Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,013,407 papers from all fields of science
Search
Sign In
Create Free Account
Yousef Saad
Known as:
Saad
, Y. Saad
, Youcef Saad
Yousef Saad is an I.T. Distinguished Professor of Computer Science in the Department of Computer Science and Engineering at the University of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Arnoldi iteration
Conjugate residual method
Generalized minimal residual method
Linear algebra
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
6G White Paper on Machine Learning in Wireless Communication Networks
Samad Ali
,
W. Saad
,
+24 authors
Hassan Malik
arXiv.org
2020
Corpus ID: 216641654
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be…
Expand
Review
2014
Review
2014
NGA-West2 Research Project
Y. Bozorgnia
,
N. Abrahamson
,
+29 authors
R. Youngs
2014
Corpus ID: 58930416
The NGA-West2 project is a large multidisciplinary, multi-year research program on the Next Generation Attenuation (NGA) models…
Expand
Highly Cited
2014
Highly Cited
2014
Floating Drug Delivery Systems for Eradication of Helicobacter pylori in Treatment of Peptic Ulcer Disease
Yousef Javadzadeh and Sanaz Hamedeyazdan
2014
Corpus ID: 31397699
Floating Drug Delivery Systems for Eradication of Helicobacter pylori in Treatment of Peptic Ulcer Disease
Highly Cited
2011
Highly Cited
2011
Anderson Acceleration for Fixed-Point Iterations
H. Walker
,
P. Ni
SIAM Journal on Numerical Analysis
2011
Corpus ID: 4527816
This paper concerns an acceleration method for fixed-point iterations that originated in work of D. G. Anderson [J. Assoc. Comput…
Expand
Highly Cited
2007
Highly Cited
2007
CANDID: preventing sql injection attacks using dynamic candidate evaluations
Sruthi Bandhakavi
,
Prithvi Bisht
,
P. Madhusudan
,
V. Venkatakrishnan
Conference on Computer and Communications…
2007
Corpus ID: 207165878
SQL injection attacks are one of the topmost threats for applications written for the Web. These attacks are launched through…
Expand
Highly Cited
2006
Highly Cited
2006
Incremental Support Vector Learning: Analysis, Implementation and Applications
P. Laskov
,
Christian Gehl
,
Stefan Krüger
,
K. Müller
Journal of machine learning research
2006
Corpus ID: 226691
Incremental Support Vector Machines (SVM) are instrumental in practical applications of online learning. This work focuses on the…
Expand
Highly Cited
2006
Highly Cited
2006
An experimental investigation of CNG as an alternative fuel for a retrofitted gasoline vehicle
M. Aslam
,
H. Masjuki
,
M. Kalam
,
H. Abdesselam
,
T. Mahlia
,
M. A. Amalina
2006
Corpus ID: 93511680
Highly Cited
2004
Highly Cited
2004
Public Sociologies: Contradictions, Dilemmas, and Possibilities
M. Burawoy
2004
Corpus ID: 26307433
The growing interest in public sociologies marks an increasing gap between the ethos of sociologists and social, political, and…
Expand
Highly Cited
2004
Highly Cited
2004
Common market makers and commonality in liquidity
Jay F. Coughenour
,
Mohsen Saad
2004
Corpus ID: 2056941
Highly Cited
2000
Highly Cited
2000
Constraint Preconditioning for Indefinite Linear Systems
Carsten Keller
,
N. Gould
,
A. Wathen
SIAM Journal on Matrix Analysis and Applications
2000
Corpus ID: 34087888
The problem of finding good preconditioners for the numerical solution of indefinite linear systems is considered. Special…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE