Ali Mili - Publications

Affiliations: 
West Virginia University, Morgantown, WV, United States 
Area:
Computer Science
Website:
https://people.njit.edu/faculty/mili

120 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Diallo N, Ghardallou W, Desharnais J, Mili A. Convergence: Integrating termination and abort-freedom The Journal of Logic and Algebraic Programming. 97: 1-29. DOI: 10.1016/J.Jlamp.2018.02.001  0.52
2017 Desharnais J, Diallo N, Ghardallou W, Mili A. Projecting programs on specifications: Definition and implications Science of Computer Programming. 138: 26-48. DOI: 10.1016/J.Scico.2016.11.006  0.52
2017 Diallo N, Ghardallou W, Desharnais J, Frias M, Jaoua A, Mili A. What is a fault? and why does it matter? Innovations in Systems and Software Engineering. 13: 219-239. DOI: 10.1007/S11334-017-0300-7  0.52
2015 Rjaibi N, Rabai LBA, Mili A. The MFC cybersecurity model extension and diagnostic toward a depth measurement: E-learning systems case study Achieving Enterprise Agility Through Innovative Software Development. 179-198. DOI: 10.4018/978-1-4666-8510-9.ch009  0.52
2015 Ben Arfa Rabai L, Cohen B, Mili A. Programming language use in US academia and industry Informatics in Education. 14: 143-160. DOI: 10.15388/Infedu.2015.09  0.52
2015 Diallo N, Ghardallou W, Mili A. Correctness and Relative Correctness Proceedings - International Conference On Software Engineering. 2: 591-594. DOI: 10.1109/ICSE.2015.200  0.52
2015 Tchier F, Rabai LBA, Mili A. Putting engineering into software engineering: Upholding software engineering principles in the classroom Computers in Human Behavior. 48: 245-254. DOI: 10.1016/J.Chb.2015.01.054  0.52
2015 Desharnais J, Diallo N, Ghardallou W, Frias MF, Jaoua A, Mili A. Relational mathematics for relative correctness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9348: 191-208. DOI: 10.1007/978-3-319-24704-5_12  0.52
2015 Diallo N, Mili A. Loop analysis and repair Ceur Workshop Proceedings. 1454: 23-32.  0.52
2015 Derbel I, Jilani LL, Mili A. Computing attributes of software architectures: A static method and its validation Enase 2015 - Proceedings of the 10th International Conference On Evaluation of Novel Approaches to Software Engineering. 55-66.  0.52
2014 Louhichi A, Ghardallou W, Bsaies K, Jilani LL, Mraihi O, Mili A. Verifying while loops with invariant relations International Journal of Critical Computer-Based Systems. 5: 78-102. DOI: 10.1504/Ijccbs.2014.059596  0.52
2014 Aissa AB, Rabai LBA, Abercrombie RK, Sheldon FT, Mili A. Quantifying availability in SCADA environments using the cyber security metric MFC Acm International Conference Proceeding Series. 81-84. DOI: 10.1145/2602087.2602103  0.52
2014 Ben Aissa A, Abercrombie RK, Sheldon FT, Mili A. Quantifying the impact of unavailability in cyber-physical environments Ieee Ssci 2014: 2014 Ieee Symposium Series On Computational Intelligence - Cics 2014: 2014 Ieee Symposium On Computational Intelligence in Cyber Security, Proceedings. DOI: 10.1109/CICYBS.2014.7013364  0.52
2014 Mili A, Jaoua A, Frias M, Helali RGM. Semantic metrics for software products Innovations in Systems and Software Engineering. 10: 203-217. DOI: 10.1007/S11334-014-0233-3  0.52
2014 Mili A, Frias MF, Jaoua A. On faults and faulty programs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8428: 191-207. DOI: 10.1007/978-3-319-06251-8_12  0.52
2014 Derbel I, Jilani LL, Mili A. Automated quantitative attributes prediction from architectural description language Icsoft-Pt 2014 - Proceedings of the 9th International Conference On Software Paradigm Trends. 87-94.  0.52
2014 Rosner N, Pombo CGL, Aguirre N, Jaoua A, Mili A, Frias MF. Parallel bounded verification of alloy models by tranScoping Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8164: 88-107.  0.52
2013 Abercrombie RK, Sheldon FT, Hauser KR, Lantz MW, Mili A. Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA) Acm International Conference Proceeding Series. DOI: 10.1145/2459976.2459998  0.52
2013 Abercrombie RK, Sheldon FT, Hauser KR, Lantz MW, Mili A. Risk assessment methodology based on the NISTIR 7628 guidelines Proceedings of the Annual Hawaii International Conference On System Sciences. 1802-1811. DOI: 10.1109/HICSS.2013.466  0.52
2013 Mraihi O, Louhichi A, Jilani LL, Desharnais J, Mili A. Invariant assertions, invariant relations, and invariant functions Science of Computer Programming. 78: 1212-1239. DOI: 10.1016/J.Scico.2012.05.006  0.52
2013 Jilani LL, Mraihi O, Louhichi A, Ghardallou W, Bsaies K, Mili A. Invariant functions and invariant relations: An alternative to invariant assertions Journal of Symbolic Computation. 48: 1-36. DOI: 10.1016/J.Jsc.2012.04.001  0.52
2013 Derbel I, Jilani LL, Mili A. ACME+: An ADL for Quantitative Analysis of Quality Attributes Communications in Computer and Information Science. 417: 16-32. DOI: 10.1007/978-3-642-54092-9_2  0.52
2013 Derbel I, Jilani LL, Mili A. ACME+ for software architecture analysis Icsoft 2013 - Proceedings of the 8th International Joint Conference On Software Technologies. 429-437.  0.52
2013 Derbel I, Jilani LL, Mili A. Architecture level prediction of software quality attributes Enase 2013 - Proceedings of the 8th International Conference On Evaluation of Novel Approaches to Software Engineering. 15-24.  0.52
2012 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Defining and computing a value based cyber-security measure Information Systems and E-Business Management. 10: 433-453. DOI: 10.1145/2107556.2107561  0.52
2012 Rabai LBA, Jouini M, Nafati M, Aissa AB, Mili A. An economic model of security threats for cloud computing systems Proceedings 2012 International Conference On Cyber Security, Cyber Warfare and Digital Forensic, Cybersec 2012. 100-105. DOI: 10.1109/CyberSec.2012.6246112  0.52
2012 Ghardallou W, Mraihi O, Louhichi A, Jilani LL, Bsaies K, Mili A. A versatile concept for the analysis of loops Journal of Logic and Algebraic Programming. 81: 606-622. DOI: 10.1016/J.Jlap.2012.04.001  0.52
2012 Labed Jilani L, Louhichi A, Mraihi O, Mili A. Invariant relations, invariant functions, and loop functions Innovations in Systems and Software Engineering. 8: 195-212. DOI: 10.1007/S11334-012-0189-0  0.52
2011 Jilani LL, Derbel I, Bsaies K, Nasreddine H, Mili A. Reasoning about quantitative Architectural attributes Journal of Software. 6: 574-583. DOI: 10.4304/Jsw.6.4.574-583  0.52
2011 Abercrombie RK, Sheldon FT, Mili A. Validating cyber security requirements: A case study Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2011.480  0.52
2011 Arfa Rabai LB, Bai YZ, Mili A. A quantitative model for software engineering trends Information Sciences. 181: 4993-5009. DOI: 10.1016/J.Ins.2011.07.004  0.52
2011 Mraihi O, Ghardallou W, Louhichi A, Labed Jilani L, Bsaies K, Mili A. Computing preconditions and postconditions of while loops Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6916: 173-193. DOI: 10.1007/978-3-642-23283-1_13  0.52
2010 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Software requirements for a system to compute mean failure cost Acm International Conference Proceeding Series. DOI: 10.1145/1852666.1852750  0.52
2010 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Modeling stakeholder/value dependency through mean failure cost Acm International Conference Proceeding Series. DOI: 10.1145/1852666.1852727  0.52
2010 Labed Jilani L, Mraihi O, Louhichi A, Ghardallou W, Mili A. Using invariant functions and invariant relations to compute loop functions Proceedings - International Conference On Software Engineering. 2: 317-318. DOI: 10.1145/1810295.1810369  0.52
2010 Jilani LL, Mraihi O, Louhichi A, Mili A. Towards an automated tool for computing loop functions 2010 Acs/Ieee International Conference On Computer Systems and Applications, Aiccsa 2010. DOI: 10.1109/AICCSA.2010.5586943  0.52
2010 Derbel I, Jilani LL, Mili A. A model for analyzing architectural attributes 2010 Acs/Ieee International Conference On Computer Systems and Applications, Aiccsa 2010. DOI: 10.1109/AICCSA.2010.5586933  0.52
2010 Mili A, Aharon S, Nadkarni C, Jilani LL, Louhichi A, Mraihi O. Reflexive transitive invariant relations: A basis for computing loop functions Journal of Symbolic Computation. 45: 1114-1143. DOI: 10.1016/J.Jsc.2008.11.007  0.52
2010 Ben Aissa A, Abercrombie RK, Sheldon FT, Mili A. Quantifying security threats and their potential impacts: A case study Innovations in Systems and Software Engineering. 6: 269-281. DOI: 10.1007/S11334-010-0123-2  0.52
2009 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Quantifying security threats and their impact Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558637  0.52
2009 Sheldon FT, Abercrombie RK, Mili A. Methodology for evaluating security controls based on key performance indicators and stakeholder mission Proceedings of the 42nd Annual Hawaii International Conference On System Sciences, Hicss. DOI: 10.1109/HICSS.2009.308  0.52
2009 Mili A, Sheldon F. Challenging the mean time to failure: Measuring dependability as a mean failure cost Proceedings of the 42nd Annual Hawaii International Conference On System Sciences, Hicss. DOI: 10.1109/HICSS.2009.107  0.52
2009 Abercrombie RK, Sheldon FT, Mili A. Managing complex IT security processes with value based measures 2009 Ieee Symposium On Computational Intelligence in Cyber Security, Cics 2009 - Proceedings. DOI: 10.1109/CICYBS.2009.4925092  0.52
2009 Mili A, Aharon S, Nadkarni C. Mathematics for reasoning about loop functions Science of Computer Programming. 74: 989-1020. DOI: 10.1016/J.Scico.2009.09.009  0.52
2009 Mili A, Ben Ayed R, Aharon S, Nadkarni C. Harnessing a Refinement Theory to Compute Loop Functions Electronic Notes in Theoretical Computer Science. 243: 139-155. DOI: 10.1016/J.Entcs.2009.07.010  0.52
2009 Louhichi A, Mraihi O, Jilani LL, Bsaies K, Mili A. Relational methods in the analysis of while loops: Observations of versatility Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5827: 242-259. DOI: 10.1007/978-3-642-04639-1_17  0.52
2009 Rabai LBA, Bai YZ, Mili A. Modeling the evolution of software engineering trends - A bottom up approach Icsoft 2009 - 4th International Conference On Software and Data Technologies, Proceedings. 1: 47-54.  0.52
2008 Sheldon FT, Abercrombie RK, Mili A. Evaluating security controls based on key performance indicators and stakeholder mission Csiirw'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead. DOI: 10.1145/1413140.1413188  0.52
2008 Sheldon F, Krings A, Abercrombie R, Mili A. CSIIRW08: Cyber Security and Information Intelligence Research Workshop Csiirw'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead 0.52
2008 Mili A, Aharon S, Nadkarni C. An algorithm for computing loop functions 20th International Conference On Software Engineering and Knowledge Engineering, Seke 2008. 448-453.  0.52
2007 Mili A. A refinement-based framework for computing loop behavior Proceedings - International Conference On Software Engineering. 144-153. DOI: 10.1109/SEW.2007.87  0.52
2007 Mili A, Vinokurov A, Jilani LL, Sheldon FT, Ayed RB. Towards an engineering discipline of computational security Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2007.568  0.52
2007 Mili A, Daly T, Pleszkoch M, Prowell S. A semantic recognizer infrastructure for computing loop behavior Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2007.32  0.52
2007 Mili A, Sheldon F. Measuring reliability as a mean failure cost Proceedings of Ieee International Symposium On High Assurance Systems Engineering. 403-404. DOI: 10.1109/HASE.2007.47  0.52
2007 Peng Y, Li F, Mili A. Modeling the evolution of operating systems: An empirical study Journal of Systems and Software. 80: 1-15. DOI: 10.1016/J.Jss.2006.03.049  0.52
2007 Bai Y, Mili A. Monitoring software technology evolution, one trend at a time 16th International Conference On Software Engineering and Data Engineering, Sede 2007. 349-355.  0.52
2007 Korkmaz M, Mili A. A product line of software reuse cost models Icsoft 2007 - 2nd International Conference On Software and Data Technologies, Proceedings. 264-269.  0.52
2006 Mili A, Sheldon F, Jilani LL, Vinokurov A, Thomasian A, Ayed RB. Modeling security as a dependability attribute: A refinement-based approach Innovations in Systems and Software Engineering. 2: 39-48. DOI: 10.1007/S11334-006-0023-7  0.52
2006 Mili A, Wu L, Sheldon FT, Shereshevsky M, Desharnais J. Modeling redundancy: Quantitative and qualitative models Ieee International Conference On Computer Systems and Applications, 2006. 2006: 1-8.  0.52
2006 Shaik I, Abdelmoez W, Gunnalan R, Shereshevsky M, Zeid A, Ammar HH, Mili A, Fuhrman C. Using change propagation probabilities to assess quality attributes of software architectures Ieee International Conference On Computer Systems and Applications, 2006. 2006: 704-711.  0.52
2005 Shaik I, Abdelmoez W, Gunnalan R, Shereshevsky M, Zeid A, Ammar HH, Mili A, Fuhrman C. Change propagation for assessing design quality of software architectures Proceedings - 5th Working Ieee/Ifip Conference On Software Architecture, Wicsa 2005. 2005: 205-208. DOI: 10.1109/WICSA.2005.21  0.52
2005 Chen Y, Dios R, Mili A, Wu L, Wang K. An empirical study of programming language trends Ieee Software. 22: 72-79. DOI: 10.1109/Ms.2005.55  0.52
2005 Cortellessa V, Del Gobbo D, Shereshevsky M, Desharnais J, Mili A. Relational characterizations of system fault tolerance Science of Computer Programming. 56: 343-361. DOI: 10.1016/J.Scico.2004.07.003  0.52
2005 Mili A, Sheldon F, Mili F, Desharnais J. Recoverability preservation: A measure of last resort Innovations in Systems and Software Engineering. 1: 54-62. DOI: 10.1007/S11334-005-0004-2  0.52
2004 Abdelmoez W, Nassar DM, Shereshevsky M, Gradetsky N, Gunnalan R, Ammar HH, Yu B, Mili A. Error propagation in software architectures Proceedings - International Software Metrics Symposium. 384-393. DOI: 10.1109/METRIC.2004.1357923  0.52
2004 Abdelmoez W, Shereshevsky M, Gunnalan R, Ammar HH, Yu B, Bogazzi S, Korkmaz M, Mili A. Software Architectures Change Propagation Tool (SACPT) Ieee International Conference On Software Maintenance, Icsm. 517. DOI: 10.1109/ICSM.2004.1357860  0.52
2004 Mili A, Jiang G, Cukic B, Liu Y, Ayed RB. Towards the verification and validation of online learning systems: General framework and applications Proceedings of the Hawaii International Conference On System Sciences. 37: 4857-4866.  0.52
2003 Goseva-Popstojanova K, Hassan A, Guedem A, Abdelmoez W, Nassar DEM, Ammar H, Mili A. Architectural-Level Risk Analysis Using UML Ieee Transactions On Software Engineering. 29: 946-959. DOI: 10.1109/Tse.2003.1237174  0.52
2003 Del Gobbo D, Mili A. An application of relational algebra: Specification of a fault tolerant flight control system Electronic Notes in Theoretical Computer Science. 44: 75-92. DOI: 10.1016/S1571-0661(04)80933-2  0.52
2002 Cowan RD, McKendall A, Mili A, Yang L, Wang L, Chen D, Janardhana V, Spencer T. Software engineering technology watch Information Sciences. 140: 195-215. DOI: 10.1109/Ms.2002.1020299  0.52
2002 Barkaoui K, Jmaiel M, Mili A. COPS: Cooperative problem solving using DCOM Journal of Systems and Software. 63: 79-90. DOI: 10.1016/S0164-1212(01)00115-7  0.52
2002 Barkaoui K, Jmaiel M, Mili A. Journal of Systems and Software: Guest editorial Journal of Systems and Software. 60: 87-89. DOI: 10.1016/S0164-1212(01)00081-4  0.52
2001 Gobbo DD, Mili A. Re-engineering Fault Tolerance requirements: A case study in specifying fault Tolerant Flight Control Systems Proceedings of the Ieee International Conference On Requirements Engineering. 236-245. DOI: 10.1109/Isre.2001.948564  0.52
2001 Jilani LL, Desharnais J, Mili A. Defining and applying measures of distance between specifications Ieee Transactions On Software Engineering. 27: 673-703. DOI: 10.1109/32.940565  0.52
2001 Mili A, Chmiel SF, Gottumukkala R, Zhang L. Managing Software Reuse Economics: An Integrated ROI-based Model Annals of Software Engineering. 11: 175-218. DOI: 10.1023/A:1012599304672  0.52
2001 Shereshevsky M, Ammari H, Gradetsky N, Mili A, Ammar HH. Information theoretic metrics for software architectures Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 151-157.  0.52
2001 Rombach D, Broy M, Evangelist M, Mili A, Osterweil L, Parnas DL. Software engineering research agendas panel (SERA) "What can't we do, but need to learn how to do?", Proceedings - International Conference On Software Engineering. 698.  0.52
2000 Ammar HH, Cukic B, Mili A, Fuhrman C. A comparative analysis of hardware and software fault tolerance: Impact on software reliability engineering Annals of Software Engineering. 10: 103-150. DOI: 10.1023/A:1018987616443  0.52
2000 Mili R, Desharnais J, Frappier M, Mili A. Semantic distance between specifications Theoretical Computer Science. 247: 257-276. DOI: 10.1016/S0304-3975(99)00085-7  0.52
2000 Ayed RB, Desharnais J, Frappier M, Mili A. Calculus of program adaptation and its applications Science of Computer Programming. 38: 73-123. DOI: 10.1016/S0167-6423(99)00046-5  0.52
2000 Mili A, Chmiel SF, Gottumukkala R, Zhang L. Tracking, predicting and assessing software reuse costs: an automated tool Proceedings - International Conference On Software Engineering. 785.  0.52
2000 Mili A, Chmiel SF, Gottumukkala R, Zhang L. Integrated cost model for software reuse Proceedings - International Conference On Software Engineering. 157-166.  0.52
2000 Yacoub S, Ammar HH, Mili A. Constructional design patterns as reusable components Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1844: 369-387.  0.52
1999 Mili A, Yacoub S, Addy E, Mili H. Toward an engineering discipline of software reuse Ieee Software. 16: 22-30. DOI: 10.1109/52.795098  0.52
1999 Addy E, Mili A, Yacoub S. A Case Study in Software Reuse Software Quality Journal. 8: 169-196. DOI: 10.1023/A:1008963424886  0.52
1999 Mili A. Desert island column: The long story of a short theorem Automated Software Engineering. 6: 199-204. DOI: 10.1023/A:1008770731005  0.52
1998 Desharnais J, Frappier M, Khédri R, Mili A. Integration of sequential scenarios Ieee Transactions On Software Engineering. 24: 695-708. DOI: 10.1109/32.713325  0.52
1998 Frappier M, Mili A, Desharnais J. Unifying program construction and modification Logic Journal of the Igpl \/ Bulletin of the Igpl. 6: 317-340. DOI: 10.1093/Jigpal/6.2.317  0.52
1998 Mili A, Mili R, Mittermeir RT. A survey of software reuse libraries Annals of Software Engineering. 5: 349-414. DOI: 10.1023/A:1018964121953  0.52
1998 Ben Ayed R, Desharnais J, Frappier M, Mili A. Mathematical foundations for program transformations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1559: 319-321.  0.52
1996 Frappier M, Mili A, Desharnais J. A relational calculus for program construction by parts Science of Computer Programming. 26: 237-254.  0.52
1995 Mili H, Mili F, Mili A. Reusing Software: Issues and Research Directions Ieee Transactions On Software Engineering. 21: 528-562. DOI: 10.1109/32.391379  0.52
1995 Mankai C, Mili A. Machine translation from Arabic to English and French Information Sciences - Applications. 3: 91-109. DOI: 10.1016/1069-0115(94)00059-B  0.52
1995 Desharnais J, Belkhiter N, Sghaier SBM, Tchier F, Jaoua A, Mili A, Zaguia N. Embedding a demonic semilattice in a relation algebra Theoretical Computer Science. 149: 333-360. DOI: 10.1016/0304-3975(94)00271-J  0.52
1995 Frappier M, Mili A, Desharnais J. Program construction by parts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 947: 257-281. DOI: 10.1007/3-540-60117-1_15  0.52
1994 Mili A, Mili R. Storing and retrieving software components: a refinement based system Proceedings - International Conference On Software Engineering. 91-100. DOI: 10.1109/32.605762  0.52
1993 Desharnais J, Jaoua A, Mili F, Boudriga N, Mili A. A relational division operator: the conjugate kernel Theoretical Computer Science. 114: 247-272. DOI: 10.1016/0304-3975(93)90074-4  0.52
1993 Desharnais J, Mili A, Mili F. On the mathematics of sequential decompositions Science of Computer Programming. 20: 253-289. DOI: 10.1016/0167-6423(93)90016-I  0.52
1993 Boudriga N, Slimani Y, Mili A. Relation-based semantics for concurrency Information Sciences. 75: 223-252. DOI: 10.1016/0020-0255(93)90056-R  0.52
1992 Mili F, Mili A. Heuristics for constructing while loops Science of Computer Programming. 18: 67-106. DOI: 10.1016/0167-6423(92)90034-9  0.52
1992 Boudriga N, Mili A, Zalila R, Mili F. A relational model for the specification of data types Computer Languages. 17: 101-131. DOI: 10.1016/0096-0551(92)90002-5  0.52
1992 Boudriga N, Elloumi F, Mili A. On the lattice of specifications: Applications to a specification methodology Formal Aspects of Computing. 4: 544-571. DOI: 10.1007/Bf01211474  0.52
1991 Marwane R, Mili A. Building tailor-made software cost model: Intermediate TUCOMO Information and Software Technology. 33: 232-238. DOI: 10.1016/0950-5849(91)90138-2  0.52
1991 Boudriga N, Mili A, Zalila R. Didon: system for specification validation Information and Software Technology. 33: 489-498. DOI: 10.1016/0950-5849(91)90093-Q  0.52
1991 Jaoua A, Mili A, Boudriga N, Durieux JL. Regularity of relations: A measure of uniformity Theoretical Computer Science. 79: 323-339. DOI: 10.1016/0304-3975(91)90335-Y  0.52
1991 Kemayel L, Mili A, Ouederni I. Controllable factors for programmer productivity: A statistical study The Journal of Systems and Software. 16: 151-163. DOI: 10.1016/0164-1212(91)90009-U  0.52
1990 Finance JP, Mili A. A foreword to the special issue of the journal of systems and software on the Role of languages in programming (the Tenth Tunisian-French Seminar of Computer Science) The Journal of Systems and Software. 12: 83-85. DOI: 10.1016/0164-1212(90)90072-T  0.52
1990 Jaoua A, Mili A. The use of executable assertions for error detection and damage assessment The Journal of Systems and Software. 12: 15-37. DOI: 10.1016/0164-1212(90)90063-R  0.52
1989 Marouane R, Mili A. Economics of software project management in Tunisia: Basic TUCOMO Information and Software Technology. 31: 251-257. DOI: 10.1016/0950-5849(89)90004-9  0.52
1987 Mili A, Guemara S, Jaoua A, Torrés P. On the use of executable assertions in structured programs The Journal of Systems and Software. 7: 15-28. DOI: 10.1016/0164-1212(87)90004-5  0.52
1987 Mili A, Desharnais J, Mili F. Relational heuristics for the design of deterministic programs Acta Informatica. 24: 239-276. DOI: 10.1007/Bf00265990  0.52
1986 Mili A, Desharnais J, Gagné JR. Formal models of stepwise refinements of programs Acm Computing Surveys (Csur). 18: 231-276. DOI: 10.1145/27632.28054  0.52
1985 Mili A, Desharnais J, Gagné JR. Strongest invariant functions: Their use in the systematic analysis of while statements Acta Informatica. 22: 47-66. DOI: 10.1007/Bf00290145  0.52
1984 Dupras M, LeMay F, Mili A. Some thoughts on teaching first year programming Acm Sigcse Bulletin. 16: 148-153. DOI: 10.1145/952980.808641  0.52
1984 Mili A. ON THE SPECIFICATION AND DESIGN OF PROGRAMS: SET-THEORETIC CONCEPTS Proceedings of the Hawaii International Conference On System Science. 392-398.  0.52
1983 Mili A. A Case for Teaching Program Verification: Its Importance in the CS Curriculum Acm Sigcse Bulletin. 15: 2-6. DOI: 10.1145/952978.801003  0.52
1983 Mili A, Reese D. Representation and manipulation of information systems: A simplified approach The Journal of Systems and Software. 3: 85-93. DOI: 10.1016/0164-1212(83)90007-9  0.52
1983 Mili A. Verifying programs by induction on their data structure: General format and applications Information Processing Letters. 17: 155-160. DOI: 10.1016/0020-0190(83)90056-X  0.52
1983 Mili A. A relational approach to the design of deterministic programs Acta Informatica. 20: 315-328. DOI: 10.1007/Bf00264277  0.52
1982 Mili A. Self-Stabilizing Programs: The Fault-Tolerant Capability of Self-Checking Programs Ieee Transactions On Computers. 685-689. DOI: 10.1109/TC.1982.1676067  0.52
Show low-probability matches.