|
Search the dblp DataBase
Nadia Tawbi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mourad Debbabi, Josee Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi
Secure Self-certified Code for Java. [Citation Graph (0, 0)][DBLP] FASec, 2002, pp:133-151 [Conf]
- Ghassan Chehaibar, Hubert Garavel, Laurent Mounier, Nadia Tawbi, Ferruccio Zulian
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS. [Citation Graph (0, 0)][DBLP] FORTE, 1996, pp:435-450 [Conf]
- Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
Method Call Acceleration in Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2003, pp:750-759 [Conf]
- Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
Formal Automatic Verification of Authentication Crytographic Protocols. [Citation Graph (0, 0)][DBLP] ICFEM, 1997, pp:50-59 [Conf]
- Nadia Tawbi, Paul Feautrier
Processor allocation and loop scheduling on multiprocessor computers. [Citation Graph (0, 0)][DBLP] ICS, 1992, pp:63-71 [Conf]
- Mourad Debbabi, Ali Faour, Nadia Tawbi
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs. [Citation Graph (0, 0)][DBLP] Implementation of Functional Languages, 1996, pp:247-266 [Conf]
- B. Dehbonei, Christophe Laurent, Nadia Tawbi, R. S. Kulkarni
PMACS: An Environment for Parallel Programming. [Citation Graph (0, 0)][DBLP] IPPS, 1991, pp:638-641 [Conf]
- Nadia Tawbi
Estimation of Nested Loops Execution Time by Integer Arithmetic in Convex Polyhedra. [Citation Graph (0, 0)][DBLP] IPPS, 1994, pp:217-221 [Conf]
- Mourad Debbabi, Azzam Mourad, Nadia Tawbi
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:874-878 [Conf]
- Mourad Debbabi, E. Giasson, Béchir Ktari, F. Michaud, Nadia Tawbi
Secure Self-Certified COTS. [Citation Graph (0, 0)][DBLP] WETICE, 2000, pp:183-188 [Conf]
- Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. [Citation Graph (0, 0)][DBLP] WETICE, 1997, pp:256-262 [Conf]
- Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2005, v:4, n:1, pp:83-108 [Journal]
- Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
A dynamic compiler for embedded Java virtual machines. [Citation Graph (0, 0)][DBLP] PPPJ, 2004, pp:100-106 [Conf]
Using Equivalence Relations for Corrective Enforcement of Security Policies. [Citation Graph (, )][DBLP]
Execution monitoring enforcement for limited-memory systems. [Citation Graph (, )][DBLP]
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. [Citation Graph (, )][DBLP]
Generating In-Line Monitors for Rabin Automata. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|