default search action
Nejib Ben Hadj-Alouane
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Amira Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta, Atidel B. Hadj-Alouane:
A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers. Clust. Comput. 27(8): 11249-11275 (2024) - 2022
- [c47]Karim Fathallah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane:
A Survey of Routing Protocols for WSNs in Smart Farming Applications. DiCES-N 2022: 24-37 - 2021
- [c46]Karim Fathallah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane:
A Combined IoT-Enabled SensorDB and Spatial Query Framework for Smart Farming. AICCSA 2021: 1-8 - [c45]Amira Rayane Benamer, Khaled Boussetta, Nejib Ben Hadj-Alouane:
A Genetic Algorithm for the Placement of Latency-Sensitive Multiplayer Game Servers in the Fog. GLOBECOM 2021: 1-6 - [c44]Amira Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta:
On-the-fly Servers Placement for online Multiplayer games in the Fog. HPCC/DSS/SmartCity/DependSys 2021: 115-122 - 2020
- [j17]Karim Fathallah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane:
Enhancing Energy Saving in Smart Farming through Aggregation and Partition Aware IOT Routing Protocol. Sensors 20(10): 2760 (2020) - [c43]Amira Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta:
Online Games Servers Placement in Fog Computing: an Hybrid Bio-inspired Approach. LCN Symposium 2020: 141-149
2010 – 2019
- 2019
- [j16]Rania Mkhinini Gahar, Olfa Arfaoui, Minyar Sassi Hidri, Nejib Ben Hadj-Alouane:
A Distributed Approach for High-Dimensionality Heterogeneous Data Reduction. IEEE Access 7: 151006-151022 (2019) - [c42]Rania Mkhinini Gahar, Olfa Arfaoui, Minyar Sassi Hidri, Nejib Ben Hadj-Alouane:
Vers une approche heuristique distribuée à base d'ontologie pour la fouille des règles d'association dans les données massives. EGC 2019: 377-378 - [c41]Amira Rayane Benamer, Hana Teyeb, Nejib Ben Hadj-Alouane:
Penguin Search Aware Proactive Application Placement. ICA3PP (2) 2019: 229-244 - [c40]Amina Bourouis, Kais Klai, Nejib Ben Hadj-Alouane:
Measuring Opacity for Non-Probabilistic DES: a SOG-Based Approach. ICECCS 2019: 242-247 - [c39]Karim Fathallah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane:
Routing Of Spatial Queries Over IOT Enabled Wireless Sensor Networks. IWCMC 2019: 1779-1784 - 2018
- [c38]Fatma Raissi, Clovis Anicet Ouedraogo, Sami Yangui, Frédéric Camps, Nejib Ben Hadj-Alouane:
Paving the Way for Autonomous Cars in the City of Tomorrow: A Prototype for Mobile Devices Support at the Edges of 5G Network. ICSOC Workshops 2018: 481-485 - [c37]Karim Fathallah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane:
PA-RPL: A Partition Aware IoT Routing Protocol For Precision Agriculture. IWCMC 2018: 672-677 - [c36]Rania Mkhinini Gahar, Olfa Arfaoui, Minyar Sassi Hidri, Nejib Ben Hadj-Alouane:
An Ontology-driven MapReduce Framework for Association Rules Mining in Massive Data. KES 2018: 224-233 - [c35]Amira Rayane Benamer, Hana Teyeb, Nejib Ben Hadj-Alouane:
Latency-Aware Placement Heuristic in Fog Computing Environment. OTM Conferences (2) 2018: 241-257 - 2017
- [j15]Hana Teyeb, Nejib Ben Hadj-Alouane, Samir Tata, Ali Balma:
Optimal Dynamic Placement of Virtual Machines in Geographically Distributed Cloud Data Centers. Int. J. Cooperative Inf. Syst. 26(3): 1750001:1-1750001:32 (2017) - [j14]Hasna Bouraoui, Chadlia Jerad, Anupam Chattopadhyay, Nejib Ben Hadj-Alouane:
Hardware Architectures for Embedded Speaker Recognition Applications: A Survey. ACM Trans. Embed. Comput. Syst. 16(3): 78:1-78:28 (2017) - [j13]Amina Bourouis, Kais Klai, Nejib Ben Hadj-Alouane, Yamen El Touati:
On the Verification of Opacity in Web Services and Their Composition. IEEE Trans. Serv. Comput. 10(1): 66-79 (2017) - [c34]Amina Burouis, Nejib Ben Hadj-Alouane, Kais Klai:
Computing Quantified Opacity for SOG-Abstracted Web Services. SCC 2017: 362-369 - [c33]Rania Mkhinini Gahar, Olfa Arfaoui, Minyar Sassi Hidri, Nejib Ben Hadj-Alouane:
ParallelCharMax: An Effective Maximal Frequent Itemset Mining Algorithm Based on MapReduce Framework. AICCSA 2017: 571-578 - [c32]Rym Zrelli, Moez Yeddes, Nejib Ben Hadj-Alouane:
Checking and Enforcing Security Through Opacity in Healthcare Applications. ICSOC Workshops 2017: 161-173 - [c31]Amina Bourouis, Kais Klai, Nejib Ben Hadj-Alouane:
Measuring opacity in web services. iiWAS 2017: 530-534 - [c30]Hana Teyeb, Nejib Ben Hadj-Alouane, Samir Tata:
Network-Aware Stochastic Virtual Machine Placement in Geo-Distributed Data Centers - (Short Paper). OTM Conferences (1) 2017: 37-44 - [i2]Rania Mkhinini Gahar, Olfa Arfaoui, Minyar Sassi Hidri, Nejib Ben Hadj-Alouane:
Dimensionality reduction with missing values imputation. CoRR abs/1707.00351 (2017) - [i1]Rym Zrelli, Moez Yeddes, Nejib Ben Hadj-Alouane:
Checking and Enforcing Security through Opacity in Healthcare Applications. CoRR abs/1710.00011 (2017) - 2016
- [j12]Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane:
An automated approach for merging business process fragments. Comput. Ind. 82: 104-118 (2016) - [c29]Hana Teyeb, Ali Balma, Samir Tata, Nejib Ben Hadj-Alouane:
Traffic-Aware Virtual Machine Migration Scheduling Problem in Geographically Distributed Data Centers. CLOUD 2016: 798-801 - [c28]Ons Bibani, Carla Mouradian, Sami Yangui, Roch H. Glitho, Walid Gaaloul, Nejib Ben Hadj-Alouane, Monique Morrow, Paul A. Polakos:
A Demo of IoT Healthcare Application Provisioning in Hybrid Cloud/Fog Environment. CloudCom 2016: 472-475 - [c27]Ons Bibani, Sami Yangui, Roch H. Glitho, Walid Gaaloul, Nejib Ben Hadj-Alouane, Monique J. Morrow, Paul A. Polakos:
A demo of a PaaS for IoT applications provisioning in hybrid cloud/fog environment. LANMAN 2016: 1-2 - [c26]Sami Yangui, Pradeep Ravindran, Ons Bibani, Roch H. Glitho, Nejib Ben Hadj-Alouane, Monique J. Morrow, Paul A. Polakos:
A platform as-a-service for hybrid cloud/fog environments. LANMAN 2016: 1-7 - [c25]Raja Benali, Hana Teyeb, Ali Balma, Samir Tata, Nejib Ben Hadj-Alouane:
Evaluation of Traffic-Aware VM Placement Policies in Distributed Cloud Using CloudSim. WETICE 2016: 95-100 - 2015
- [j11]Amina Bourouis, Kais Klai, Yamen El Touati, Nejib Ben Hadj-Alouane:
Checking Opacity of Vulnerable Critical Systems On-The-Fly. Int. J. Inf. Technol. Web Eng. 10(1): 1-30 (2015) - [c24]Souha Boubaker, Walid Gaaloul, Mohamed Graiet, Nejib Ben Hadj-Alouane:
Event-B Based Approach for Verifying Cloud Resource Allocation in Business Process. SCC 2015: 538-545 - [c23]Amina Bourouis, Kais Klai, Yamen El Touati, Nejib Ben Hadj-Alouane:
Opacity Preserving Abstraction for Web Services and Their Composition Using SOGs. ICWS 2015: 313-320 - [c22]Imed Abbassi, Mohamed Graiet, Souha Boubaker, Mourad Kmimech, Nejib Ben Hadj-Alouane:
A Formal Approach for Verifying QoS Variability in Web Services Composition Using EVENT-B. ICWS 2015: 519-526 - [c21]Imed Abbassi, Mohamed Graiet, Walid Gaaloul, Nejib Ben Hadj-Alouane:
Genetic-Based Approach for ATS and SLA-aware Web Services Composition. WISE (1) 2015: 369-383 - [e1]Farouk Toumani, Barbara Pernici, Daniela Grigori, Djamal Benslimane, Jan Mendling, Nejib Ben Hadj-Alouane, M. Brian Blake, Olivier Perrin, Iman Saleh, Sami Bhiri:
Service-Oriented Computing - ICSOC 2014 Workshops - WESOA; SeMaPS, RMSOC, KASA, ISC, FOR-MOVES, CCSA and Satellite Events, Paris, France, November 3-6, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8954, Springer 2015, ISBN 978-3-319-22884-6 [contents] - 2014
- [c20]Hana Teyeb, Ali Balma, Nejib Ben Hadj-Alouane, Samir Tata:
Optimal Virtual Machine Placement in Large-Scale Cloud Systems. IEEE CLOUD 2014: 424-431 - [c19]Imed Abbassi, Mohamed Graiet, Walid Gaaloul, Nejib Ben Hadj-Alouane:
A Formal Approach for Enforcing Transactional Requirements in Web Service Compositions. IEEE SCC 2014: 637-644 - [c18]Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane:
Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments. ACSC 2014: 89-98 - [c17]Hana Teyeb, Ali Balma, Nejib Ben Hadj-Alouane, Samir Tata, Atidel B. Hadj-Alouane:
Traffic-aware virtual machine placement in geographically distributed Clouds. CoDIT 2014: 24-29 - [c16]Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane:
A Behavior-Aware Systematic Approach for Merging Business Process Fragments. ICECCS 2014: 194-197 - [c15]Hana Teyeb, Ali Balma, Nejib Ben Hadj-Alouane, Samir Tata:
Optimal Virtual Machine Placement in a Multi-tenant Cloud. ICSOC Workshops 2014: 308-319 - [c14]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Amel Mammar:
Business Process Fragments Behavioral Merge. OTM Conferences 2014: 112-129 - [c13]Imed Abbassi, Mohamed Graiet, Nejib Ben Hadj-Alouane:
Combining Dynamic Workflow and Transactional Semantics Using a Pattern-Based Approach. WETICE 2014: 68-73 - [c12]Imed Abbassi, Mourad Kmimech, Nejib Ben Hadj-Alouane, Walid Gaaloul:
Modeling and Verifying the Transactional and QoS-aware Services Composition Using Event-B. WETICE 2014: 313-318 - [c11]Kais Klai, Nawel Hamdi, Nejib Ben Hadj-Alouane:
An On-the-Fly Approach for the Verification of Opacity in Critical Systems. WETICE 2014: 345-350 - 2013
- [c10]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Amel Mammar:
Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach. iiWAS 2013: 654 - 2012
- [c9]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Moez Yeddes:
A Semantics-Based Privacy-Aware Approach for Fragmenting Business Processes. COMPSAC Workshops 2012: 254-259 - [c8]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Moez Yeddes:
An Approach for Producing Privacy-Aware Reusable Business Process Fragments. ICWS 2012: 659-661 - 2011
- [j10]Ali Balma, Nejib Ben Hadj-Alouane, Atidel B. Hadj-Alouane:
A branch-and-price approach for an integrated capacity dimensioning and demand routing in SDH/WDM networks. Int. J. Bus. Perform. Supply Chain Model. 3(1): 3-19 (2011) - [j9]Amine Belhaj Seboui, Nejib Ben Hadj-Alouane, Gwenaël Delaval, Éric Rutten, Mohamed Moez Yeddes:
An approach for the synthesis of decentralised supervisors for distributed adaptive systems. Int. J. Crit. Comput. Based Syst. 2(3/4): 246-265 (2011) - [j8]Ali Balma, Nejib Ben Hadj-Alouane, Atidel B. Hadj-Alouane:
A Near-Optimal Solution Approach for the Multi-hop Traffic Grooming Problem. JOCN 3(11): 891-901 (2011) - [c7]Mouna Makni, Nejib Ben Hadj-Alouane, Samir Tata, Moez Yeddes:
Negotiating Deadline Constraints in Inter-organizational Logistic Systems: A Healthcare Case Study. Business Process Management Workshops (2) 2011: 108-118 - 2010
- [c6]Imen Benzarti, Samir Tata, Zakaria Maamar, Nejib Ben Hadj-Alouane, Mohamed Moez Yeddes:
Engineering Process for Capacity-driven Web Services. ICEIS (1) 2010: 84-95 - [c5]Mouna Makni, Nejib Ben Hadj-Alouane, Mohamed Moez Yeddes, Samir Tata:
Modeling Time Constraints in Inter-organizational Workflows. ICEIS (3) 2010: 221-229 - [c4]Mouna Makni, Samir Tata, Mohamed Moez Yeddes, Nejib Ben Hadj-Alouane:
Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows. OTM Conferences (1) 2010: 523-539
2000 – 2009
- 2009
- [j7]Moez Yeddes, Feng Lin, Nejib Ben Hadj-Alouane:
Modifying Security Policies for the Satisfaction of Intransitive Non-Interference. IEEE Trans. Autom. Control. 54(8): 1961-1966 (2009) - [c3]Haithem Derbel, Nejib Ben Hadj-Alouane, Moez Yeddes, Hassane Alla:
Limited-Time Lookahead Diagnosability of Rectangular Hybrid Automata. ADHS 2009: 280-285 - 2006
- [j6]Nejib Ben Hadj-Alouane, Mohamed Moez Yeddes, Atidel B. Hadj-Alouane, Feng Lin:
A Mixed Integer Dynamic Programming Approach to a Class of Optimal Control Problems in Hybrid Systems. Cybern. Syst. 37(5): 481-504 (2006) - 2005
- [j5]Nejib Ben Hadj-Alouane, Stéphane Lafrance, Feng Lin, John Mullins, Moez Yeddes:
Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Trans. Autom. Control. 50(6): 920-925 (2005) - [j4]Nejib Ben Hadj-Alouane, Stéphane Lafrance, Feng Lin, John Mullins, Mohamed Moez Yeddes:
On the verification of intransitive noninterference in multilevel security. IEEE Trans. Syst. Man Cybern. Part B 35(5): 948-958 (2005) - 2004
- [c2]Nejib Ben Hadj-Alouane, Stéphane Lafrance, Feng Lin, John Mullins, Moez Yeddes:
An algorithmic approach to verification of intransitive non-interference in security policies. CDC 2004: 51-56
1990 – 1999
- 1996
- [j3]Nejib Ben Hadj-Alouane, Stéphane Lafortune, Feng Lin:
Centralized and distributed algorithms for on-line synthesis of maximal control policies under partial observation. Discret. Event Dyn. Syst. 6(4): 379-427 (1996) - 1994
- [j2]Nejib Ben Hadj-Alouane, Stéphane Lafortune, Feng Lin:
Variable lookahead supervisory control with state information. IEEE Trans. Autom. Control. 39(12): 2398-2410 (1994) - 1991
- [j1]Nejib Ben Hadj-Alouane, Jarir K. Chaar, Arch W. Naylor:
Developing control and integration software for flexible manufacturing systems. J. Syst. Integr. 1(1): 7-34 (1991) - 1990
- [c1]Nejib Ben Hadj-Alouane, Jarir K. Chaar, Arch W. Naylor:
The Design and Implementation of the Control and Integration Software of a Flexible Manufacturing System. ICSI 1990: 494-502
Coauthor Index
aka: Moez Yeddes
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint