


default search action
Abdelwahab Hamou-Lhadj
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Mohammed A. Shehab
, Wael Khreich, Abdelwahab Hamou-Lhadj
, Issam Sedki:
Commit-time defect prediction using one-class classification. J. Syst. Softw. 208: 111914 (2024) - [j43]Mahsa Panahandeh
, Abdelwahab Hamou-Lhadj
, Mohammad Hamdaqa
, James Miller:
ServiceAnomaly: An anomaly detection approach in microservices using distributed traces and profiling metrics. J. Syst. Softw. 209: 111917 (2024) - [j42]Issam Sedki
, Abdelwahab Hamou-Lhadj
, Otmane Aït Mohamed:
AML: An accuracy metric model for effective evaluation of log parsing techniques. J. Syst. Softw. 216: 112154 (2024) - [j41]Yan Liu
, Abdelwahab Hamou-Lhadj
, Jiye Li
, Qinghua Lu
:
Observability and Explainability for Software Systems Decision Making. IEEE Softw. 41(1): 45-49 (2024) - [c112]Zerui Wang
, Yan Liu
, Abishek Arumugam Thiruselvi
, Abdelwahab Hamou-Lhadj
:
XAIport: A Service Framework for the Early Adoption of XAI in AI Model Development. NIER@ICSE 2024: 67-71 - [c111]Issam Sedki
, Abdelwahab Hamou-Lhadj
, Otmane Aït Mohamed
, Naser Ezzati-Jivan
, Mohammed A. Shehab
:
Decoding Log Parsing Challenges: A Comprehensive Taxonomy for Actionable Solutions. ICSE Companion 2024: 392-393 - [c110]Maryam Mehrabi, Abdelwahab Hamou-Lhadj, Hossein Moosavi:
The Effectiveness of Compact Fine-Tuned LLMs in Log Parsing. ICSME 2024: 438-448 - [c109]Mahsa Panahandeh
, Naser Ezzati-Jivan
, Abdelwahab Hamou-Lhadj
, James Miller
:
Context-aware Root Cause Localization in Distributed Traces Using Social Network Analysis (Work In Progress paper). ICPE (Companion) 2024: 1-6 - [c108]Mahsa Panahandeh
, Naser Ezzati-Jivan
, Abdelwahab Hamou-Lhadj
, James Miller
:
Efficient Unsupervised Latency Culprit Ranking in Distributed Traces with GNN and Critical Path Analysis. ICPE (Companion) 2024: 62-66 - [i7]Zerui Wang, Yan Liu, Abishek Arumugam Thiruselvi, Abdelwahab Hamou-Lhadj:
XAIport: A Service Framework for the Early Adoption of XAI in AI Model Development. CoRR abs/2403.16858 (2024) - [i6]João Guilherme Faccin, Ingrid Nunes, Abdelwahab Hamou-Lhadj:
A cooperative strategy for diagnosing the root causes of quality requirement violations in multiagent systems. CoRR abs/2404.12226 (2024) - 2023
- [j40]Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj
, Xiapu Luo
, Haipeng Cai
:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. IEEE Trans. Software Eng. 49(4): 1983-2005 (2023) - [c107]Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Naser Ezzati-Jivan:
Towards a Classification of Log Parsing Errors. ICPC 2023: 84-88 - [c106]Maged Elaasar, Nicolas Rouquette, David A. Wagner, Bentley James Oakes, Abdelwahab Hamou-Lhadj, Mohammad Hamdaqa:
openCAESAR: Balancing Agility and Rigor in Model-Based Systems Engineering. MoDELS (Companion) 2023: 221-230 - [c105]Mohammed A. Shehab
, Abdelwahab Hamou-Lhadj, Venkata Sai Gunda:
JITBoost: Boosting Just-In-Time Defect Prediction using Boolean Combination of Classifiers. QRS 2023: 95-104 - 2022
- [j39]Maryam Mehrabi, Bahman Zamani
, Abdelwahab Hamou-Lhadj
:
HealMA: a model-driven framework for automatic generation of IoT-based Android health monitoring applications. Autom. Softw. Eng. 29(2): 56 (2022) - [j38]Keyur Patel, João Guilherme Faccin, Abdelwahab Hamou-Lhadj
, Ingrid Nunes:
The sense of logging in the Linux kernel. Empir. Softw. Eng. 27(6): 153 (2022) - [j37]Abdelouahed Gherbi, Wahab Hamou-Lhadj:
Guest Editors' introduction to the special section on the 12th system analysis and modelling conference (SAM 2020). Inf. Softw. Technol. 144: 106788 (2022) - [j36]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Locating and categorizing inefficient communication patterns in HPC systems using inter-process communication traces. J. Syst. Softw. 194: 111494 (2022) - [c104]Komal Panchal, Fatima Ait-Mahammed, Abdelwahab Hamou-Lhadj
, Zhongwen Zhu, Salman Memon, Alka Isac, Pragash Krishnamoorthy:
A Study on the Use of Runtime Files in Handling Crash Reports in a Large Telecom Company. FNWF 2022: 98-103 - [c103]Issam Sedki, Abdelwahab Hamou-Lhadj
, Otmane Aït Mohamed, Mohammed A. Shehab
:
An Effective Approach for Parsing Large Log Files. ICSME 2022: 1-12 - [c102]Madeline Janecek, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj
:
Performance anomaly detection through sequence alignment of system-level traces. ICPC 2022: 264-274 - [c101]Mohammed A. Shehab
, Abdelwahab Hamou-Lhadj
, Luay Alawneh:
ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of Projects. SANER 2022: 333-337 - [i5]Keyur Patel, João Guilherme Faccin, Abdelwahab Hamou-Lhadj, Ingrid Nunes:
The Sense of Logging in the Linux Kernel. CoRR abs/2208.06640 (2022) - 2021
- [j35]Mohammadali Gharaat, Mohammadreza Sharbaf, Bahman Zamani, Abdelwahab Hamou-Lhadj
:
ALBA: a model-driven framework for the automatic generation of android location-based apps. Autom. Softw. Eng. 28(1): 2 (2021) - [j34]Benjamin Vignau
, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj
:
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. J. Syst. Archit. 116: 102143 (2021) - [j33]Benjamin Vignau
, Raphaël Khoury
, Sylvain Hallé
, Abdelwahab Hamou-Lhadj
:
The Botnet Simulator: A simulation tool for understanding the interaction between botnets. Softw. Impacts 10: 100173 (2021) - [j32]Mahsa Panahandeh
, Mohammad Hamdaqa
, Bahman Zamani
, Abdelwahab Hamou-Lhadj
:
MUPPIT: a method for using proper patterns in model transformations. Softw. Syst. Model. 20(5): 1491-1523 (2021) - [c100]Md. Shariful Islam, Abdelwahab Hamou-Lhadj
, Korosh Koochekian Sabor, Mohammad Hamdaqa
, Haipeng Cai
:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. SANER 2021: 411-421 - [i4]Naser Ezzati-Jivan, Quentin Fournier, Michel R. Dagenais, Abdelwahab Hamou-Lhadj:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. CoRR abs/2103.04933 (2021) - [i3]Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa, Haipeng Cai:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. CoRR abs/2103.08083 (2021) - [i2]Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed:
AWSOM-LP: An Effective Log Parsing Technique Using Pattern Recognition and Frequency Analysis. CoRR abs/2110.15473 (2021) - 2020
- [j31]Diana El-Masri, Fábio Petrillo
, Yann-Gaël Guéhéneuc, Abdelwahab Hamou-Lhadj
, Anas Bouziane:
A systematic literature review on automated log abstraction techniques. Inf. Softw. Technol. 122: 106276 (2020) - [j30]Haipeng Cai
, Xiaoqin Fu, Abdelwahab Hamou-Lhadj
:
A study of run-time behavioral evolution of benign versus malicious apps in android. Inf. Softw. Technol. 122: 106291 (2020) - [j29]Korosh Koochekian Sabor, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj
:
Automatic prediction of the severity of bugs using stack traces and categorical features. Inf. Softw. Technol. 123: 106205 (2020) - [j28]Fazilat Hojaji, Bahman Zamani
, Abdelwahab Hamou-Lhadj
, Tanja Mayerhofer, Erwan Bousse
:
Lossless compaction of model execution traces. Softw. Syst. Model. 19(1): 199-230 (2020) - [c99]Raphaël Khoury, Benjamin Vignau, Sylvain Hallé, Abdelwahab Hamou-Lhadj
, Asma Razgallah:
An Analysis of the Use of CVEs by IoT Malware. FPS 2020: 47-62 - [c98]Naser Ezzati-Jivan, Quentin Fournier
, Michel R. Dagenais, Abdelwahab Hamou-Lhadj
:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. SCAM 2020: 149-159 - [c97]Rui Zhou, Mohammad Hamdaqa
, Haipeng Cai
, Abdelwahab Hamou-Lhadj
:
MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging Practices. SANER 2020: 577-581 - [e1]Abdelouahed Gherbi, Wahab Hamou-Lhadj, Ahmed Bali:
SAM '20: 12th System Analysis and Modelling Conference, Virtual Event, Canada, October 19-20, 2020. ACM 2020, ISBN 978-1-4503-8140-6 [contents]
2010 – 2019
- 2019
- [j27]Kobra Khanmohammadi
, Neda Ebrahimi, Abdelwahab Hamou-Lhadj
, Raphaël Khoury:
Empirical study of android repackaged applications. Empir. Softw. Eng. 24(6): 3587-3629 (2019) - [j26]Nasir Ali, Haipeng Cai
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine:
Exploiting Parts-of-Speech for effective automated requirements traceability. Inf. Softw. Technol. 106: 126-141 (2019) - [j25]Neda Ebrahimi, Abdelaziz Trabelsi, Md. Shariful Islam, Abdelwahab Hamou-Lhadj
, Kobra Khanmohammadi:
An HMM-based approach for automatic detection and classification of duplicate bug reports. Inf. Softw. Technol. 113: 98-109 (2019) - [j24]Fazilat Hojaji, Tanja Mayerhofer, Bahman Zamani
, Abdelwahab Hamou-Lhadj
, Erwan Bousse
:
Model execution tracing: a systematic mapping study. Softw. Syst. Model. 18(6): 3461-3485 (2019) - [c96]Korosh Koochekian Sabor, Abdelwahab Hamou-Lhadj, Abdelaziz Trabelsi, Jameleddine Hassine:
Predicting bug report fields using stack traces and categorical attributes. CASCON 2019: 224-233 - [c95]Omar Badreddin, Wahab Hamou-Lhadj, Swapnil Chauhan:
Susereum: towards a reward structure for sustainable scientific research software. SE4Science@ICSE 2019: 51-54 - [c94]Kobra Khanmohammadi, Raphaël Khoury, Abdelwahab Hamou-Lhadj
:
On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas. ISSRE Workshops 2019: 116-117 - [c93]Raphaël Khoury, Abdelwahab Hamou-Lhadj
, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo:
TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension. ISSRE Workshops 2019: 406-413 - 2018
- [j23]Jameleddine Hassine, Abdelwahab Hamou-Lhadj
, Luay Alawneh
:
A framework for the recovery and visualization of system availability scenarios from execution traces. Inf. Softw. Technol. 96: 78-93 (2018) - [j22]Pejman Salehi
, Abdelwahab Hamou-Lhadj
, Maria Toeroe, Ferhat Khendek
:
A model-driven approach for the generation of configurations for highly available software systems. Innov. Syst. Softw. Eng. 14(4): 273-307 (2018) - [j21]Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Chamseddine Talhi:
Combining heterogeneous anomaly detectors for improved software security. J. Syst. Softw. 137: 415-429 (2018) - [j20]Md. Shariful Islam
, Wael Khreich, Abdelwahab Hamou-Lhadj
:
Anomaly Detection Techniques Based on Kappa-Pruned Ensembles. IEEE Trans. Reliab. 67(1): 212-229 (2018) - [c92]Wahab Hamou-Lhadj, Mathieu Nayrolles:
A Project on Software Defect Prevention at Commit-Time: A Success Story of University-Industry Research Collaboration. SER&IP@ICSE 2018: 24-25 - [c91]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
:
Towards a classification of bugs to facilitate software maintainability tasks. SQUADE@ICSE 2018: 25-32 - [c90]Korosh Koochekian Sabor, Mathieu Nayrolles, Abdelaziz Trabelsi, Abdelwahab Hamou-Lhadj
:
An Approach for Predicting Bug Report Fields Using a Neural Network Learning Model. ISSRE Workshops 2018: 232-236 - [c89]Omar Badreddin, Gerardo Barraza, Wahab Hamou-Lhadj:
vOCL: A novel approach for UML constraints modeling. MoDELS (Workshops) 2018: 174-186 - [c88]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
:
CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects. MSR 2018: 153-164 - [c87]Md. Shariful Islam, Korosh Koochekian Sabor, Abdelaziz Trabelsi, Wahab Hamou-Lhadj
, Luay Alawneh
:
MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection System. QRS 2018: 25-34 - [c86]Omar Badreddin, Wahab Hamou-Lhadj
, Vahdat Abdelzad, Rahad Khandoker, Maged Elassar:
Collaborative Software Design and Modeling in Open Source Systems. SAM 2018: 219-228 - [r2]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [i1]Shayan Eskandari, Jeremy Clark, Abdelwahab Hamou-Lhadj:
Buy your coffee with bitcoin: Real-world deployment of a bitcoin point of sale terminal. CoRR abs/1802.04236 (2018) - 2017
- [j19]Wael Khreich, Babak Khosravifar, Abdelwahab Hamou-Lhadj
, Chamseddine Talhi:
An anomaly detection system based on variable N-gram features and one-class SVM. Inf. Softw. Technol. 91: 186-197 (2017) - [j18]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
, Sofiène Tahar, Alf Larsson
:
A bug reproduction approach based on directed model checking and crash traces. J. Softw. Evol. Process. 29(3) (2017) - [c85]Atli F. Einarsson, Patrekur Patreksson, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj
:
SmartHomeML: Towards a Domain-Specific Modeling Language for Creating Smart Home Applications. ICIOT 2017: 82-88 - [c84]Kobra Khanmohammadi, Abdelwahab Hamou-Lhadj
:
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security. QRS 2017: 168-175 - [c83]Korosh Koochekian Sabor, Abdelwahab Hamou-Lhadj
, Alf Larsson:
DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports. QRS 2017: 240-250 - [c82]Daniel Amyot
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine
:
On the Impact of the SDL Forum Society Conferences on Academic Research. SDL Forum 2017: 30-45 - [c81]Hasan Salim Alkaf, Jameleddine Hassine
, Abdelwahab Hamou-Lhadj
, Luay Alawneh
:
An Automated Change Impact Analysis Approach to GRL Models. SDL Forum 2017: 157-172 - 2016
- [j17]Pejman Salehi
, Abdelwahab Hamou-Lhadj
, Maria Toeroe, Ferhat Khendek
:
A UML-based domain specific modeling language for service availability management: Design and experience. Comput. Stand. Interfaces 44: 63-83 (2016) - [j16]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj
, Ayse Basar Bener
:
Mining trends and patterns of software vulnerabilities. J. Syst. Softw. 117: 218-228 (2016) - [j15]Luay Alawneh
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine
:
Segmenting large traces of inter-process communication with a focus on high performance computing systems. J. Syst. Softw. 120: 1-16 (2016) - [j14]Andriy V. Miranskyy, Abdelwahab Hamou-Lhadj
, Enzo Cialini, Alf Larsson
:
Operational-Log Analysis for Big Data Systems: Challenges and Solutions. IEEE Softw. 33(2): 52-59 (2016) - [c80]Neda Ebrahimi Koopaei, Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Mohammad Hamdaqa
:
An effective method for detecting duplicate crash reports using crash traces and hidden Markov models. CASCON 2016: 75-84 - [c79]Korosh Koochekian Sabor, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj:
Automatic prediction of the severity of bugs using stack traces. CASCON 2016: 96-105 - [c78]Hanieh Alipour, Yan Liu, Abdelwahab Hamou-Lhadj
, Ian Gorton:
Model driven performance simulation of cloud provisioned Hadoop mapreduce applications. MiSE@ICSE 2016: 48-54 - [c77]Raphaël Khoury, Lei Shi, Abdelwahab Hamou-Lhadj
:
Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle. ICSME 2016: 478-482 - [c76]Omar Badreddin, Maged Elaasar, Wahab Hamou-Lhadj
:
A Controlled Experiment for Evaluating the Comprehensibility of UML Action Languages. MODELSWARD 2016: 52-64 - [c75]Shayan Eskandari
, Jeremy Clark, Abdelwahab Hamou-Lhadj
:
Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 382-389 - [c74]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
:
BUMPER: A Tool for Coping with Natural Language Searches of Millions of Bugs and Fixes. SANER 2016: 649-652 - 2015
- [j13]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Abdelwahab Hamou-Lhadj
:
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System. IEEE Trans. Reliab. 64(1): 269-283 (2015) - [c73]Neda Ebrahimi Koopaei, Abdelwahab Hamou-Lhadj:
