default search action
Rahma Ben Ayed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c29]Racem Bougacha, Régine Laleau, Philippe Bon, Simon Collart Dutilleul, Rahma Ben Ayed:
Modeling Train Systems: From High-Level Architecture Graphical Models to Formal Specifications. CRiSIS 2022: 153-168 - [c28]Racem Bougacha, Régine Laleau, Simon Collart Dutilleul, Rahma Ben Ayed:
Extending SysML with Refinement and Decomposition Mechanisms to Generate Event-B Specifications. TASE 2022: 256-273
2010 – 2019
- 2019
- [j12]Fatma Gara, Leila Ben Saad, Rahma Ben Ayed, Bernard Tourancheau:
A new scheme for RPL to handle mobility in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 30(3): 173-186 (2019) - [j11]Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed:
Dynamic-Based Clustering for Replica Placement in Data Grids. Int. J. Serv. Sci. Manag. Eng. Technol. 10(4): 58-80 (2019) - [j10]Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed:
Impact of replica placement-based clustering on fault tolerance in grid computing. Int. J. Web Eng. Technol. 14(2): 151-177 (2019) - [j9]Kenza Kraibi, Rahma Ben Ayed, Simon Collart Dutilleul, Philippe Bon, Dorian Petit:
Analysis and Formal Modeling of Systems Behavior Using UML/Event-B. J. Commun. 14(10): 980-986 (2019) - [c27]Racem Bougacha, Abderrahim Ait Wakrime, Slim Kallel, Rahma Ben Ayed, Simon Collart Dutilleul:
A Model-based Approach for the Modeling and the Verification of Railway Signaling System. ENASE 2019: 367-376 - [c26]Kenza Kraibi, Rahma Ben Ayed, Joris Rehm, Simon Collart Dutilleul, Philippe Bon, Dorian Petit:
Towards a Method for the Decomposition by Refinement in Event-B. FM Workshops (2) 2019: 358-370 - [c25]Akram Idani, Yves Ledru, Abderrahim Ait Wakrime, Rahma Ben Ayed, Simon Collart Dutilleul:
Incremental Development of a Safety Critical System Combining formal Methods and DSMLs - - Application to a Railway System -. FMICS 2019: 93-109 - [c24]Kenza Kraibi, Rahma Ben Ayed, Joris Rehm, Simon Collart Dutilleul, Philippe Bon, Dorian Petit:
Event-B Decomposition Analysis for Systems Behavior Modeling. ICSOFT 2019: 278-286 - [c23]Akram Idani, Yves Ledru, Abderrahim Ait Wakrime, Rahma Ben Ayed, Philippe Bon:
Towards a Tool-Based Domain Specific Approach for Railway Systems Modeling and Validation. RSSRail 2019: 23-40 - [c22]Yves Ledru, Akram Idani, Rahma Ben Ayed, Abderrahim Ait Wakrime, Philippe Bon:
A Separation of Concerns Approach for the Verified Modelling of Railway Signalling Rules. RSSRail 2019: 173-190 - 2018
- [j8]Minyar Sassi Hidri, Mohamed Ali Zoghlami, Rahma Ben Ayed:
Speeding up the large-scale consensus fuzzy clustering for handling Big Data. Fuzzy Sets Syst. 348: 50-74 (2018) - [j7]Naima Jbeli, Zohra Sbaï, Rahma Ben Ayed:
TCTLΔh Model Checking of Time Petri Nets. Trans. Comput. Collect. Intell. 30: 242-262 (2018) - [c21]Abderrahim Ait Wakrime, Rahma Ben Ayed, Simon Collart Dutilleul, Yves Ledru, Akram Idani:
Formalizing Railway Signaling System ERTMS/ETCS Using UML/Event-B. MEDI 2018: 321-330 - [c20]Naima Jbeli, Zohra Sbaï, Rahma Ben Ayed:
On the Fly Model-Checking of TPN: $$TPN-TCTL^{\varDelta }_{h}$$. WorldCIST (2) 2018: 441-451 - 2017
- [j6]Mohamed Ali Zoghlami, Minyar Sassi Hidri, Rahma Ben Ayed:
Consensus-Driven Cluster Analysis: Top-Down and Bottom-Up Based Split-and-Merge Classifiers. Int. J. Artif. Intell. Tools 26(4): 1750018:1-1750018:26 (2017) - [j5]Rawand Guerfel, Zohra Sbaï, Rahma Ben Ayed:
On the Use of Similarity or Query Languages in Cloud Discovery Based on Ontology. Int. J. Serv. Sci. Manag. Eng. Technol. 8(3): 60-78 (2017) - [j4]Fatma Gara, Leila Ben Saad, Rahma Ben Ayed:
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility. Int. J. Semantic Web Inf. Syst. 13(3): 22-47 (2017) - [c19]Rawand Guerfel, Zohra Sbaï, Rahma Ben Ayed:
Model Checking of Cost-Effective Elasticity Strategies in Cloud Computing. ICSOC Workshops 2017: 80-92 - [c18]Fatma Gara, Leila Ben Saad, Rahma Ben Ayed:
An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs. IWCMC 2017: 276-281 - [i2]Mohamed Ali Zoghlami, Olfa Arfaoui, Minyar Sassi Hidri, Rahma Ben Ayed:
Classification non supervisée des données hétérogènes à large échelle. CoRR abs/1707.00297 (2017) - 2016
- [c17]Mohamed Ali Zoghlami, Minyar Sassi Hidri, Rahma Ben Ayed:
Sampling-based consensus fuzzy clustering on Big Data. FUZZ-IEEE 2016: 1501-1508 - [c16]Naima Jbeli, Zohra Sbaï, Rahma Ben Ayed:
On Expressiveness of TCTLΔh for Model Checking Distributed Systems. ICCCI (1) 2016: 323-332 - [c15]Fatma Gara, Leila Ben Saad, Elyes Ben Hamida, Bernard Tourancheau, Rahma Ben Ayed:
An adaptive timer for RPL to handle mobility in wireless sensor networks. IWCMC 2016: 678-683 - 2015
- [j3]Rahma Ben Ayed, Simon Collart Dutilleul, Philippe Bon, Yves Ledru, Akram Idani:
Formalismes basés sur les rôles pour la modélisation et la validation des règles d'exploitation ferroviaires. Tech. Sci. Informatiques 34(5): 495-521 (2015) - [c14]Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed:
Dynamic Data Replication-Driven Model in Data Grids. COMPSAC Workshops 2015: 393-397 - [c13]Mohamed Ali Zoghlami, Minyar Sassi Hidri, Rahma Ben Ayed:
A merging-based consensus-driven fuzzy clustering of distributed data. FUZZ-IEEE 2015: 1-6 - [c12]Rawand Guerfel, Zohra Sbaï, Rahma Ben Ayed:
Towards a System for Cloud Service Discovery and Composition Based on Ontology. ICCCI (2) 2015: 34-43 - [c11]Fatma Gara, Leila Ben Saad, Rahma Ben Ayed, Bernard Tourancheau:
RPL protocol adapted for healthcare and medical applications. IWCMC 2015: 690-695 - 2014
- [c10]Rahma Ben Ayed, Simon Collart Dutilleul, Philippe Bon, Akram Idani, Yves Ledru:
B Formal Validation of ERTMS/ETCS Railway Operating Rules. ABZ 2014: 124-129 - [c9]Rawand Guerfel, Zohra Sbaï, Rahma Ben Ayed:
On Service Composition in Cloud Computing: A Survey and an Ongoing Architecture. CloudCom 2014: 875-880 - 2010
- [i1]Hafedh Zayani, Kamel Barkaoui, Rahma Ben Ayed:
Probabilistic verification and evaluation of Backoff procedure of the WSN ECo-MAC protocol. CoRR abs/1005.2050 (2010)
2000 – 2009
- 2008
- [c8]Kamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, Awatef Hicheur:
Verification of Workflow processes under multilevel security considerations. CRiSIS 2008: 77-84 - [c7]Ali Mili, Rahma Ben Ayed, Shir Aharon, Chaitanya Nadkarni:
Harnessing a Refinement Theory to Compute Loop Functions. TTSS 2008: 139-155 - 2007
- [c6]Ali Mili, Alex Vinokurov, Lamia Labed Jilani, Frederick T. Sheldon, Rahma Ben Ayed:
Towards an Engineering Discipline of Computational Society. HICSS 2007: 281 - [c5]Hafedh Zayani, Rahma Ben Ayed, Karim Djouani, Kamel Barkaoui:
Eco-mac: an energy-efficient and low-latencyhybrid mac protocol for wireless sensor networks. PM2HW2N 2007: 68-71 - 2006
- [j2]Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani, Alex Vinokurov, Alexander Thomasian, Rahma Ben Ayed:
Modeling security as a dependability attribute: a refinement-based approach. Innov. Syst. Softw. Eng. 2(1): 39-48 (2006) - 2004
- [c4]Ali Mili, GuangJie Jiang, Bojan Cukic, Yan Liu, Rahma Ben Ayed:
Towards the Verification and Validation of Online Learning Systems: General Framework and Applications. HICSS 2004 - 2000
- [j1]Rahma Ben Ayed, Jules Desharnais, Marc Frappier, Ali Mili:
A calculus of program adaptation and its applications. Sci. Comput. Program. 38(1-3): 73-124 (2000)
1990 – 1999
- 1999
- [c3]Ali Mili, Bojan Cukic, T. Xia, Rahma Ben Ayed:
Combining Fault Avoidance, Fault Removal and Fault Tolerance: An Integrated Model. ASE 1999: 137- - 1998
- [c2]Rahma Ben Ayed, Hafedh Mili, Ali Mili:
Capturing pointer semantics and scoping rules. RelMiCS 1998: 3-7 - [c1]Rahma Ben Ayed, Jules Desharnais, Marc Frappier, Ali Mili:
Mathematical Foundations for Program Transformations. LOPSTR 1998: 319-321
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint