The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nadia Tawbi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mourad Debbabi, Josee Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi
    Secure Self-certified Code for Java. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:133-151 [Conf]
  2. Ghassan Chehaibar, Hubert Garavel, Laurent Mounier, Nadia Tawbi, Ferruccio Zulian
    Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS. [Citation Graph (0, 0)][DBLP]
    FORTE, 1996, pp:435-450 [Conf]
  3. Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
    Method Call Acceleration in Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:750-759 [Conf]
  4. Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
    Formal Automatic Verification of Authentication Crytographic Protocols. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1997, pp:50-59 [Conf]
  5. Nadia Tawbi, Paul Feautrier
    Processor allocation and loop scheduling on multiprocessor computers. [Citation Graph (0, 0)][DBLP]
    ICS, 1992, pp:63-71 [Conf]
  6. Mourad Debbabi, Ali Faour, Nadia Tawbi
    A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    Implementation of Functional Languages, 1996, pp:247-266 [Conf]
  7. B. Dehbonei, Christophe Laurent, Nadia Tawbi, R. S. Kulkarni
    PMACS: An Environment for Parallel Programming. [Citation Graph (0, 0)][DBLP]
    IPPS, 1991, pp:638-641 [Conf]
  8. Nadia Tawbi
    Estimation of Nested Loops Execution Time by Integer Arithmetic in Convex Polyhedra. [Citation Graph (0, 0)][DBLP]
    IPPS, 1994, pp:217-221 [Conf]
  9. Mourad Debbabi, Azzam Mourad, Nadia Tawbi
    Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:874-878 [Conf]
  10. Mourad Debbabi, E. Giasson, Béchir Ktari, F. Michaud, Nadia Tawbi
    Secure Self-Certified COTS. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:183-188 [Conf]
  11. Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
    From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. [Citation Graph (0, 0)][DBLP]
    WETICE, 1997, pp:256-262 [Conf]
  12. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi
    E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2005, v:4, n:1, pp:83-108 [Journal]
  13. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
    A dynamic compiler for embedded Java virtual machines. [Citation Graph (0, 0)][DBLP]
    PPPJ, 2004, pp:100-106 [Conf]

  14. Using Equivalence Relations for Corrective Enforcement of Security Policies. [Citation Graph (, )][DBLP]


  15. Execution monitoring enforcement for limited-memory systems. [Citation Graph (, )][DBLP]


  16. A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. [Citation Graph (, )][DBLP]


  17. Generating In-Line Monitors for Rabin Automata. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002