CrashAutomata: an approach for the detection of duplicate crash reports based on generalizable automata. CASCON 2015: 201-210 - [c72]Kobra Khanmohammadi, Mohammad Reza Rejali, Abdelwahab Hamou-Lhadj
:
Understanding the Service Life Cycle of Android Apps: An Exploratory Study. SPSM@CCS 2015: 81-86 - [c71]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj
, Stéphane Gagnon
:
A trace abstraction approach for host-based anomaly detection. CISDA 2015: 1-8 - [c70]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Nazim H. Madhavji, Mechelle Gittens:
Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces. GTSE@ICSE 2015: 59-68 - [c69]Abdou Maiga, Abdelwahab Hamou-Lhadj
, Mathieu Nayrolles, Korosh Koochekian Sabor, Alf Larsson
:
An empirical study on the handling of crash reports in a large software company: An experience report. ICSME 2015: 342-351 - [c68]Mathieu Nayrolles, Eric Beaudry, Naouel Moha, Petko Valtchev
, Abdelwahab Hamou-Lhadj
:
Towards Quality-Driven SOA Systems Refactoring Through Planning. MCETECH 2015: 269-284 - [c67]Omar Bahy Badreddin, Arnon Sturm, Abdelwahab Hamou-Lhadj, Timothy Lethbridge, Waylon Dixon, Ryan Simmons:
The Effects of Education on Students' Perception of Modeling in Software Engineering. HuFaMo@MoDELS 2015: 39-46 - [c66]Amirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj
:
An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques. QRS 2015: 109-118 - [c65]Maroua Ben Attia
, Chamseddine Talhi, Abdelwahab Hamou-Lhadj
, Babak Khosravifar, Vincent Turpaud, Mario Couture:
On-device anomaly detection for resource-limited systems. SAC 2015: 548-554 - [c64]Jameleddine Hassine
, Abdelwahab Hamou-Lhadj
:
Describing Early Security Requirements Using Use Case Maps. SDL Forum 2015: 202-217 - [c63]Manel Abdellatif
, Chamseddine Talhi, Abdelwahab Hamou-Lhadj
, Michel R. Dagenais:
On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis. SRDS Workshop 2015: 42-46 - [c62]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
, Sofiène Tahar, Alf Larsson
:
JCHARMING: A bug reproduction approach using crash traces and directed model checking. SANER 2015: 101-110 - [c61]Luay Alawneh
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine
:
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks. SANER 2015: 111-120 - 2014
- [j12]Alireza Shameli-Sendi, Mohamed Cheriet, Abdelwahab Hamou-Lhadj
:
Taxonomy of intrusion risk assessment and response system. Comput. Secur. 45: 1-16 (2014) - [j11]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Nazim H. Madhavji, Mechelle Gittens:
An empirical study on the use of mutant traces for diagnosis of faults in deployed systems. J. Syst. Softw. 90: 29-44 (2014) - [c60]Hanieh Alipour, Yan Liu, Abdelwahab Hamou-Lhadj:
Analyzing auto-scaling issues in cloud environments. CASCON 2014: 75-89 - [c59]Luay Alawneh
, Abdelwahab Hamou-Lhadj
, Syed Shariyar Murtaza, Yan Liu:
A contextual approach for effective recovery of inter-process communication patterns from HPC traces. CSMR-WCRE 2014: 274-282 - [c58]Salman Hoseini, Abdelwahab Hamou-Lhadj
, Patrick Desrosiers
, Martin Tapp:
Software feature location in practice: debugging aircraft simulation systems. ICSE Companion 2014: 225-234 - [c57]Jameleddine Hassine, Abdelwahab Hamou-Lhadj
:
Toward a UCM-Based Approach for Recovering System Availability Requirements from Execution Traces. SAM 2014: 48-63 - [c56]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Wael Khreich, Mario Couture:
Total ADS: Automated Software Anomaly Detection System. SCAM 2014: 83-88 - [r1]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining 2014: 894-904 - 2013
- [j10]Ali Kanso, Ferhat Khendek
, Maria Toeroe, Abdelwahab Hamou-Lhadj
