default search action
Jeanine Souquières
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2017
- [j10]Imen Sayar, Jeanine Souquières:
La validation dans les premières étapes du processus de dévelopement. Ingénierie des Systèmes d Inf. 22(4): 11-41 (2017) - 2008
- [j9]Inès Mouakher, Jeanine Souquières, Francis Alexandre:
Diagnostic et correction d'erreurs de spécifications Application à l'assemblage de composants. Obj. Logiciel Base données Réseaux 14(4): 11-42 (2008) - [j8]Arnaud Lanoix, Jeanine Souquières:
Trustworthy Assembly of Components using the B Refinement. e Informatica Softw. Eng. J. 2(1): 9-28 (2008) - [j7]Boulbaba Ben Ammar, Mohamed Tahar Bhiri, Jeanine Souquières:
Modélisation événementielle pour la construction de diagrammes de classes. Ingénierie des Systèmes d Inf. 13(3): 131-155 (2008) - [j6]Boulbaba Ben Ammar, Mohamed Tahar Bhiri, Jeanine Souquières:
Incremental development of UML specifications using operation refinements. Innov. Syst. Softw. Eng. 4(3): 259-266 (2008) - [j5]Arnaud Lanoix, Samuel Colin, Jeanine Souquières:
Développement formel par composants Assemblage et vérification à l'aide de B. Tech. Sci. Informatiques 27(8): 1007-1032 (2008) - 2006
- [j4]Ninh-Thuan Truong, Jeanine Souquières:
Verification of UML Model Elements Using B. J. Inf. Sci. Eng. 22(2): 357-373 (2006) - 1995
- [j3]Eric Dubois, Jacques Hagelstein, Axel van Lamsweerde, Fernando Orejas, Jeanine Souquières, Pierre L. Wodon:
A Guided Tour through the ICARUS Project. ACM SIGSOFT Softw. Eng. Notes 20(2): 28-33 (1995) - 1985
- [j2]Jean-Pierre Finance, Jeanine Souquières:
A method and a language for constructing iterative programs. Sci. Comput. Program. 5(2): 201-218 (1985) - [j1]Jeanine Souquières, Jean-Pierre Finance:
Description and Improvement of Iterative Program Transformations. Sci. Comput. Program. 5(3): 233-264 (1985)
Conference and Workshop Papers
- 2019
- [c39]Imen Sayar, Jeanine Souquières:
Bridging the Gap Between Requirements Document and Formal Specifications using Development Patterns. RE Workshops 2019: 116-122 - 2018
- [c38]Fahad Rafique Golra, Fabien Dagnat, Jeanine Souquières, Imen Sayar, Sylvain Guérin:
Bridging the Gap Between Informal Requirements and Formal Specifications Using Model Federation. SEFM 2018: 54-69 - 2016
- [c37]Imen Sayar, Jeanine Souquières:
La Validation dans le Processus de Développement. INFORSID 2016: 67-82 - 2014
- [c36]Faqing Yang, Jean-Pierre Jacquot, Jeanine Souquières:
Proving the Fidelity of Simulations of Event-B Models. HASE 2014: 89-96 - 2013
- [c35]Faqing Yang, Jean-Pierre Jacquot, Jeanine Souquières:
JeB: Safe Simulation of Event-B Models in JavaScript. APSEC (1) 2013: 571-576 - 2012
- [c34]Faqing Yang, Jean-Pierre Jacquot, Jeanine Souquières:
The Case for Using Simulation to Validate Event-B Specifications. APSEC 2012: 85-90 - 2009
- [c33]Isabelle Côté, Maritta Heisel, Jeanine Souquières:
On the Evolution of Component-Based Software. CEE-SET 2009: 54-69 - 2008
- [c32]Samuel Colin, Arnaud Lanoix, Olga Kouchnarenko, Jeanine Souquières:
Towards Validating a Platoon of Cristal Vehicles Using CSP||B. AMAST 2008: 139-144 - [c31]Inès Mouakher, Jeanine Souquières, Francis Alexandre:
Protocol Verification in a Software Component-Based Approach. ECBS 2008: 136-145 - [c30]Samuel Colin, Arnaud Lanoix, Olga Kouchnarenko, Jeanine Souquières:
Using CSP||B Components: Application to a Platoon of Vehicles. FMICS 2008: 103-118 - 2007
- [c29]Arnaud Lanoix, Denis Hatebur, Maritta Heisel, Jeanine Souquières:
Enhancing Dependability of Component-Based Systems. Ada-Europe 2007: 41-54 - [c28]Samuel Colin, Arnaud Lanoix, Jeanine Souquières:
Trustworthy Interface Compliancy: Data Model Adaptation Using B Refinement. FESCA@ETAPS 2007: 23-35 - 2006
- [c27]Arnaud Lanoix, Dieu Donné Okalas Ossami, Jeanine Souquières:
An Operator-based Approach to Incremental Development of Conform Protocol State Machines. Trustworthy Software 2006 - [c26]Denis Hatebur, Maritta Heisel, Jeanine Souquières:
A Method for Component-Based Software and System Development. EUROMICRO-SEAA 2006: 72-80 - 2005
- [c25]Dieu Donné Okalas Ossami, Jean-Pierre Jacquot, Jeanine Souquières:
Consistency in UML and B Multi-view Specifications. IFM 2005: 386-405 - [c24]Ninh-Thuan Truong, Jeanine Souquières:
Verification of behavioural elements of UML models using B. SAC 2005: 1546-1552 - [c23]Jeanine Souquières, Samir Chouali:
Verifying the compatibility of component interfaces using the B formal method. Software Engineering Research and Practice 2005: 850-856 - [c22]Ninh-Thuan Truong, Jeanine Souquières:
Validation of UML static diagrams using B. Software Engineering Research and Practice 2005: 915-927 - [c21]Samir Chouali, Maritta Heisel, Jeanine Souquières:
Proving Component Interoperability with B Refinement. FACS 2005: 157-172 - 2004
- [c20]Ninh-Thuan Truong, Jeanine Souquières:
An Approach for the Verification of UML Models Using B. ECBS 2004: 195-202 - 2003
- [c19]Maritta Heisel, Jeanine Souquières:
Adding Features to Component-Based Systems. Objects, Agents, and Features 2003: 137-153 - 2002
- [c18]Hung Ledang, Jeanine Souquières:
Integration of UML and B Specification Techniques: Systematic Transformation from OCL Expressions into B. APSEC 2002: 495- - [c17]Maritta Heisel, Thomas Santen, Jeanine Souquières:
Toward a Formal Model of Software Components. ICFEM 2002: 57-68 - [c16]Hung Ledang, Jeanine Souquières:
Contributions for Modelling UML State-Charts in B. IFM 2002: 109-127 - 2001
- [c15]Hung Ledang, Jeanine Souquières:
Integrating UML and B Specification Techniques. GI Jahrestagung (1) 2001: 641-648 - [c14]Hung Ledang, Jeanine Souquières:
Modeling Class Operations in B: Application to UML Behavioral Diagrams. ASE 2001: 289-296 - 2000
- [c13]Maritta Heisel, Jeanine Souquières:
A Heuristic Algorithm to Detect Feature Interactions in Requirements. FIREworks 2000: 143-162 - 1999
- [c12]Maritta Heisel, Jeanine Souquières:
A Method for Requirements Elicitation and Formal Specification. ER 1999: 309-324 - [c11]Eric Meyer, Jeanine Souquières:
A Systematic Approach to Transform OMT Diagrams to a B Specification. World Congress on Formal Methods 1999: 875-895 - 1998
- [c10]Maritta Heisel, Jeanine Souquières:
A Heuristic Approach to Detect Feature Interactions in Requirements. FIW 1998: 165-171 - [c9]Maritta Heisel, Jeanine Souquières:
Methodological Support for Requirements Elicitation and Formal Specification. IWSSD 1998: 153-155 - 1997
- [c8]Nicole Lévy, Jeanine Souquières:
Modelling Specification Construction by Successive Approximations. AMAST 1997: 351-364 - [c7]Robert Darimont, Jeanine Souquières:
Reusing Operational Requirements: A Process-Oriented Approach. RE 1997: 16- - 1996
- [c6]Jeanine Souquières, Nicole Lévy:
PROPLANE: A Specification Development Environment. AMAST 1996: 612-615 - [c5]Nicole Lévy, Jeanine Souquières:
A "Coming and Going" Approach to Specification Construction: A Scenario. IWSSD 1996: 155-158 - 1993
- [c4]Robert Darimont, Jeanine Souquières:
A Development Model: Application to Z Specifications. Information System Development Process 1993: 247-264 - [c3]Jeanine Souquières, Nicole Lévy:
Description of specification developments. RE 1993: 216-223 - 1992
- [c2]Jeanine Souquières:
A Model to Support Software Enginneering Activities. PPIG (2) 1992: 16 - 1987
- [c1]Eric Dubois, Nicole Lévy, Jeanine Souquières:
Formalising Reconstructuring Operators in a Specification Process. ESEC 1987: 161-171
Informal and Other Publications
- 2008
- [i1]Jeanine Souquières:
A Component-Based Approach for the Verification of Safety-Critical Software. ERCIM News 2008(75) (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint