Year |
Citation |
Score |
2020 |
Krings S, Leuschel M, Schmidt J, Schneider D, Frappier M. Translating Alloy and extensions to classical B Science of Computer Programming. 188: 102378. DOI: 10.1016/J.Scico.2019.102378 |
0.372 |
|
2020 |
Mammar A, Frappier M, Fotso SJT, Laleau R. A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard International Journal On Software Tools For Technology Transfer. 22: 333-347. DOI: 10.1007/S10009-019-00543-1 |
0.302 |
|
2020 |
Fotso SJT, Frappier M, Laleau R, Mammar A. Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach International Journal On Software Tools For Technology Transfer. 22: 262-276. DOI: 10.1007/978-3-319-91271-4_18 |
0.451 |
|
2019 |
Tidjon LN, Frappier M, Mammar A. Intrusion Detection Systems: A Cross-Domain Overview Ieee Communications Surveys and Tutorials. 21: 3639-3681. DOI: 10.1109/Comst.2019.2922584 |
0.378 |
|
2018 |
Chane-Yack-Fa R, Frappier M, Mammar A, Finkel A. Parameterized verification of monotone information systems Formal Aspects of Computing. 30: 463-489. DOI: 10.1007/S00165-018-0460-8 |
0.36 |
|
2016 |
Fayolle T, Frappier M, Gervais F, Laleau R. Modelling a hemodialysis machine using Algebraic state-Transition Diagrams and B-like methods Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9675: 394-408. DOI: 10.1007/978-3-319-33600-8_33 |
0.689 |
|
2015 |
Huynh N, Frappier M, Mammar A, Laleau R, Desharnais J. A formal validation of the RBAC ANSI 2012 standard using B Science of Computer Programming. DOI: 10.1016/J.Scico.2016.04.011 |
0.666 |
|
2014 |
Frappier M, Gervais F, Laleau R, Milhau J. Refinement patterns for ASTDs Formal Aspects of Computing. 26: 919-941. DOI: 10.1145/2237796.2237818 |
0.774 |
|
2014 |
Fraikin B, Frappier M, St-Denis R. Supervisory control theory with Alloy Science of Computer Programming. 94: 217-237. DOI: 10.1016/J.Scico.2014.04.016 |
0.378 |
|
2014 |
Mammar A, Frappier M. Proof-based verification approaches for dynamic properties: application to the information system domain Formal Aspects of Computing. 27: 335-374. DOI: 10.1007/S00165-014-0323-X |
0.421 |
|
2014 |
Huynh N, Frappier M, Mammar A, Laleau R, Desharnais J. Validating the RBAC ANSI 2012 standard using B Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8477: 255-270. DOI: 10.1007/978-3-662-43652-3_22 |
0.615 |
|
2013 |
Frappier M, Glässer U, Khurshid S, Laleau R, Reeves S. Abstract State Machines, Alloy, B and Z Selected papers from ABZ 2010 Science of Computer Programming. 78: 270-271. DOI: 10.1016/J.Scico.2011.03.004 |
0.629 |
|
2013 |
Savary A, Frappier M, Lanet JL. Detecting vulnerabilities in java-card bytecode verifiers using model-based testing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7940: 223-237. DOI: 10.1007/978-3-642-38613-8_16 |
0.317 |
|
2012 |
Frappier M, Mammar A. An assertions-based approach to verifying the absence property pattern Proceedings - International Symposium On Software Reliability Engineering, Issre. 361-370. DOI: 10.1109/ISSRE.2012.11 |
0.36 |
|
2012 |
Ferrier-Belhaouari H, Konopacki P, Laleau R, Frappier M. A design by contract approach to verify access control policies Proceedings - 2012 Ieee 17th International Conference On Engineering of Complex Computer Systems, Iceccs 2012. 263-272. DOI: 10.1109/ICECCS.2012.4 |
0.807 |
|
2012 |
Milhau J, Frappier M, Laleau R. A metamodel of the B modeling of access-control policies: Work in progress Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6888: 234-241. DOI: 10.1007/978-3-642-27901-0_19 |
0.808 |
|
2012 |
Konopacki P, Belhaouari H, Frappier M, Laleau R. Specification and verification of access control policies in EB 3SEC: Work in progress Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6888: 227-233. DOI: 10.1007/978-3-642-27901-0_18 |
0.81 |
|
2012 |
Embe Jiague M, Frappier M, Gervais F, Laleau R, St-Denis R. A metamodel for the design of access-control policy enforcement managers: Work in progress Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6888: 218-226. DOI: 10.1007/978-3-642-27901-0_17 |
0.708 |
|
2011 |
