<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://seffah.info/dr-ahmed-seffah-biography</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info/dr-ahmed-seffah-books</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>1.0</priority></url><url><loc>https://seffah.info/dr-ahmed-seffah-blog</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info/book-1</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info/patterns-of-hci-design-and-hci-design-of-patterns-bridging-hci-design-and-model-driven-software-engineering</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info/human-centered-software-engineering-software-engineering-models-patterns-and-architectures-for-hci</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info/multiple-user-interfaces-cross-platform-applications-and-context-aware-interfaces</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info/integrating-a-usable-security-protocol-into-user-authentication-services-design-process</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url><url><loc>https://seffah.info/adoption-centric-usability-engineering-systematic-deployment-assessment-and-improvement-of-usability-methods-in-software</loc><lastmod>2025-05-18T17:57:40.000Z</lastmod><priority>0.5</priority></url></urlset>