default search action
Lamia Labed Jilani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Olfa Ferchichi, Raoudha Beltaifa, Lamia Labed:
Association Rule Learning Based Approach to Automatic Generation of Feature Model Configurations. ENASE 2024: 262-272 - 2023
- [c42]Olfa Ferchichi, Raoudha Beltaifa, Lamia Labed Jilani:
Artificial Intelligence Based SysML Block Diagram Extension and Evolution for Product Lines. AICCSA 2023: 1-8 - [c41]Najla Maalaoui, Raoudha Beltaifa, Lamia Labed Jilani:
Toward a Deep Contextual Product Recommendation for SO-DSPL Framework. ENASE 2023: 138-148 - 2022
- [j11]Lamia Labed Jilani, Sihem Ben Sassi:
Innovations in systems and software engineering guest editorial: special issue on software and systems reuse. Innov. Syst. Softw. Eng. 18(1): 1-3 (2022) - 2021
- [c40]Najla Maalaoui, Raoudha Beltaifa, Lamia Labed Jilani, Raúl Mazo:
An Ontology for Service-Oriented Dynamic Software Product Lines Knowledge Management. ENASE 2021: 314-322 - [c39]Olfa Ferchichi, Raoudha Beltaifa, Lamia Labed Jilani:
A Reinforcement Learning Approach to Feature Model Maintainability Improvement. ENASE 2021: 389-396 - 2020
- [j10]Besma Khaireddine, Marwa Ben AbdelAli, Lamia Labed Jilani, Aleksandr Zakharchenko, Ali Mili:
Correctness enhancement: a pervasive software engineering paradigm. Int. J. Crit. Comput. Based Syst. 10(1): 37-73 (2020) - [c38]Olfa Ferchichi, Raoudha Beltaifa, Lamia Labed Jilani:
An ontological Rule-Based Approach for Software Product Lines Evolution. OCTA 2020: 1-9
2010 – 2019
- 2019
- [c37]Marwa Benabdelali, Lamia Labed Jilani:
Deriving Programs by Reliability Enhancement. ICSOFT 2019: 210-217 - 2018
- [c36]Marwa Benabdelali, Lamia Labed Jilani, Wided Ghardallou, Ali Mili:
Programming Without Refining. Refine@FM 2018: 39-52 - 2017
- [c35]Bochra Khiari, Lamia Labed Jilani:
Towards a DSPL for Context Aware BPM. AICCSA 2017: 12-18 - 2015
- [c34]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Computing Attributes of Software Architectures - A Static Method and Its Validation. ENASE 2015: 55-66 - [c33]Ines Achour, Lamia Labed, Henda Hajjami Ben Ghézala:
Formalization of Secure Service Oriented Product Line. ICSOFT-EA 2015: 93-100 - 2014
- [j9]Asma Louhichi, Wided Ghardallou, Khaled Bsaïes, Lamia Labed Jilani, Olfa Mraihi, Ali Mili:
Verifying while loops with invariant relations. Int. J. Crit. Comput. Based Syst. 5(1/2): 78-102 (2014) - [c32]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Automated Quantitative Attributes Prediction from Architectural Description Language. ICSOFT PT 2014: 87-94 - [c31]Ines Achour, Lamia Labed, Henda Ben Ghézala:
Towards an extended tool for analysis of extended feature models. ISNCC 2014: 1-5 - 2013
- [j8]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Wided Ghardallou, Khaled Bsaïes, Ali Mili:
Invariant functions and invariant relations: An alternative to invariant assertions. J. Symb. Comput. 48: 1-36 (2013) - [j7]Olfa Mraihi, Asma Louhichi, Lamia Labed Jilani, Jules Desharnais, Ali Mili:
Invariant assertions, invariant relations, and invariant functions. Sci. Comput. Program. 78(9): 1212-1239 (2013) - [c30]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Architecture Level Prediction of Software Quality Attributes. ENASE 2013: 15-24 - [c29]Imen Derbel, Lamia Labed Jilani, Ali Mili:
ACME+: An ADL for Quantitative Analysis of Quality Attributes. ENASE (Selected Papers) 2013: 16-32 - [c28]Imen Derbel, Lamia Labed Jilani, Ali Mili:
ACME+ for Software Architecture Analysis. ICSOFT 2013: 429-437 - 2012
- [j6]Lamia Labed Jilani, Asma Louhichi, Olfa Mraihi, Ali Mili:
Invariant relations, invariant functions, and loop functions. Innov. Syst. Softw. Eng. 8(3): 195-212 (2012) - [j5]Wided Ghardallou, Olfa Mraihi, Asma Louhichi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
A versatile concept for the analysis of loops. J. Log. Algebraic Methods Program. 81(5): 606-622 (2012) - 2011
- [j4]Lamia Labed Jilani, Imen Derbel, Khaled Bsaïes, Hamdi Nasreddine, Ali Mili:
Reasoning About Quantitative Architectural Attributes (Invited Paper). J. Softw. 6(4): 574-583 (2011) - [c27]Olfa Mraihi, Wided Ghardallou, Asma Louhichi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
Computing Preconditions and Postconditions of While Loops. ICTAC 2011: 173-193 - [c26]Rim Helali, Ines Achour, Lamia Labed Jilani, Henda Ben Ghézala:
A Study of E-Government Architectures. MCETECH 2011: 158-172 - 2010
- [j3]Ali Mili, Shir Aharon, Chaitanya Nadkarni, Lamia Labed Jilani, Asma Louhichi, Olfa Mraihi:
Reflexive transitive invariant relations: A basis for computing loop functions. J. Symb. Comput. 45(11): 1114-1143 (2010) - [c25]Imen Derbel, Lamia Labed Jilani, Ali Mili:
A model for analyzing architectural attributes. AICCSA 2010: 1-7 - [c24]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Ali Mili:
Towards an automated tool for computing loop functions. AICCSA 2010: 1-8 - [c23]Asma Louhichi, Olfa Mraihi, Lamia Labed Jilani, Ali Mili:
A Comparative Study of Invariant Assertions, Invariant Relations, and Invariant Functions. WING@ETAPS/IJCAR 2010: 152-166 - [c22]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Wided Ghardallou, Ali Mili:
Using invariant functions and invariant relations to compute loop functions. ICSE (2) 2010: 317-318
2000 – 2009
- 2009
- [c21]Asma Louhichi, Olfa Mraihi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
Relational Methods in the Analysis of While Loops: Observations of Versatility. RelMiCS 2009: 242-259 - 2008
- [c20]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
A Software Cost Estimation Meta-model for Systematic Reuse Approaches. Software Engineering Research and Practice 2008: 524-530 - 2007
- [c19]Ali Mili, Alex Vinokurov, Lamia Labed Jilani, Frederick T. Sheldon, Rahma Ben Ayed:
Towards an Engineering Discipline of Computational Society. HICSS 2007: 281 - [c18]Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
S2D-ProM: A Strategy Oriented Process Model for Secure Software Development. ICSEA 2007: 24 - [c17]Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
Towards a Comprehensive View of Secure Software Engineering. SECURWARE 2007: 181-186 - [c16]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Asma Louhichi, Henda Hajjami Ben Ghézala:
Software Product Line Economics: a Survey. Software Engineering Research and Practice 2007: 651-657 - [c15]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Asma Louhichi, Henda Hajjami Ben Ghézala:
Software Product Line Economics Revisited and Partial Validation. Software Engineering Research and Practice 2007: 671-677 - 2006
- [j2]Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani, Alex Vinokurov, Alexander Thomasian, Rahma Ben Ayed:
Modeling security as a dependability attribute: a refinement-based approach. Innov. Syst. Softw. Eng. 2(1): 39-48 (2006) - [c14]Nacim Yanes, Sihem Ben Sassi, Lamia Labed Jilani:
MoReCOTS: A Specialized Search Engine for COTS Components on the Web. ICCBSS 2006: 109-115 - [c13]Sihem Ben Sassi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
Towards a COTS-Based Development Environment. ICCBSS 2006: 167-176 - [c12]Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
ASASI: An Environment for Addressing Software Application Security Issues. ICSNC 2006: 19 - [c11]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
SoCoEMo-COTS: A Software Economic Model for Commercial Off-the-shelf (COTS) Based Software Development. Software Engineering Research and Practice 2006: 606-612 - 2005
- [c10]Sihem Ben Sassi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
COTS-based development process meta-modeling. AICCSA 2005: 116 - [c9]R. B. Hajri, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
An infrastructure to help development with reuse. AICCSA 2005: 139 - [c8]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
Reuse: Case of a Software Cost Estimation Model for Product Line Engineering. SEKE 2005: 657-660 - [c7]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
A Software Cost Estimation Model for a Product Line Engineering Approach: Supporting tool and UML Modeling. SERA 2005: 383-391 - [c6]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
A Software Cost Estimation Model for Product Line Engineering: SoCoEMo-PLE. Software Engineering Research and Practice 2005: 649-655 - [c5]Sana Ben Abdallah Ben Lamine, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
Cost Estimation for Product Line Engineering Using COTS Components. SPLC 2005: 113-123 - 2004
- [c4]Sihem Ben Sassi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
Modeling COTS-Based Development and Related Selection Methods Processes with MAP. APSEC 2004: 546-553 - 2003
- [c3]Sihem Ben Sassi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala:
COTS Characterization Model in a COTS-Based Development Environment. APSEC 2003: 352-361 - 2001
- [j1]Lamia Labed Jilani, Jules Desharnais, Ali Mili:
Defining and Applying Measures of Distance Between Specifications. IEEE Trans. Software Eng. 27(8): 673-703 (2001)
1990 – 1999
- 1997
- [c2]Rym Mili, Lamia Labed Jilani, Ali Mili:
Measures of Distances to Perform Approximate Retrieval. RelMiCS 1997: 301-307 - [c1]Lamia Labed Jilani, Jules Desharnais, Marc Frappier, Rym Mili, Ali Mili:
Retrieving Software Components that Minimize Adaptation Effort. ASE 1997: 255-
Coauthor Index
aka: Henda Hajjami Ben Ghézala
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-04 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint