default search action
Eyas El-Qawasmeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2015
- [j22]Ahmad A. Al-Daraiseh, Eyas El-Qawasmeh, Nazaraf Shah:
Multi-agent system for energy consumption optimisation in higher education institutions. J. Comput. Syst. Sci. 81(6): 958-965 (2015) - 2013
- [j21]Ahmad A. Al-Daraiseh, Nazaraf Shah, Eyas El-Qawasmeh:
An Intelligent Energy Management System for Educational Buildings. Int. J. Distributed Sens. Networks 9 (2013) - 2011
- [j20]Fouzi Harrag, Aboubekeur Hamdi-Cherif, AbdulMalik S. Al-Salman, Eyas El-Qawasmeh:
Evaluating the effectiveness of VSM model and topic segmentation in retrieving arabic documents. Comput. Syst. Sci. Eng. 26(1) (2011) - [j19]Eyas El-Qawasmeh:
Categorizing received email to improve delivery. Comput. Syst. Sci. Eng. 26(2) (2011) - [j18]Eyas El-Qawasmeh, Maytham Safar, Talal Kanan:
Investigation of golay code (24, 12, 8) structure in improving search techniques. Int. Arab J. Inf. Technol. 8(3): 265-271 (2011) - 2010
- [j17]Ahmad Kayed, Eyas El-Qawasmeh, Zakaryia Qawaqneh:
Ranking web sites using domain ontology concepts. Inf. Manag. 47(7-8): 350-355 (2010) - 2008
- [j16]Ismail Hmeidi, Bilal Hawashin, Eyas El-Qawasmeh:
Performance of KNN and SVM classifiers on full word Arabic articles. Adv. Eng. Informatics 22(1): 106-111 (2008) - [j15]Jan Platos, Václav Snásel, Eyas El-Qawasmeh:
Compression of small text files. Adv. Eng. Informatics 22(3): 410-417 (2008) - [j14]Fouzi Harrag, Aboubekeur Hamdi-Cherif, Eyas El-Qawasmeh:
Information Retrieval Architecture for "Hadith" Text Mining. J. Digit. Inf. Manag. 6(6): 449-455 (2008) - 2006
- [j13]Pit Pichappan, Eyas El-Qawasmeh:
In this issue. J. Digit. Inf. Manag. 4(3): 158 (2006) - 2005
- [j12]Eyas El-Qawasmeh, Khader Al-Noubani:
Reducing the Time Complexity of the N-Queens Problem. Int. J. Artif. Intell. Tools 14(3): 545- (2005) - [j11]Ali Al-Dahoud, Eyas El-Qawasmeh, Abdelfatah A. Yahya, Ahmad Dalal'ah:
Editorial. J. Digit. Inf. Manag. 3(3): 155 (2005) - 2004
- [j10]Eyas El-Qawasmeh:
Word Prediction via a Clustered Optimal Binary Search Tree. Int. Arab J. Inf. Technol. 1(1) (2004) - [j9]Eyas El-Qawasmeh, Abdel Elah Al-Ayyoub, Nayef Abu-Ghazaleh:
Quick Matrix Multiplication on Clusters of Workstations. Informatica 15(2): 203-218 (2004) - [j8]Eyas El-Qawasmeh:
Word prediction using a clustered optimal binary search tree. Inf. Process. Lett. 92(5): 257-265 (2004) - 2003
- [j7]Eyas El-Qawasmeh:
Scene Change Detection Schemes for Video Indexing in Uncompressed Domain. Informatica 14(1): 19-36 (2003) - [j6]Eyas El-Qawasmeh:
Handling overflow in integer addition in online computations. J. Digit. Inf. Manag. 1(3): 129-135 (2003) - [j5]Eyas El-Qawasmeh:
A quadtree-based representation technique for indexing and retrieval of image databases. J. Vis. Commun. Image Represent. 14(3): 340-357 (2003) - 2002
- [j4]Eyas El-Qawasmeh:
Image search on the web. Digit. Creativity 13(4): 212-224 (2002) - 2000
- [j3]Eyas El-Qawasmeh:
Performance Investigation of Bit-Counting Algorithms with a Speedup to Lookup Table. J. Res. Pract. Inf. Technol. 32(3/4): 215-230 (2000) - [j2]Simon Y. Berkovich, Eyas El-Qawasmeh:
Reversing the Error-Correction Scheme for a Fault-Tolerant Indexing. Comput. J. 43(1): 54-64 (2000) - [j1]Eyas El-Qawasmeh, Ismail Hmeidi:
Performance investigation of Hamming Distance Bit Vertical Counter applied to access methods in information retrieval. J. Am. Soc. Inf. Sci. 51(5): 427-431 (2000)
Conference and Workshop Papers
- 2013
- [c19]Ahmad A. Al-Daraiseh, Eyas El-Qawasmeh, Nazaraf Shah:
A Framework for Energy Monitoring and Management System for Educational Institutions. ICITCS 2013: 1-4 - 2012
- [c18]Huyam Al-Amro, Eyas El-Qawasmeh:
Discovering security vulnerabilities and leaks in ASP.NET websites. CyberSec 2012: 329-333 - [c17]Michal Prilepok, Jan Platos, Václav Snásel, Eyas El-Qawasmeh:
The Bayesian Spam Filter with NCD. DATESO 2012: 60-68 - 2011
- [c16]Ahmad Noraziah, A. S. Ahmad Solihin, Tutut Herawan, Roslina Mohd Sidek, Eyas El-Qawasmeh, Ezendu Ariwa:
Development of Online Fuel Consumption Cost Calculator. DEIS 2011: 218-228 - [c15]Fouzi Harrag, Eyas El-Qawasmeh, AbdulMalik S. Al-Salman:
Extracting Named Entities from Prophetic Narration Texts (Hadith). ICSECS (2) 2011: 289-297 - 2010
- [c14]Eyas El-Qawasmeh, Ahmed Mansour, Mohammad Al-Towiq:
Development of a New Compression Scheme. NDT (1) 2010: 85-90 - [c13]Fouzi Harrag, Eyas El-Qawasmeh, AbdulMalik S. Al-Salman:
A Comparative Study of Statistical Feature Reduction Methods for Arabic Text Categorization. NDT (2) 2010: 676-682 - 2008
- [c12]Eyas El-Qawasmeh, Václav Snásel, Pit Pichappan:
Reshaping email relationships. ICDIM 2008: 304-307 - [c11]Milos Kudelka, Václav Snásel, Ondrej Lehecka, Eyas El-Qawasmeh:
Web content mining using web design patterns. IRI 2008: 232-237 - [c10]Milos Kudelka, Václav Snásel, Ondrej Lehecka, Eyas El-Qawasmeh, Jaroslav Pokorný:
Web Pages Reordering and Clustering Based on Web Patterns. SOFSEM 2008: 731-742 - 2007
- [c9]Roland H. Kaschek, Eyas El-Qawasmeh, Alexei Tretiakov:
A Heuristic Understanding Model. ICALT 2007: 61-63 - [c8]Zakaryia Qawaqneh, Eyas El-Qawasmeh, Ahmad Kayed:
New method for ranking arabic web sites using ontology concepts. ICDIM 2007: 649-656 - [c7]Milos Kudelka, Ondrej Lehecka, Václav Snásel, Eyas El-Qawasmeh:
Web pages clustering based on web patterns. ICDIM 2007: 657-664 - 2006
- [c6]Milos Kudelka, Václav Snásel, Eyas El-Qawasmeh, Ondrej Lehecka, Jiri Tesarik:
Domain Patterns and Semantic Annotation of Web Pages. ICDIM 2006: 504-510 - [c5]Milos Kudelka, Václav Snásel, Ondrej Lehecka, Eyas El-Qawasmeh, Jaroslav Pokorný:
Semantic Annotation of Web Pages Using Web Patterns. SITIS 2006: 280-291 - [c4]Milos Kudelka, Václav Snásel, Ondrej Lehecka, Eyas El-Qawasmeh:
Semantic Analysis of Web Pages Using Web Patterns. Web Intelligence 2006: 329-333 - 2005
- [c3]Eyas El-Qawasmeh, Ahmed Kattan:
NEW TECHNIQUE FOR DATA COMPRESSION. IADIS AC 2005: 365-373 - 2004
- [c2]Eyas El-Qawasmeh, Khader Al-Noubani:
A polynomial time algorithm for the N-queens problem. Neural Networks and Computational Intelligence 2004: 191-195 - 1998
- [c1]Simon Y. Berkovich, Eyas El-Qawasmeh:
Reversing the Error-Correction Scheme for a Fault-Tolerant Indexing. Data Compression Conference 1998: 527
Editorship
- 2011
- [e11]Ezendu Ariwa, Eyas El-Qawasmeh:
Digital Enterprise and Information Systems - International Conference, DEIS 2011, London, UK, July 20 - 22, 2011. Proceedings. Communications in Computer and Information Science 194, Springer 2011, ISBN 978-3-642-22602-1 [contents] - [e10]Hocine Cherifi, Jasni Mohamad Zain, Eyas El-Qawasmeh:
Digital Information and Communication Technology and Its Applications - International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings, Part I. Communications in Computer and Information Science 166, Springer 2011, ISBN 978-3-642-21983-2 [contents] - [e9]Hocine Cherifi, Jasni Mohamad Zain, Eyas El-Qawasmeh:
Digital Information and Communication Technology and Its Applications - International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011, Proceedings, Part II. Communications in Computer and Information Science 167, Springer 2011, ISBN 978-3-642-22026-5 [contents] - [e8]Václav Snásel, Jan Platos, Eyas El-Qawasmeh:
Digital Information Processing and Communications - International Conference , ICDIPC 2011, Ostrava, Czech Republic, July 7-9, 2011, Proceedings, Part I. Communications in Computer and Information Science 188, Springer 2011, ISBN 978-3-642-22388-4 [contents] - [e7]Václav Snásel, Jan Platos, Eyas El-Qawasmeh:
Digital Information Processing and Communications - International Conference, ICDIPC 2011, Ostrava, Czech Republic, July 7-9, 2011, Proceedings, Part II. Communications in Computer and Information Science 189, Springer 2011, ISBN 978-3-642-22409-6 [contents] - [e6]Jim James Yonazi, Eliamani Sedoyeka, Ezendu Ariwa, Eyas El-Qawasmeh:
e-Technologies and Networks for Development - First International Conference, ICeND 2011, Dar-es-Salaam, Tanzania, August 3-5, 2011. Proceedings. Communications in Computer and Information Science 171, Springer 2011, ISBN 978-3-642-22728-8 [contents] - [e5]Jasni Mohamad Zain, Wan Maseri Binti Wan Mohd, Eyas El-Qawasmeh:
Software Engineering and Computer Systems - Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part I. Communications in Computer and Information Science 179, Springer 2011, ISBN 978-3-642-22169-9 [contents] - [e4]Jasni Mohamad Zain, Wan Maseri Binti Wan Mohd, Eyas El-Qawasmeh:
Software Engineering and Computer Systems - Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part II. Communications in Computer and Information Science 180, Springer 2011, ISBN 978-3-642-22190-3 [contents] - [e3]Jasni Mohamad Zain, Wan Maseri Binti Wan Mohd, Eyas El-Qawasmeh:
Software Engineering and Computer Systems - Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part III. Communications in Computer and Information Science 181, Springer 2011, ISBN 978-3-642-22202-3 [contents] - 2010
- [e2]Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmeh:
Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I. Communications in Computer and Information Science 87, Springer 2010, ISBN 978-3-642-14291-8 [contents] - [e1]Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmeh:
Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part II. Communications in Computer and Information Science 88, Springer 2010, ISBN 978-3-642-14305-2 [contents]
Informal and Other Publications
- 2007
- [i1]Radim Baca, Václav Snásel, Jan Platos, Michal Krátký, Eyas El-Qawasmeh:
The Fast Fibonacci Decompression Algorithm. CoRR abs/0712.0811 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint