software Engineering …, 2016
72016
Catastrophic cyber-physical malware
S Kothari, GR Santhanam, P Awadhutkar, B Holland, J Mathews, ...
Versatile Cybersecurity, 201-255, 2018
42018
Insights for practicing engineers from a formal verification study of the linux kernel
S Kothari, P Awadhutkar, A Tamrawi
2016 IEEE International Symposium on Software Reliability Engineering …, 2016
32016
Rethinking verification: accuracy, efficiency and scalability through human-machine collaboration
S Kothari, A Tamrawi, J Mathews
Proceedings of the 38th International Conference on Software Engineering …, 2016
32016
Control flow equivalence method for establishing sanctity of compiling
P Awadhutkar, A Tamrawi, R Goluch, S Kothari
Computers & Security 115, 102608, 2022
22022
Evidence-enabled verification for the Linux kernel
A Tamrawi
22016
The system can't perform the operation now. Try again later.
Articles 1–20