Skip to main content

Showing 1–6 of 6 results for author: Khan, J A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.09902  [pdf, other

    cs.CV

    Selection of Distinct Morphologies to Divide & Conquer Gigapixel Pathology Images

    Authors: Abubakr Shafique, Saghir Alfasly, Areej Alsaafin, Peyman Nejat, Jibran A. Khan, H. R. Tizhoosh

    Abstract: Whole slide images (WSIs) are massive digital pathology files illustrating intricate tissue structures. Selecting a small, representative subset of patches from each WSI is essential yet challenging. Therefore, following the "Divide & Conquer" approach becomes essential to facilitate WSI analysis including the classification and the WSI matching in computational pathology. To this end, we propose… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

  2. arXiv:2305.01315  [pdf, other

    cs.SE

    Insights into Software Development Approaches: Mining Q&A Repositories

    Authors: Arif Ali Khan, Javed Ali Khan, Muhammad Azeem Akbar, Peng Zhou, Mahdi Fahmideh

    Abstract: Context: Software practitioners adopt approaches like DevOps, Scrum, and Waterfall for high-quality software development. However, limited research has been conducted on exploring software development approaches concerning practitioners discussions on Q&A forums. Objective: We conducted an empirical study to analyze developers discussions on Q&A forums to gain insights into software development ap… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  3. arXiv:2108.05085  [pdf, other

    cs.DL cs.SE

    Researcher or Crowd Member? Why not both! The Open Research Knowledge Graph for Applying and Communicating CrowdRE Research

    Authors: Oliver Karras, Eduard C. Groen, Javed Ali Khan, Sören Auer

    Abstract: In recent decades, there has been a major shift towards improved digital access to scholarly works. However, even now that these works are available in digital form, they remain document-based, making it difficult to communicate the knowledge they contain. The next logical step is to extend these works with more flexible, fine-grained, semantic, and context-sensitive representations of scholarly k… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

    Comments: Accepted for publication at 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)

  4. arXiv:1911.05203  [pdf, other

    cs.NI

    Reversing The Meaning of Node Connectivity for Content Placement in Networks of Caches

    Authors: Junaid Ahmed Khan, Cedric Westphal, J. J. Garcia-Luna-Aceves, Yacine Ghamri-Doudane

    Abstract: It is a widely accepted heuristic in content caching to place the most popular content at the nodes that are the best connected. The other common heuristic is somewhat contradictory, as it places the most popular content at the edge, at the caching nodes nearest the users. We contend that neither policy is best suited for caching content in a network and propose a simple alternative that places th… ▽ More

    Submitted 12 November, 2019; originally announced November 2019.

    Journal ref: IEEE ICNC 2020

  5. arXiv:1707.06285  [pdf, other

    cs.NI

    Offloading Content with Self-organizing Mobile Fogs

    Authors: Junaid Ahmed Khan, Cedric Westphal, Yacine Ghamri-Doudane

    Abstract: Mobile users in an urban environment access content on the internet from different locations. It is challenging for the current service providers to cope with the increasing content demand from a large number of collocated mobile users. In-network caching to offload content at nodes closer to users alleviate the issue, though efficient cache management is required to find out who should cache what… ▽ More

    Submitted 19 July, 2017; originally announced July 2017.

  6. arXiv:1705.01343  [pdf, other

    cs.NI

    A Content-based Centrality Metric for Collaborative Caching in Information-Centric Fogs

    Authors: Junaid Ahmed Khan, Cedric Westphal, Yacine Ghamri-Doudane

    Abstract: Information-Centric Fog Computing enables a multitude of nodes near the end-users to provide storage, communication, and computing, rather than in the cloud. In a fog network, nodes connect with each other directly to get content locally whenever possible. As the topology of the network directly influences the nodes' connectivity, there has been some work to compute the graph centrality of each no… ▽ More

    Submitted 3 May, 2017; originally announced May 2017.