:
Automatic configuration generation for service high availability with load balancing. Concurr. Comput. Pract. Exp. 25(2): 265-287 (2013) - [j9]Heidar Pirzadeh, Sara Shanian, Abdelwahab Hamou-Lhadj
, Luay Alawneh
, Arya Shafiee:
Stratified sampling of execution traces: Execution phases serving as strata. Sci. Comput. Program. 78(8): 1099-1118 (2013) - [c55]Alf Larsson
, Abdelwahab Hamou-Lhadj
:
Mining Telecom System Logs to Facilitate Debugging Tasks. ICSM 2013: 536-539 - [c54]Shayan Eskandari
, Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Mario Couture:
Monitoring system calls for anomaly detection in modern operating systems. ISSRE (Supplemental Proceedings) 2013: 19-20 - [c53]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj
, Mario Couture:
A host-based anomaly detection approach by representing system calls as states of kernel modules. ISSRE 2013: 431-440 - [c52]Abdelwahab Hamou-Lhadj
, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphaël Khoury:
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction. RACS 2013: 328-335 - [c51]Jameleddine Hassine
, Abdelwahab Hamou-Lhadj
:
Towards the Generation of AMF Configurations from Use Case Maps Based Availability Requirements. SDL Forum 2013: 36-53 - [p1]Abdelwahab Hamou-Lhadj:
The Role of Software Tracing in Software Maintenance. Modeling Approaches and Algorithms for Advanced Computer Applications 2013: 5 - 2012
- [j8]Abdelwahab Hamou-Lhadj
, Timothy C. Lethbridge
:
A metamodel for the compact but lossless exchange of execution traces. Softw. Syst. Model. 11(1): 77-98 (2012) - [c50]Maher Idris, Ali Mehrabian, Abdelwahab Hamou-Lhadj
, Richard Khoury:
Pattern-Based Trace Correlation Technique to Compare Software Versions. AIS 2012: 159-166 - [c49]Raphaël Khoury, Abdelwahab Hamou-Lhadj
, Mario Couture:
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security. CISDA 2012: 1-7 - [c48]Syed Shariyar Murtaza, Afroza Sultana, Abdelwahab Hamou-Lhadj
, Mario Couture:
On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies. CSMR 2012: 127-136 - [c47]Afroza Sultana, Abdelwahab Hamou-Lhadj
, Mario Couture:
An improved Hidden Markov Model for anomaly detection using frequent common patterns. ICC 2012: 1113-1117 - [c46]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Identifying computational phases from inter-process communication traces of HPC applications. ICPC 2012: 133-142 - 2011
- [j7]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
An exchange format for representing dynamic information generated from High Performance Computing applications. Future Gener. Comput. Syst. 27(4): 381-394 (2011) - [j6]Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj
:
An approach based on citation analysis to support effective handling of regulatory compliance. Future Gener. Comput. Syst. 27(4): 395-410 (2011) - [j5]Hossein Mehrfard, Abdelwahab Hamou-Lhadj
:
The Impact of Regulatory Compliance on Agile Software Processes with a Focus on the FDA Guidelines for Medical Device Software. Int. J. Inf. Syst. Model. Des. 2(2): 67-81 (2011) - [c45]Pejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:
AMF configurations: Checking for service protection using heuristics. CNSM 2011: 1-8 - [c44]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Pattern Recognition Techniques Applied to the Abstraction of Traces of Inter-Process Communication. CSMR 2011: 211-220 - [c43]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj
:
A Novel Approach Based on Gestalt Psychology for Abstracting the Content of Large Execution Traces for Program Comprehension. ICECCS 2011: 221-230 - [c42]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj
:
A software behaviour analysis framework based on the human perception systems. ICSE 2011: 948-951 - [c41]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj
, Mohak Shah:
Exploiting text mining techniques in the analysis of execution traces. ICSM 2011: 223-232 - [c40]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
MTF: A Scalable Exchange Format for Traces of High Performance Computing Systems. ICPC 2011: 181-184 - [c39]Heidar Pirzadeh, Sara Shanian, Abdelwahab Hamou-Lhadj
, Ali Mehrabian:
The Concept of Stratified Sampling of Execution Traces. ICPC 2011: 225-226 - 2010
- [j4]Abdelwahab Hamou-Lhadj
, Timothy C. Lethbridge
:
Understanding the complexity embedded in large routine call traces with a focus on program comprehension tasks. IET Softw. 4(2): 161-177 (2010) - [j3]Heidar Pirzadeh, Danny Dubé, Abdelwahab Hamou-Lhadj
:
An Extended Proof-Carrying Code Framework for Security Enforcement. Trans. Comput. Sci. 11: 249-269 (2010) - [c38]Pejman Salehi, Abdelwahab Hamou-Lhadj
, Pietro Colombo
, Ferhat Khendek
, Maria Toeroe:
A UML-Based Domain Specific Modeling Language for the Availability Management Framework. HASE 2010: 35-44 - [c37]Ali Kanso, Ferhat Khendek
, Abdelwahab Hamou-Lhadj
, Maria Toeroe:
Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing. NOTERE 2010: 33-40 - [c36]Pejman Salehi
, Pietro Colombo
, Abdelwahab Hamou-Lhadj
, Ferhat Khendek
:
A Model Driven Approach for AMF Configuration Generation. SAM 2010: 124-143 - [c35]Zohreh Sharafi, Parisa Mirshams, Abdelwahab Hamou-Lhadj
, Constantinos Constantinides:
Extending the UML Metamodel to Provide Support for Crosscutting Concerns. SERA 2010: 149-157 - [c34]Heidar Pirzadeh, Akanksha Agarwal, Abdelwahab Hamou-Lhadj
:
An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension. SERA 2010: 207-214 - [c33]Hossein Mehrfard, Heidar Pirzadeh, Abdelwahab Hamou-Lhadj
:
Investigating the Capability of Agile Processes to Support Life-Science Regulations: The Case of XP and FDA Regulations with a Focus on Human Factor Requirements. SERA (selected papers) 2010: 241-255 - [c32]Abdelwahab Hamou-Lhadj
, David Röthlisberger, Andy Zaidman
, Orla Greevy:
Workshop on Program Comprehension through Dynamic Analysis (PCODA10). WCRE 2010: 279-280
2000 – 2009
- 2009
- [j2]Abhishek Rohatgi, Abdelwahab Hamou-Lhadj
, Juergen Rilling:
Approach for solving the feature location problem by measuring the component modification impact. IET Softw. 3(4): 292-311 (2009) - [c31]Ali Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj
, Ferhat Khendek
:
Generating AMF Configurations from Software Vendor Constraints and User Requirements. ARES 2009: 454-461 - [c30]Chiragkumar Patel, Abdelwahab Hamou-Lhadj
, Juergen Rilling:
Software Clustering Using Dynamic Analysis and Static Dependencies. CSMR 2009: 27-36 - [c29]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel. FGIT-ASEA 2009: 253-263 - [c28]Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj
:
Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance Documents. ITNG 2009: 278-283 - [c27]Jagadeesh Nandigam, Venkat N. Gudivada, Abdelwahab Hamou-Lhadj
, Yonglei Tao:
Interface-Based Object-Oriented Design with Mock Objects. ITNG 2009: 713-718 - [c26]Abdelwahab Hamou-Lhadj
, Abdelouahed Gherbi
, Jagadeesh Nandigam:
The Impact of the Model-Driven Approach to Software Engineering on Software Engineering Education. ITNG 2009: 719-724 - [c25]Abdelouahed Gherbi
, Ali Kanso, Ferhat Khendek
, Abdelwahab Hamou-Lhadj
, Maria Toeroe:
A Tool Suite for the Generation and Validation of Configurations for Software Availability. ASE 2009: 671-673 - [c24]Mohamed Mussa, Samir Ouchani
, Waseem Al Sammane, Abdelwahab Hamou-Lhadj
:
A Survey of Model-Driven Testing Techniques. QSIC 2009: 167-172 - [c23]Heidar Pirzadeh, Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Quality of the Source Code for Design and Architecture Recovery Techniques: Utilities are the Problem. QSIC 2009: 465-469 - [c22]Pejman Salehi, Ferhat Khendek
, Maria Toeroe, Abdelwahab Hamou-Lhadj
, Abdelouahed Gherbi
:
Checking Service Instance Protection for AMF Configurations. SSIRI 2009: 269-274 - 2008
- [j1]Andy Zaidman
, Abdelwahab Hamou-Lhadj
, Orla Greevy:
Introduction to the special issue on program comprehension through dynamic analysis (PCODA). J. Softw. Maintenance Res. Pract. 20(4): 223-225 (2008) - [c21]Malik Qasaimeh, Hossein Mehrfard, Abdelwahab Hamou-Lhadj
:
Comparing Agile Software Processes Based on the Software Development Project Requirements. CIMCA/IAWTIC/ISE 2008: 49-54 - [c20]Christopher Diggins, Abdelwahab Hamou-Lhadj
:
JAction: A High-Level Surface Syntax for UML Action Semantics. CIMCA/IAWTIC/ISE 2008: 609-614 - [c19]Ali Kanso, Maria Toeroe, Ferhat Khendek
, Abdelwahab Hamou-Lhadj
:
Automatic Generation of AMF Compliant Configurations. ISAS 2008: 155-170 - [c18]Abdelwahab Hamou-Lhadj
:
Measuring the Complexity of Traces Using Shannon Entropy. ITNG 2008: 489-494 - [c17]Abhishek Rohatgi, Abdelwahab Hamou-Lhadj
, Juergen Rilling:
An Approach for Mapping Features to Code Based on Static and Dynamic Analysis. ICPC 2008: 236-241 - [c16]Abdeslam En-Nouaary, Abdelwahab Hamou-Lhadj
:
A Boundary Checking Technique for Testing Real-Time Systems Modeled as Timed Input Output Automata (Short Paper). QSIC 2008: 209-215 - [c15]Andy Zaidman
, Abdelwahab Hamou-Lhadj
, Orla Greevy, David Röthlisberger:
Workshop on Program Comprehension Through Dynamic Analysis (PCODA'08). WCRE 2008: 345-346 - 2007
- [c14]Abdelwahab Hamou-Lhadj:
Understanding the dynamics of information systems. ICEIS (1) 2007: 498-502 - [c13]Abdelwahab Hamou-Lhadj
:
Effective Exploration and Visualization of Large Execution Traces. VISSOFT 2007: 152-153 - [c12]Abdelwahab Hamou-Lhadj
, Andy Zaidman
, Orla Greevy:
Workshop on Program Comprehension through Dynamic Analysis (PCODA07). WCRE 2007: 298 - 2006
- [c11]Abdelwahab Hamou-Lhadj
, Timothy Lethbridge
:
Summarizing the Content of Large Traces to Facilitate the Understanding of the Behaviour of a Software System. ICPC 2006: 181-190 - [c10]Andy Zaidman
, Orla Greevy, Abdelwahab Hamou-Lhadj
:
Program COmprehension through Dynamic Analysis. WCRE 2006: 315 - 2005
- [c9]Abdelwahab Hamou-Lhadj
, Edna Braun, Daniel Amyot
, Timothy Lethbridge
:
Recovering Behavioral Design Models from Execution Traces. CSMR 2005: 112-121 - [c8]Abdelwahab Hamou-Lhadj, Timothy C. Lethbridge:
Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis Tools. ICECCS 2005: 559-568 - [c7]Abdelwahab Hamou-Lhadj
, Timothy C. Lethbridge
, Lianjiang Fu:
SEAT: A Usable Trace Analysis Tool. IWPC 2005: 157-160 - [c6]Orla Greevy, Abdelwahab Hamou-Lhadj
, Andy Zaidman
:
Workshop on Program Comprehension through Dynamic Analysis (PCODA '05). WCRE 2005: 232 - 2004
- [c5]Abdelwahab Hamou-Lhadj, Timothy C. Lethbridge:
A survey of trace exploration tools and techniques. CASCON 2004: 42-55 - [c4]Abdelwahab Hamou-Lhadj, Timothy Lethbridge, Lianjiang Fu:
Challenges and Requirements for an Effective Trace Exploration Tool. IWPC 2004: 70-78 - 2003
- [c3]Abdelwahab Hamou-Lhadj, Timothy C. Lethbridge:
Techniques for Reducing the Complexity of Object-Oriented Execution Traces. VISSOFT 2003: 35-40 - [c2]Abdelwahab Hamou-Lhadj
, Timothy Lethbridge
:
A Metamodel for Dynamic Information Generated from Object-Oriented Systems. ateM 2003: 59-69 - 2002
- [c1]Abdelwahab Hamou-Lhadj
, Timothy Lethbridge
:
Compression Techniques to Simplify the Analysis of Large Execution Traces. IWPC 2002: 159-168
Coauthor Index
aka: Timothy C. Lethbridge

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint