|
Search the dblp DataBase
Rahma Ben Ayed:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Rahma Ben Ayed, Hafedh Mili, Ali Mili
Capturing pointer semantics and scoping rules. [Citation Graph (0, 0)][DBLP] RelMiCS, 1998, pp:3-7 [Conf]
- Ali Mili, GuangJie Jiang, Bojan Cukic, Yan Liu, Rahma Ben Ayed
Towards the Verification and Validation of Online Learning Systems: General Framework and Applications. [Citation Graph (0, 0)][DBLP] HICSS, 2004, pp:- [Conf]
- Ali Mili, Alex Vinokurov, Lamia Labed Jilani, Frederick T. Sheldon, Rahma Ben Ayed
Towards an Engineering Discipline of Computational Society. [Citation Graph (0, 0)][DBLP] HICSS, 2007, pp:281- [Conf]
- Ali Mili, Bojan Cukic, T. Xia, Rahma Ben Ayed
Combining Fault Avoidance, Fault Removal and Fault Tolerance: An Integrated Model. [Citation Graph (0, 0)][DBLP] ASE, 1999, pp:137-0 [Conf]
- Rahma Ben Ayed, Jules Desharnais, Marc Frappier, Ali Mili
Mathematical Foundations for Program Transformations. [Citation Graph (0, 0)][DBLP] LOPSTR, 1998, pp:319-321 [Conf]
- Rahma Ben Ayed, Jules Desharnais, Marc Frappier, Ali Mili
A calculus of program adaptation and its applications. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2000, v:38, n:1-3, pp:73-124 [Journal]
Eco-mac: an energy-efficient and low-latencyhybrid mac protocol for wireless sensor networks. [Citation Graph (, )][DBLP]
Verification of Workflow processes under multilevel security considerations. [Citation Graph (, )][DBLP]
Probabilistic verification and evaluation of Backoff procedure of the WSN ECo-MAC protocol [Citation Graph (, )][DBLP]
Harnessing a Refinement Theory to Compute Loop Functions. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|