Ali Mili - Publications

Affiliations: 
West Virginia University, Morgantown, WV, United States 
Area:
Computer Science
Website:
https://people.njit.edu/faculty/mili

120/163 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Diallo N, Ghardallou W, Desharnais J, Mili A. Convergence: Integrating termination and abort-freedom The Journal of Logic and Algebraic Programming. 97: 1-29. DOI: 10.1016/J.Jlamp.2018.02.001  0.52
2017 Desharnais J, Diallo N, Ghardallou W, Mili A. Projecting programs on specifications: Definition and implications Science of Computer Programming. 138: 26-48. DOI: 10.1016/J.Scico.2016.11.006  0.52
2017 Diallo N, Ghardallou W, Desharnais J, Frias M, Jaoua A, Mili A. What is a fault? and why does it matter? Innovations in Systems and Software Engineering. 13: 219-239. DOI: 10.1007/S11334-017-0300-7  0.52
2015 Rjaibi N, Rabai LBA, Mili A. The MFC cybersecurity model extension and diagnostic toward a depth measurement: E-learning systems case study Achieving Enterprise Agility Through Innovative Software Development. 179-198. DOI: 10.4018/978-1-4666-8510-9.ch009  0.52
2015 Ben Arfa Rabai L, Cohen B, Mili A. Programming language use in US academia and industry Informatics in Education. 14: 143-160. DOI: 10.15388/Infedu.2015.09  0.52
2015 Diallo N, Ghardallou W, Mili A. Correctness and Relative Correctness Proceedings - International Conference On Software Engineering. 2: 591-594. DOI: 10.1109/ICSE.2015.200  0.52
2015 Tchier F, Rabai LBA, Mili A. Putting engineering into software engineering: Upholding software engineering principles in the classroom Computers in Human Behavior. 48: 245-254. DOI: 10.1016/J.Chb.2015.01.054  0.52
2015 Desharnais J, Diallo N, Ghardallou W, Frias MF, Jaoua A, Mili A. Relational mathematics for relative correctness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9348: 191-208. DOI: 10.1007/978-3-319-24704-5_12  0.52
2015 Diallo N, Mili A. Loop analysis and repair Ceur Workshop Proceedings. 1454: 23-32.  0.52
2015 Derbel I, Jilani LL, Mili A. Computing attributes of software architectures: A static method and its validation Enase 2015 - Proceedings of the 10th International Conference On Evaluation of Novel Approaches to Software Engineering. 55-66.  0.52
2014 Louhichi A, Ghardallou W, Bsaies K, Jilani LL, Mraihi O, Mili A. Verifying while loops with invariant relations International Journal of Critical Computer-Based Systems. 5: 78-102. DOI: 10.1504/Ijccbs.2014.059596  0.52
2014 Aissa AB, Rabai LBA, Abercrombie RK, Sheldon FT, Mili A. Quantifying availability in SCADA environments using the cyber security metric MFC Acm International Conference Proceeding Series. 81-84. DOI: 10.1145/2602087.2602103  0.52
2014 Ben Aissa A, Abercrombie RK, Sheldon FT, Mili A. Quantifying the impact of unavailability in cyber-physical environments Ieee Ssci 2014: 2014 Ieee Symposium Series On Computational Intelligence - Cics 2014: 2014 Ieee Symposium On Computational Intelligence in Cyber Security, Proceedings. DOI: 10.1109/CICYBS.2014.7013364  0.52
2014 Mili A, Jaoua A, Frias M, Helali RGM. Semantic metrics for software products Innovations in Systems and Software Engineering. 10: 203-217. DOI: 10.1007/S11334-014-0233-3  0.52
2014 Mili A, Frias MF, Jaoua A. On faults and faulty programs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8428: 191-207. DOI: 10.1007/978-3-319-06251-8_12  0.52
2014 Derbel I, Jilani LL, Mili A. Automated quantitative attributes prediction from architectural description language Icsoft-Pt 2014 - Proceedings of the 9th International Conference On Software Paradigm Trends. 87-94.  0.52
2014 Rosner N, Pombo CGL, Aguirre N, Jaoua A, Mili A, Frias MF. Parallel bounded verification of alloy models by tranScoping Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8164: 88-107.  0.52
2013 Abercrombie RK, Sheldon FT, Hauser KR, Lantz MW, Mili A. Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA) Acm International Conference Proceeding Series. DOI: 10.1145/2459976.2459998  0.52
2013 Abercrombie RK, Sheldon FT, Hauser KR, Lantz MW, Mili A. Risk assessment methodology based on the NISTIR 7628 guidelines Proceedings of the Annual Hawaii International Conference On System Sciences. 1802-1811. DOI: 10.1109/HICSS.2013.466  0.52
2013 Mraihi O, Louhichi A, Jilani LL, Desharnais J, Mili A. Invariant assertions, invariant relations, and invariant functions Science of Computer Programming. 78: 1212-1239. DOI: 10.1016/J.Scico.2012.05.006  0.52
2013 Jilani LL, Mraihi O, Louhichi A, Ghardallou W, Bsaies K, Mili A. Invariant functions and invariant relations: An alternative to invariant assertions Journal of Symbolic Computation. 48: 1-36. DOI: 10.1016/J.Jsc.2012.04.001  0.52
2013 Derbel I, Jilani LL, Mili A. ACME+: An ADL for Quantitative Analysis of Quality Attributes Communications in Computer and Information Science. 417: 16-32. DOI: 10.1007/978-3-642-54092-9_2  0.52
2013 Derbel I, Jilani LL, Mili A. ACME+ for software architecture analysis Icsoft 2013 - Proceedings of the 8th International Joint Conference On Software Technologies. 429-437.  0.52
2013 Derbel I, Jilani LL, Mili A. Architecture level prediction of software quality attributes Enase 2013 - Proceedings of the 8th International Conference On Evaluation of Novel Approaches to Software Engineering. 15-24.  0.52
2012 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Defining and computing a value based cyber-security measure Information Systems and E-Business Management. 10: 433-453. DOI: 10.1145/2107556.2107561  0.52
2012 Rabai LBA, Jouini M, Nafati M, Aissa AB, Mili A. An economic model of security threats for cloud computing systems Proceedings 2012 International Conference On Cyber Security, Cyber Warfare and Digital Forensic, Cybersec 2012. 100-105. DOI: 10.1109/CyberSec.2012.6246112  0.52
2012 Ghardallou W, Mraihi O, Louhichi A, Jilani LL, Bsaies K, Mili A. A versatile concept for the analysis of loops Journal of Logic and Algebraic Programming. 81: 606-622. DOI: 10.1016/J.Jlap.2012.04.001  0.52
2012 Labed Jilani L, Louhichi A, Mraihi O, Mili A. Invariant relations, invariant functions, and loop functions Innovations in Systems and Software Engineering. 8: 195-212. DOI: 10.1007/S11334-012-0189-0  0.52
2011 Jilani LL, Derbel I, Bsaies K, Nasreddine H, Mili A. Reasoning about quantitative Architectural attributes Journal of Software. 6: 574-583. DOI: 10.4304/Jsw.6.4.574-583  0.52
2011 Abercrombie RK, Sheldon FT, Mili A. Validating cyber security requirements: A case study Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2011.480  0.52
2011 Arfa Rabai LB, Bai YZ, Mili A. A quantitative model for software engineering trends Information Sciences. 181: 4993-5009. DOI: 10.1016/J.Ins.2011.07.004  0.52
2011 Mraihi O, Ghardallou W, Louhichi A, Labed Jilani L, Bsaies K, Mili A. Computing preconditions and postconditions of while loops Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6916: 173-193. DOI: 10.1007/978-3-642-23283-1_13  0.52
2010 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Software requirements for a system to compute mean failure cost Acm International Conference Proceeding Series. DOI: 10.1145/1852666.1852750  0.52
2010 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Modeling stakeholder/value dependency through mean failure cost Acm International Conference Proceeding Series. DOI: 10.1145/1852666.1852727  0.52
2010 Labed Jilani L, Mraihi O, Louhichi A, Ghardallou W, Mili A. Using invariant functions and invariant relations to compute loop functions Proceedings - International Conference On Software Engineering. 2: 317-318. DOI: 10.1145/1810295.1810369  0.52
2010 Jilani LL, Mraihi O, Louhichi A, Mili A. Towards an automated tool for computing loop functions 2010 Acs/Ieee International Conference On Computer Systems and Applications, Aiccsa 2010. DOI: 10.1109/AICCSA.2010.5586943  0.52
2010 Derbel I, Jilani LL, Mili A. A model for analyzing architectural attributes 2010 Acs/Ieee International Conference On Computer Systems and Applications, Aiccsa 2010. DOI: 10.1109/AICCSA.2010.5586933  0.52
2010 Mili A, Aharon S, Nadkarni C, Jilani LL, Louhichi A, Mraihi O. Reflexive transitive invariant relations: A basis for computing loop functions Journal of Symbolic Computation. 45: 1114-1143. DOI: 10.1016/J.Jsc.2008.11.007  0.52
2010 Ben Aissa A, Abercrombie RK, Sheldon FT, Mili A. Quantifying security threats and their potential impacts: A case study Innovations in Systems and Software Engineering. 6: 269-281. DOI: 10.1007/S11334-010-0123-2  0.52
2009 Aissa AB, Abercrombie RK, Sheldon FT, Mili A. Quantifying security threats and their impact Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558637  0.52
2009 Sheldon FT, Abercrombie RK, Mili A. Methodology for evaluating security controls based on key performance indicators and stakeholder mission Proceedings of the 42nd Annual Hawaii International Conference On System Sciences, Hicss. DOI: 10.1109/HICSS.2009.308  0.52
2009 Mili A, Sheldon F. Challenging the mean time to failure: Measuring dependability as a mean failure cost Proceedings of the 42nd Annual Hawaii International Conference On System Sciences, Hicss. DOI: 10.1109/HICSS.2009.107  0.52
2009 Abercrombie RK, Sheldon FT, Mili A. Managing complex IT security processes with value based measures 2009 Ieee Symposium On Computational Intelligence in Cyber Security, Cics 2009 - Proceedings. DOI: 10.1109/CICYBS.2009.4925092  0.52
2009 Mili A, Aharon S, Nadkarni C. Mathematics for reasoning about loop functions Science of Computer Programming. 74: 989-1020. DOI: 10.1016/J.Scico.2009.09.009  0.52
2009 Mili A, Ben Ayed R, Aharon S, Nadkarni C. Harnessing a Refinement Theory to Compute Loop Functions Electronic Notes in Theoretical Computer Science. 243: 139-155. DOI: 10.1016/J.Entcs.2009.07.010  0.52
2009 Louhichi A, Mraihi O, Jilani LL, Bsaies K, Mili A. Relational methods in the analysis of while loops: Observations of versatility Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5827: 242-259. DOI: 10.1007/978-3-642-04639-1_17  0.52
2009 Rabai LBA, Bai YZ, Mili A. Modeling the evolution of software engineering trends - A bottom up approach Icsoft 2009 - 4th International Conference On Software and Data Technologies, Proceedings. 1: 47-54.  0.52
2008 Sheldon FT, Abercrombie RK, Mili A. Evaluating security controls based on key performance indicators and stakeholder mission Csiirw'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead. DOI: 10.1145/1413140.1413188  0.52
2008 Sheldon F, Krings A, Abercrombie R, Mili A. CSIIRW08: Cyber Security and Information Intelligence Research Workshop Csiirw'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead 0.52
2008 Mili A, Aharon S, Nadkarni C. An algorithm for computing loop functions 20th International Conference On Software Engineering and Knowledge Engineering, Seke 2008. 448-453.  0.52
2007 Mili A. A refinement-based framework for computing loop behavior Proceedings - International Conference On Software Engineering. 144-153. DOI: 10.1109/SEW.2007.87  0.52
2007 Mili A, Vinokurov A, Jilani LL, Sheldon FT, Ayed RB. Towards an engineering discipline of computational security Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2007.568  0.52
2007 Mili A, Daly T, Pleszkoch M, Prowell S. A semantic recognizer infrastructure for computing loop behavior Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2007.32  0.52
2007 Mili A, Sheldon F. Measuring reliability as a mean failure cost Proceedings of Ieee International Symposium On High Assurance Systems Engineering. 403-404. DOI: 10.1109/HASE.2007.47  0.52
2007 Peng Y, Li F, Mili A. Modeling the evolution of operating systems: An empirical study Journal of Systems and Software. 80: 1-15. DOI: 10.1016/J.Jss.2006.03.049  0.52
2007 Bai Y, Mili A. Monitoring software technology evolution, one trend at a time 16th International Conference On Software Engineering and Data Engineering, Sede 2007. 349-355.  0.52
2007 Korkmaz M, Mili A. A product line of software reuse cost models Icsoft 2007 - 2nd International Conference On Software and Data Technologies, Proceedings. 264-269.  0.52
2006 Mili A, Sheldon F, Jilani LL, Vinokurov A, Thomasian A, Ayed RB. Modeling security as a dependability attribute: A refinement-based approach Innovations in Systems and Software Engineering. 2: 39-48. DOI: 10.1007/S11334-006-0023-7  0.52
2006 Mili A, Wu L, Sheldon FT, Shereshevsky M, Desharnais J. Modeling redundancy: Quantitative and qualitative models Ieee International Conference On Computer Systems and Applications, 2006. 2006: 1-8.  0.52
2006 Shaik I, Abdelmoez W, Gunnalan R, Shereshevsky M, Zeid A, Ammar HH, Mili A, Fuhrman C. Using change propagation probabilities to assess quality attributes of software architectures Ieee International Conference On Computer Systems and Applications, 2006. 2006: 704-711.  0.52
2005 Shaik I, Abdelmoez W, Gunnalan R, Shereshevsky M, Zeid A, Ammar HH, Mili A, Fuhrman C. Change propagation for assessing design quality of software architectures Proceedings - 5th Working Ieee/Ifip Conference On Software Architecture, Wicsa 2005. 2005: 205-208. DOI: 10.1109/WICSA.2005.21  0.52
2005 Chen Y, Dios R, Mili A, Wu L, Wang K. An empirical study of programming language trends Ieee Software. 22: 72-79. DOI: 10.1109/Ms.2005.55  0.52
2005 Cortellessa V, Del Gobbo D, Shereshevsky M, Desharnais J, Mili A. Relational characterizations of system fault tolerance Science of Computer Programming. 56: 343-361. DOI: 10.1016/J.Scico.2004.07.003  0.52
2005 Mili A, Sheldon F, Mili F, Desharnais J. Recoverability preservation: A measure of last resort Innovations in Systems and Software Engineering. 1: 54-62. DOI: 10.1007/S11334-005-0004-2  0.52
2004 Abdelmoez W, Nassar DM, Shereshevsky M, Gradetsky N, Gunnalan R, Ammar HH, Yu B, Mili A. Error propagation in software architectures Proceedings - International Software Metrics Symposium. 384-393. DOI: 10.1109/METRIC.2004.1357923  0.52
2004 Abdelmoez W, Shereshevsky M, Gunnalan R, Ammar HH, Yu B, Bogazzi S, Korkmaz M, Mili A. Software Architectures Change Propagation Tool (SACPT) Ieee International Conference On Software Maintenance, Icsm. 517. DOI: 10.1109/ICSM.2004.1357860  0.52
2004 Mili A, Jiang G, Cukic B, Liu Y, Ayed RB. Towards the verification and validation of online learning systems: General framework and applications Proceedings of the Hawaii International Conference On System Sciences. 37: 4857-4866.  0.52
2003 Goseva-Popstojanova K, Hassan A, Guedem A, Abdelmoez W, Nassar DEM, Ammar H, Mili A. Architectural-Level Risk Analysis Using UML Ieee Transactions On Software Engineering. 29: 946-959. DOI: 10.1109/Tse.2003.1237174  0.52
2003 Del Gobbo D, Mili A. An application of relational algebra: Specification of a fault tolerant flight control system Electronic Notes in Theoretical Computer Science. 44: 75-92. DOI: 10.1016/S1571-0661(04)80933-2  0.52
2002 Cowan RD, McKendall A, Mili A, Yang L, Wang L, Chen D, Janardhana V, Spencer T. Software engineering technology watch Information Sciences. 140: 195-215. DOI: 10.1109/Ms.2002.1020299  0.52
2002 Barkaoui K, Jmaiel M, Mili A. COPS: Cooperative problem solving using DCOM Journal of Systems and Software. 63: 79-90. DOI: 10.1016/S0164-1212(01)00115-7  0.52
2002 Barkaoui K, Jmaiel M, Mili A. Journal of Systems and Software: Guest editorial Journal of Systems and Software. 60: 87-89. DOI: 10.1016/S0164-1212(01)00081-4  0.52
2001 Gobbo DD, Mili A. Re-engineering Fault Tolerance requirements: A case study in specifying fault Tolerant Flight Control Systems Proceedings of the Ieee International Conference On Requirements Engineering. 236-245. DOI: 10.1109/Isre.2001.948564  0.52
2001 Jilani LL, Desharnais J, Mili A. Defining and applying measures of distance between specifications Ieee Transactions On Software Engineering. 27: 673-703. DOI: 10.1109/32.940565  0.52
2001 Mili A, Chmiel SF, Gottumukkala R, Zhang L. Managing Software Reuse Economics: An Integrated ROI-based Model Annals of Software Engineering. 11: 175-218. DOI: 10.1023/A:1012599304672  0.52
2001 Shereshevsky M, Ammari H, Gradetsky N, Mili A, Ammar HH. Information theoretic metrics for software architectures Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 151-157.  0.52
2001 Rombach D, Broy M, Evangelist M, Mili A, Osterweil L, Parnas DL. Software engineering research agendas panel (SERA) "What can't we do, but need to learn how to do?", Proceedings - International Conference On Software Engineering. 698.  0.52
2000 Ammar HH, Cukic B, Mili A, Fuhrman C. A comparative analysis of hardware and software fault tolerance: Impact on software reliability engineering Annals of Software Engineering. 10: 103-150. DOI: 10.1023/A:1018987616443  0.52
2000 Mili R, Desharnais J, Frappier M, Mili A. Semantic distance between specifications Theoretical Computer Science. 247: 257-276. DOI: 10.1016/S0304-3975(99)00085-7  0.52
2000 Ayed RB, Desharnais J, Frappier M, Mili A. Calculus of program adaptation and its applications Science of Computer Programming. 38: 73-123. DOI: 10.1016/S0167-6423(99)00046-5  0.52
2000 Mili A, Chmiel SF, Gottumukkala R, Zhang L. Tracking, predicting and assessing software reuse costs: an automated tool Proceedings - International Conference On Software Engineering. 785.  0.52
2000 Mili A, Chmiel SF, Gottumukkala R, Zhang L. Integrated cost model for software reuse Proceedings - International Conference On Software Engineering. 157-166.  0.52
2000 Yacoub S, Ammar HH, Mili A. Constructional design patterns as reusable components Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1844: 369-387.  0.52
1999 Mili A, Yacoub S, Addy E, Mili H. Toward an engineering discipline of software reuse Ieee Software. 16: 22-30. DOI: 10.1109/52.795098  0.52
1999 Addy E, Mili A, Yacoub S. A Case Study in Software Reuse Software Quality Journal. 8: 169-196. DOI: 10.1023/A:1008963424886  0.52
1999 Mili A. Desert island column: The long story of a short theorem Automated Software Engineering. 6: 199-204. DOI: 10.1023/A:1008770731005  0.52
1998 Desharnais J, Frappier M, Khédri R, Mili A. Integration of sequential scenarios Ieee Transactions On Software Engineering. 24: 695-708. DOI: 10.1109/32.713325  0.52
1998 Frappier M, Mili A, Desharnais J. Unifying program construction and modification Logic Journal of the Igpl \/ Bulletin of the Igpl. 6: 317-340. DOI: 10.1093/Jigpal/6.2.317  0.52
1998 Mili A, Mili R, Mittermeir RT. A survey of software reuse libraries Annals of Software Engineering. 5: 349-414. DOI: 10.1023/A:1018964121953  0.52
1998 Ben Ayed R, Desharnais J, Frappier M, Mili A. Mathematical foundations for program transformations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1559: 319-321.  0.52
1996 Frappier M, Mili A, Desharnais J. A relational calculus for program construction by parts Science of Computer Programming. 26: 237-254.  0.52
1995 Mili H, Mili F, Mili A. Reusing Software: Issues and Research Directions Ieee Transactions On Software Engineering. 21: 528-562. DOI: 10.1109/32.391379  0.52
1995 Mankai C, Mili A. Machine translation from Arabic to English and French Information Sciences - Applications. 3: 91-109. DOI: 10.1016/1069-0115(94)00059-B  0.52
1995 Desharnais J, Belkhiter N, Sghaier SBM, Tchier F, Jaoua A, Mili A, Zaguia N. Embedding a demonic semilattice in a relation algebra Theoretical Computer Science. 149: 333-360. DOI: 10.1016/0304-3975(94)00271-J  0.52
1995 Frappier M, Mili A, Desharnais J. Program construction by parts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 947: 257-281. DOI: 10.1007/3-540-60117-1_15  0.52
1994 Mili A, Mili R. Storing and retrieving software components: a refinement based system Proceedings - International Conference On Software Engineering. 91-100. DOI: 10.1109/32.605762  0.52
1993 Desharnais J, Jaoua A, Mili F, Boudriga N, Mili A. A relational division operator: the conjugate kernel Theoretical Computer Science. 114: 247-272. DOI: 10.1016/0304-3975(93)90074-4  0.52
1993 Desharnais J, Mili A, Mili F. On the mathematics of sequential decompositions Science of Computer Programming. 20: 253-289. DOI: 10.1016/0167-6423(93)90016-I  0.52
1993 Boudriga N, Slimani Y, Mili A. Relation-based semantics for concurrency Information Sciences. 75: 223-252. DOI: 10.1016/0020-0255(93)90056-R  0.52
1992 Mili F, Mili A. Heuristics for constructing while loops Science of Computer Programming. 18: 67-106. DOI: 10.1016/0167-6423(92)90034-9  0.52
1992 Boudriga N, Mili A, Zalila R, Mili F. A relational model for the specification of data types Computer Languages. 17: 101-131. DOI: 10.1016/0096-0551(92)90002-5  0.52
1992 Boudriga N, Elloumi F, Mili A. On the lattice of specifications: Applications to a specification methodology Formal Aspects of Computing. 4: 544-571. DOI: 10.1007/Bf01211474  0.52
1991 Marwane R, Mili A. Building tailor-made software cost model: Intermediate TUCOMO Information and Software Technology. 33: 232-238. DOI: 10.1016/0950-5849(91)90138-2  0.52
1991 Boudriga N, Mili A, Zalila R. Didon: system for specification validation Information and Software Technology. 33: 489-498. DOI: 10.1016/0950-5849(91)90093-Q  0.52
1991 Jaoua A, Mili A, Boudriga N, Durieux JL. Regularity of relations: A measure of uniformity Theoretical Computer Science. 79: 323-339. DOI: 10.1016/0304-3975(91)90335-Y  0.52
1991 Kemayel L, Mili A, Ouederni I. Controllable factors for programmer productivity: A statistical study The Journal of Systems and Software. 16: 151-163. DOI: 10.1016/0164-1212(91)90009-U  0.52
1990 Finance JP, Mili A. A foreword to the special issue of the journal of systems and software on the Role of languages in programming (the Tenth Tunisian-French Seminar of Computer Science) The Journal of Systems and Software. 12: 83-85. DOI: 10.1016/0164-1212(90)90072-T  0.52
1990 Jaoua A, Mili A. The use of executable assertions for error detection and damage assessment The Journal of Systems and Software. 12: 15-37. DOI: 10.1016/0164-1212(90)90063-R  0.52
1989 Marouane R, Mili A. Economics of software project management in Tunisia: Basic TUCOMO Information and Software Technology. 31: 251-257. DOI: 10.1016/0950-5849(89)90004-9  0.52
1987 Mili A, Guemara S, Jaoua A, Torrés P. On the use of executable assertions in structured programs The Journal of Systems and Software. 7: 15-28. DOI: 10.1016/0164-1212(87)90004-5  0.52
1987 Mili A, Desharnais J, Mili F. Relational heuristics for the design of deterministic programs Acta Informatica. 24: 239-276. DOI: 10.1007/Bf00265990  0.52
1986 Mili A, Desharnais J, Gagné JR. Formal models of stepwise refinements of programs Acm Computing Surveys (Csur). 18: 231-276. DOI: 10.1145/27632.28054  0.52
1985 Mili A, Desharnais J, Gagné JR. Strongest invariant functions: Their use in the systematic analysis of while statements Acta Informatica. 22: 47-66. DOI: 10.1007/Bf00290145  0.52
1984 Dupras M, LeMay F, Mili A. Some thoughts on teaching first year programming Acm Sigcse Bulletin. 16: 148-153. DOI: 10.1145/952980.808641  0.52
1984 Mili A. ON THE SPECIFICATION AND DESIGN OF PROGRAMS: SET-THEORETIC CONCEPTS Proceedings of the Hawaii International Conference On System Science. 392-398.  0.52
1983 Mili A. A Case for Teaching Program Verification: Its Importance in the CS Curriculum Acm Sigcse Bulletin. 15: 2-6. DOI: 10.1145/952978.801003  0.52
1983 Mili A, Reese D. Representation and manipulation of information systems: A simplified approach The Journal of Systems and Software. 3: 85-93. DOI: 10.1016/0164-1212(83)90007-9  0.52
1983 Mili A. Verifying programs by induction on their data structure: General format and applications Information Processing Letters. 17: 155-160. DOI: 10.1016/0020-0190(83)90056-X  0.52
1983 Mili A. A relational approach to the design of deterministic programs Acta Informatica. 20: 315-328. DOI: 10.1007/Bf00264277  0.52
1982 Mili A. Self-Stabilizing Programs: The Fault-Tolerant Capability of Self-Checking Programs Ieee Transactions On Computers. 685-689. DOI: 10.1109/TC.1982.1676067  0.52
Low-probability matches
2020 Khaireddine B, AbdelAli MB, Jilani LL, Zakharchenko A, Mili A. Correctness enhancement: a pervasive software engineering paradigm International Journal of Critical Computer-Based Systems. 10: 37-73. DOI: 10.1504/Ijccbs.2020.10030618  0.04
2018 Omrani HS, Chemkhi J, Mili AF, Aoun YSB, Ali IBH, Guizani I, Guerbouj S. Paraechinus aethiopicus (Ehrenberg 1832) and Atelerix algirus (Lereboullet 1842) hedgehogs: Possible reservoirs of endemic leishmaniases in Tunisia. Infection, Genetics and Evolution : Journal of Molecular Epidemiology and Evolutionary Genetics in Infectious Diseases. PMID 29860099 DOI: 10.1016/j.meegid.2018.05.029  0.01
2015 Ben Charfeddine I, Ben Lazreg T, Ben Rayana N, Amara A, Mamaï O, Knani L, Mili A, M'sakni A, Saad A, Ben Hadj Hamida F, Gribaa M. Genetic study in a tunisian family revealed IVS1+1G>A mutation in the CHM gene. Annales De Biologie Clinique. 73: 469-73. PMID 26411914 DOI: 10.1684/abc.2015.1052  0.01
2015 Benosmane A, Benaouida MA, Mili A, Bouchoul A, Merazig H. Crystal structure of 1-[(Z)-2-phenyl-hydrazin-1-yl-idene]naphthalen-2(1H)-one. Acta Crystallographica. Section E, Crystallographic Communications. 71: o303. PMID 25995916 DOI: 10.1107/S2056989015006775  0.01
2015 Mamaï O, Boussofara L, Denguezli M, Escande-Beillard N, Kraeim W, Merriman B, Ben Charfeddine I, Stevanin G, Bouraoui S, Amara A, Mili A, Nouira R, H'mida D, Sriha B, Gribaa M, et al. Multiple self-healing palmoplantar carcinoma: a familial predisposition to skin cancer with primary palmoplantar and conjunctival lesions. The Journal of Investigative Dermatology. 135: 304-8. PMID 25050600 DOI: 10.1038/Jid.2014.311  0.01
2014 Bougueria H, Mili A, Benosmane A, Bouchoul Ael K, Bouaoud S. 1-[(E)-2-(5-tert-Butyl-2-hy-droxy-phen-yl)diazen-1-yl]naphthalen-2-ol. Acta Crystallographica. Section E, Structure Reports Online. 70: o225. PMID 24764925 DOI: 10.1107/S1600536814001731  0.01
2014 Ben Lazreg T, Ben Charfeddine I, Mammai O, Amara A, Naiija O, Gribaa M, Mili A, Saad A, Dogui M. Circadian heart rate and blood pressure variability in intensive care unit patients Biological Rhythm Research. 45: 285-292. DOI: 10.1080/09291016.2013.817137  0.01
2013 Mili A, Benosmane A, Benaouida MA, Bouchoul A, Bouaoud SE. (E)-1-(3-Formyl-phen-yl)-2-(2-oxidonaphthalen-1-yl)diazen-1-ium. Acta Crystallographica. Section E, Structure Reports Online. 69: o1498. PMID 24098195 DOI: 10.1107/S1600536813024112  0.01
2013 Benosmane A, Mili A, Bouguerria H, Bouchoul A. (E)-1-(3-Chloro-phen-yl)-2-(2-oxidonaphthalen-1-yl)diazen-1-ium. Acta Crystallographica. Section E, Structure Reports Online. 69: o1021. PMID 24046602 DOI: 10.1107/S1600536813014931  0.01
2013 Rjaibi N, Rabai LBA, Aissa AB, Mili A. Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study International Journal of Secure Software Engineering. 4: 64-81. DOI: 10.4018/Jsse.2013070104  0.01
2013 Rabai LBA, Jouini M, Aissa AB, Mili A. Original Article: A cybersecurity model in cloud computing environments Journal of King Saud University - Computer and Information Sciences Archive. 25: 63-75. DOI: 10.1016/J.Jksuci.2012.06.002  0.01
2013 Mili A. Gender standards v. democratic standards: Revisiting the paradox Journal of International Women's Studies. 14: 3-11.  0.01
2013 Mili A, Benosmane A, Chetioui S, Bouchoul A. XRD data analysis of 1-(2, 5-dimethoxyphenylazo)-2-naphtol Journal of Chemical and Pharmaceutical Research. 5: 12-18.  0.01
2012 Cherif W, Ben Rhouma F, Messai H, Mili A, Gribaa M, Kefi R, Ayadi A, Boughamoura L, Chemli J, Saad A, Kaabachi N, Sfar MT, Ben Dridi MF, Tebib N, Abdelhak S. High frequency of W1327X mutation in glycogen storage disease type III patients from central Tunisia. Annales De Biologie Clinique. 70: 648-50. PMID 23207808 DOI: 10.1684/abc.2012.0766  0.01
2012 Mamaï O, Boussofara L, Adala L, Amara A, Ben Charfeddine I, Ghariani N, Sriha B, Denguezli M, Mili A, Belazreg T, Saad A, Fischer J, Gribaa M. Reduction of palmoplantar keratoderma Buschke-Fischer-Brauer locus to only 0.967 Mb. Journal of Dermatological Science. 67: 210-2. PMID 22789686 DOI: 10.1016/j.jdermsci.2012.06.011  0.01
2012 Arora M, Cossor FI. Diagnosis of extracavitary primary effusion lymphoma by urine cytology. Blood. 119: 2707. PMID 22548219 DOI: 10.1182/blood-2011-04-319103  0.01
2012 Ben Charfeddine I, Riepe FG, Kahloul N, Kulle AE, Adala L, Mamaï O, Amara A, Mili A, Amri F, Saad A, Holterhus PM, Gribaa M. Two novel CYP11B1 mutations in congenital adrenal hyperplasia due to steroid 11β hydroxylase deficiency in a Tunisian family. General and Comparative Endocrinology. 175: 514-8. PMID 22210247 DOI: 10.1016/j.ygcen.2011.12.017  0.01
2012 Mili A, Ben Charfeddine I, Mamaï O, Abdelhak S, Adala L, Amara A, Pagliarani S, Lucchiarri S, Lucchiari S, Ayadi A, Tebib N, Harbi A, Bouguila J, H'Mida D, Saad A, et al. Molecular and biochemical characterization of Tunisian patients with glycogen storage disease type III. Journal of Human Genetics. 57: 170-5. PMID 22089644 DOI: 10.1038/jhg.2011.122  0.01
2012 Mili A, Ben Charfeddine I, Amara A, Mamaï O, Adala L, Ben Lazreg T, Bouguila J, Saad A, Limem K, Gribaa M. A c.3216_3217delGA mutation in AGL gene in Tunisian patients with a glycogen storage disease type III: evidence of a founder effect. Clinical Genetics. 82: 534-9. PMID 22035446 DOI: 10.1111/j.1399-0004.2011.01806.x  0.01
2012 Amara A, Adala L, Ben Charfeddine I, Mamaï O, Mili A, Lazreg TB, H'mida D, Amri F, Salem N, Boughammura L, Saad A, Gribaa M. Correlation of SMN2, NAIP, p44, H4F5 and Occludin genes copy number with spinal muscular atrophy phenotype in Tunisian patients. European Journal of Paediatric Neurology : Ejpn : Official Journal of the European Paediatric Neurology Society. 16: 167-74. PMID 21821450 DOI: 10.1016/j.ejpn.2011.07.007  0.01
2012 Mili A, Charfeddine IB, Mama O, Abdelhak S, Adala L, Amara A, Pagliarani S, Lucchiarri S, Ayadi A, Tebib N, Harbi A, Bouguila J, H'Mida D, Saad A, Limem K, et al. Molecular and biochemical characterization of Tunisian patients with glycogen storage disease type III (Journal of Human Genetics (2012) 57, (170-175) DOI: 10.1038/jhg.2011.122) Journal of Human Genetics. 57: 221. DOI: 10.1038/jhg.2012.3  0.01
2012 Mamaï O, Boussofara L, Adala L, Amara A, Ben Charfeddine I, Ghariani N, Sriha B, Denguezli M, Mili A, Belazreg T, Saad A, Gribaa M. Corrigendum to " Reduction of palmoplantar keratoderma Buschke-Fischer-Brauer locus to only 0.967Mb" [J. Dermatol. Sci. 67(September (3)) (2012) 210-212] Journal of Dermatological Science. 68: 116. DOI: 10.1016/j.jdermsci.2012.08.002  0.01
2011 Miadi-Messaoud H, Mili A, Ben Khalifa H, Limem K. [Evaluation of a fluorimetric for determining the activity of amylo-1,6-glucosidase in leukocytes for confirming the diagnosis of glycogen storage disease type III]. Annales De Biologie Clinique. 69: 41-5. PMID 21463994 DOI: 10.1684/abc.2010.0514  0.01
2010 Mebazaa A, Oumari KE, Ghariani N, Mili AF, Belajouza C, Nouira R, Denguezli M, Ben Said M. Tinea capitis in adults in Tunisia. International Journal of Dermatology. 49: 513-6. PMID 20534084 DOI: 10.1111/j.1365-4632.2010.04296.x  0.01
2010 Mili A, Siadat A, Bassetto S, Hubac S, Tollenaere M. Unified process for action plan management: Case study in a research and production semiconductor factory Ieee Aerospace and Electronic Systems Magazine. 25: 4-8. DOI: 10.1109/Maes.2010.5525313  0.01
2009 Mili A, Siadat A, Bassetto S, Hubac S, Tollenaere M. Unified process for action plan management case study in a research and production semiconductor factory 2009 Ieee International Systems Conference Proceedings. 372-376. DOI: 10.1109/SYSTEMS.2009.4815829  0.01
2009 Mili A, Bassetto S, Siadat A, Tollenaere M. Dynamic risk management unveil productivity improvements Journal of Loss Prevention in the Process Industries. 22: 25-34. DOI: 10.1016/J.Jlp.2008.07.011  0.01
2009 Mili A. Gender standards v. Democratic standards: Examples and counter examples Journal of International Women's Studies. 11: 100-120.  0.01
2008 Mili A, Bassetto S. New approach for risk analysis update based on maintenance events Ifac Proceedings Volumes (Ifac-Papersonline). 17. DOI: 10.3182/20080706-5-KR-1001.3376  0.01
2008 Mili A, Siadat A, Hubac S, Bassetto S. Dynamic management of detected factory events and estimated risks using FMECA Proceedings of the 4th Ieee International Conference On Management of Innovation and Technology, Icmit. 1204-1209. DOI: 10.1109/ICMIT.2008.4654541  0.01
2007 Bassetto S, Mili A, Siadat A. Speeding-up experiences return during new productions industrialization Ieem 2007: 2007 Ieee International Conference On Industrial Engineering and Engineering Management. 1251-1255. DOI: 10.1109/IEEM.2007.4419392  0.01
2005 Trabelsi A, Soua A, Sriha B, Mili AF, Mokni M, Laarif M, Korbi S. [Mucormycosis and diabetes: three cases reported]. Revue MéDicale De LièGe. 60: 545-8. PMID 16035325  0.01
2002 Riahi B, Denguezli M, Kourda M, Ghariani N, Belajouza C, Yacoubi MT, Chebil F, Tefifha A, Mili A, Nouira R. Dermatophytic disease. Tunisian observation Nouvelles Dermatologiques. 21: 508-510.  0.01
1999 Ammar HH, Yacoub SM, Mili A, Gopalakrishnan B. Toward an integrated approach to systems design Proceedings of Spie. 3833: 69-76. DOI: 10.1117/12.359506  0.01
1996 Zupancic J, Wrycza S, Mili A. Guest editor's corner Journal of Systems and Software. 33: 111-112. DOI: 10.1016/S0164-1212(96)90015-1  0.01
1995 Said MB, Korbi S, Abdelhedi M, Sriha B, Mili A, Khochtali H, Aouini MT. Human subcutaneous dirofilariasis: two additional Tunisian cases Medecine Et Maladies Infectieuses. 25: 519-521. DOI: 10.1016/S0399-077X(05)80736-X  0.01
1994 Boukadida J, Chamli J, Bouallegue O, Yacoub M, Abroug S, Monastiri K, Mili A, Jeddi M, Ennabli S, Harbi A, Essoussi AS. Campylobacter enteritis in the geographical tunisian centre : Epidemiological, clinical and bacteriological study Medecine Et Maladies Infectieuses. 24: 775-779. DOI: 10.1016/S0399-077X(05)80341-5  0.01
1994 Ben Said M, Yacoubi MT, Ben Hamouda M, Mili A, Korbi S, Abroug F. Rhinocerebral mucormycosis in a Tunisian patient Journal De Mycologie Medicale. 4: 51-53.  0.01
1989 Mili A. A method of programming : By Edsger W. Dijkstra and W.H.J. Feijen. Addison-Wesley, Wokingham, United Kingdom, 1988, Price £15.95 (paperback), ISBN 0-201-17536-3.☆ Science of Computer Programming. 12: 165-167. DOI: 10.1016/0167-6423(89)90043-9  0.01
1985 Mili A. Towards a Theory of Forward Error Recovery Ieee Transactions On Software Engineering. 11: 735-748. DOI: 10.1109/Tse.1985.232523  0.01
1985 Mili A. Correction to Centennial Issue Ieee Transactions On Computers. 98. DOI: 10.1109/TC.1985.1676524  0.01
1985 Mili A. Author's Reply Ieee Transactions On Computers. 98. DOI: 10.1109/TC.1985.1676523  0.01
1982 Mili A. Designing software without backtracking: the part of dream and the part of reality Acm Sigsoft Software Engineering Notes. 7: 77-77. DOI: 10.1145/1010809.1010820  0.01
Hide low-probability matches.