Jiague ME, Frappier M, Gervais F, Laleau R, St-Denis R. Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments International Journal of Systems and Service-Oriented Engineering. 2: 37-59. DOI: 10.4018/Jssoe.2011040103 |
0.498 |
|
2011 |
Frappier M, Mammar A. Proving non-interference on reachability properties: A refinement approach Proceedings - Asia-Pacific Software Engineering Conference, Apsec. 25-32. DOI: 10.1109/APSEC.2011.35 |
0.37 |
|
2011 |
Frappier M, Diagne F, Mammar A. Proving reachability in B using substitution refinement Electronic Notes in Theoretical Computer Science. 280: 47-56. DOI: 10.1016/J.Entcs.2011.11.017 |
0.457 |
|
2011 |
Milhau J, Idani A, Laleau R, Labiadh MA, Ledru Y, Frappier M. Combining UML, ASTD and B for the formal specification of an access control filter Innovations in Systems and Software Engineering. 7: 303-313. DOI: 10.1007/S11334-011-0166-Z |
0.813 |
|
2011 |
Jiague ME, Frappier M, Gervais F, Laleau R, St-Denis R. From ASTD access control policies to WS-BPEL processes deployed in a SOA environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6724: 126-141. DOI: 10.1007/978-3-642-24396-7_11 |
0.721 |
|
2011 |
Konopacki P, Frappier M, Laleau R. Expressing access control policies with an event-based approach Lecture Notes in Business Information Processing. 83: 607-621. DOI: 10.1007/978-3-642-22056-2_63 |
0.823 |
|
2011 |
Jiague ME, Frappier M, Gervais F, Konopacki P, Laleau R, Milhau J, St-Denis R. A four-concern-oriented secure is development approach Secrypt 2011 - Proceedings of the International Conference On Security and Cryptography. 464-471. |
0.776 |
|
2010 |
Konopacki P, Frappier M, Laleau R. Modélisation de politiques de sécurité à l'aide d'une algèbre de processus: Présentation de la méthode EB3SEC IngéNierie Des SystèMes D'Information. 15: 113-136. DOI: 10.3166/Isi.15.3.113-136 |
0.798 |
|
2010 |
Frappier M, Fraikin B, Chossart R, Chane-Yack-Fa R, Ouenzar M. Comparison of model checking tools for information systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6447: 581-596. DOI: 10.1007/978-3-642-16901-4_38 |
0.329 |
|
2010 |
Milhau J, Frappier M, Gervais F, Laleau R. Systematic translation rules from astd to event-B Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6396: 245-259. DOI: 10.1007/978-3-642-16265-7_18 |
0.785 |
|
2010 |
Diab H, Frappier M. B Software Specification Methods. 41-57. DOI: 10.1002/9780470612514.ch3 |
0.502 |
|
2010 |
Jiague ME, Frappier M, Gervais F, Konopacki P, Laleau R, Milhau J, St-Denis R. Model-driven engineering of functional security policies Iceis 2010 - Proceedings of the 12th International Conference On Enterprise Information Systems. 3: 374-379. |
0.771 |
|
2010 |
Frappier M, Glässer U, Khurshid S, Laleau R, Reeves S. Abstract State Machines, Alloy, B and Z: Preface Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5977. |
0.59 |
|
2009 |
Fraikin B, Frappier M. Efficient symbolic computation of process expressions Science of Computer Programming. 74: 723-753. DOI: 10.1016/J.Scico.2009.02.002 |
0.387 |
|
2009 |
Gervais F, Frappier M, Laleau R. Generating relational database transactions from EB3 attribute definitions Software and Systems Modeling. 8: 423-445. DOI: 10.1007/S10270-008-0104-1 |
0.733 |
|
2009 |
Milhau J, Fraikin B, Frappier M. Automatic generation of error messages for the symbolic execution of EB3 process expressions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5423: 337-351. DOI: 10.1007/978-3-642-00255-7-23 |
0.768 |
|
2009 |
Konopacki P, Frappier M, Laleau R. Security policy modeling using the process algebra Xxviieme Congres Inforsid 2009. 295-310. |
0.816 |
|
2008 |
Frappier M, Gervais F, Laleau R, Fraikin B, St-Denis R. Extending statecharts with process algebra operators Innovations in Systems and Software Engineering. 4: 285-292. DOI: 10.1007/S11334-008-0064-1 |
0.685 |
|
2008 |
Evans N, Treharne H, Laleau R, Frappier M. Applying CSP ∥ B to information systems Software and Systems Modeling. 7: 85-102. DOI: 10.1007/S10270-007-0048-X |
0.735 |
|
2007 |
Gervais F, Frappier M, Laleau R. Refinement of EB 3 process patterns into B specifications Lecture Notes in Computer Science. 201-215. DOI: 10.1007/11955757_17 |
0.469 |
|
2006 |
Gervais F, Batanado P, Frappier M, Laleau R. EB3TG: A tool synthesizing relational database transactions from EB3 attribute definitions Iceis 2006 - 8th International Conference On Enterprise Information Systems, Proceedings. 44-51. |
0.699 |
|
2005 |
Gervais F, Frappier M, Laleau R. Generating relational database transactions from recursive functions defined on EB3 traces Proceedings - 3rd Ieee International Conference On Software Engineering and Formal Methods, Sefm 2005. 117-126. DOI: 10.1109/SEFM.2005.23 |
0.686 |
|
2005 |
Diab H, Koukane F, Frappier M, St-Denis R. μ cROSE: Automated measurement of COSMIC-FFP for Rational Rose RealTime Information and Software Technology. 47: 151-166. DOI: 10.1016/J.Infsof.2004.06.007 |
0.578 |
|
2005 |
Fraikin B, Frappier M, Laleau R. State-based versus event-based specifications for information systems: A comparison of B and EB3 Software and Systems Modeling. 4: 236-257. DOI: 10.1007/S10270-005-0083-4 |
0.732 |
|
2005 |
Gervais F, Frappier M, Laleau R. Synthesizing B specifications from EB3 attribute definitions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3771: 207-226. DOI: 10.1007/11589976_13 |
0.712 |
|
2005 |
Gervais F, Frappier M, Laleau R. How to synthesize relational database transactions from EB3 attribute definitions? Proceedings of the 3rd International Workshop On Modelling, Simulation, Verification and Validation of Enterprise Information Systems, Msvveis 2005, in Conjunction With Iceis 2005. 83-88. |
0.679 |
|
2004 |
Evans N, Treharne H, Laleau R, Frappier M. How to verify dynamic properties of information systems Proceedings of the Second International Conference On Software Engineering and Formal Methods. Sefm 2004. 416-425. DOI: 10.1109/SEFM.2004.1347547 |
0.71 |
|
2004 |
Bherer H, Desharnais J, Frappier M, St-Denis R. Investigating discrete controllability with kleene algebra Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3051: 74-85. DOI: 10.1007/978-3-540-24771-5_7 |
0.343 |
|
2003 |
Frappier M, St-Denis R. EB3: an entity-based black-box specification method for information systems Software and Systems Modeling. 2: 134-149. DOI: 10.1007/S10270-003-0024-Z |
0.399 |
|
2003 |
Frappier M, Laleau R. Proving event ordering properties for information systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2651: 421-436. DOI: 10.1007/3-540-44880-2_25 |
0.721 |
|
2002 |
Diab H, Frappier M, St-Denis R. A formal definition of function points for automated measurement of B specifications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2495: 483-494. |
0.599 |
|
2001 |
Diab H, Frappier M, St. Denis R. Formalizing COSMIC-FFP using ROOM Proceedings of Ieee/Acs International Conference On Computer Systems and Applications, Aiccsa. 2001: 312-318. DOI: 10.1109/AICCSA.2001.934002 |
0.555 |
|
2000 |
Mili R, Desharnais J, Frappier M, Mili A. Semantic distance between specifications Theoretical Computer Science. 247: 257-276. DOI: 10.1016/S0304-3975(99)00085-7 |
0.594 |
|
2000 |
Ayed RB, Desharnais J, Frappier M, Mili A. Calculus of program adaptation and its applications Science of Computer Programming. 38: 73-123. DOI: 10.1016/S0167-6423(99)00046-5 |
0.579 |
|
1998 |
Desharnais J, Frappier M, Khédri R, Mili A. Integration of sequential scenarios Ieee Transactions On Software Engineering. 24: 695-708. DOI: 10.1109/32.713325 |
0.63 |
|
1998 |
Frappier M, Mili A, Desharnais J. Unifying program construction and modification Logic Journal of the Igpl \/ Bulletin of the Igpl. 6: 317-340. DOI: 10.1093/Jigpal/6.2.317 |
0.538 |
|
1998 |
Ben Ayed R, Desharnais J, Frappier M, Mili A. Mathematical foundations for program transformations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1559: 319-321. |
0.474 |
|
1996 |
Frappier M, Mili A, Desharnais J. A relational calculus for program construction by parts Science of Computer Programming. 26: 237-254. |
0.53 |
|
1995 |
Frappier M, Mili A, Desharnais J. Program construction by parts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 947: 257-281. DOI: 10.1007/3-540-60117-1_15 |
0.543 |
|
Show low-probability matches. |