


Остановите войну!
for scientists:


default search action
Ali Mili
Person information

- affiliation: New Jersey Institute of Technology, Newark, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c106]Hessamaldin Mohammadi, Wided Ghardallou, Richard C. Linger, Ali Mili
:
Computing Program Functions. FormaliSE@ICSE 2022: 102-112 - [c105]Samia Al Blwi, Imen Marsit, Besma Khaireddine, Amani Ayad, Ji Meng Loh, Ali Mili:
Generalized Mutant Subsumption. ICSOFT 2022: 46-56 - 2021
- [j72]Ali Mili
:
Differentiators and detectors. Inf. Process. Lett. 169: 106111 (2021) - [j71]Imen Marsit, Amani Ayad, David Kim
, Monsour Latif, Ji Meng Loh, Mohamed Nazih Omri
, Ali Mili:
The ratio of equivalent mutants: A key to analyzing mutation equivalence. J. Syst. Softw. 181: 111039 (2021) - [c104]Besma Khaireddine
, Ali Mili:
Quantifying Faultiness: What Does It Mean to Have N Faults? FormaliSE@ICSE 2021: 68-74 - [c103]Hessamaldin Mohammadi, Wided Ghardallou, Ali Mili:
Assume, Capture, Verify, Establish: Ingredients for Scalable Software Analysis. QRS Companion 2021: 415-424 - [c102]Besma Khaireddine
, Amani Ayad, Imen Marsit, Ali Mili:
Mutation Subsumption as Relative Incorrectness. QUATIC 2021: 18-28 - [c101]Besma Khaireddine
, Aleksandr Zakharchenko
, Ali Mili:
The Bane of Generate-and-Validate Program Repair: Too Much Generation, Too Little Validation. SoMeT 2021: 113-126 - 2020
- [j70]Besma Khaireddine
, Marwa Ben AbdelAli, Lamia Labed Jilani, Aleksandr Zakharchenko
, Ali Mili:
Correctness enhancement: a pervasive software engineering paradigm. Int. J. Crit. Comput. Based Syst. 10(1): 37-73 (2020) - [c100]Besma Khaireddine
, Aleksandr Zakharchenko
, Ali Mili:
A Semantic Definition of Faults and Its Implications. QRS 2020: 14-21
2010 – 2019
- 2019
- [c99]Amani Ayad, Imen Marsit, Ji Meng Loh, Mohamed Nazih Omri, Ali Mili:
Quantitative Metrics for Mutation Testing. ICSOFT 2019: 49-59 - [c98]Amani Ayad, Imen Marsit, Sara Tawfig, Ji Meng Loh, Mohamed Nazih Omri, Ali Mili
:
Quantitative Analysis of Mutant Equivalence. ICSOFT (Selected Papers) 2019: 58-80 - [c97]Amani Ayad, Imen Marsit, Ji Meng Loh, Mohamed Nazih Omri
, Ali Mili:
Estimating the Number of Equivalent Mutants. ICST Workshops 2019: 112-121 - [c96]Besma Khaireddine
, Matias Martinez, Ali Mili:
Program Repair at Arbitrary Fault Depth. ICST 2019: 465-472 - [c95]Besma Khaireddine
, Aleksandr Zakharchenko
, Ali Mili:
Fault Density, Fault Depth and Fault Multiplicity: The Reward of Discernment. QRS Companion 2019: 532-533 - [i1]Luciano Zemín, Simón Gutiérrez Brida, Santiago Bermúdez, Santiago Perez De Rosso, Nazareno Aguirre, Ali Mili, Ali Jaoua, Marcelo F. Frias:
Stryker: Scaling Specification-Based Program Repair by Pruning Infeasible Mutants with SAT. CoRR abs/1910.14011 (2019) - 2018
- [j69]Nafi Diallo, Wided Ghardallou, Jules Desharnais, Ali Mili
:
Convergence: Integrating termination and abort-freedom. J. Log. Algebraic Methods Program. 97: 1-29 (2018) - [c94]Amani Ayad, Imen Marsit, Mohamed Nazih Omri, Ji Meng Loh, Ali Mili
:
Using Semantic Metrics to Predict Mutation Equivalence. ICSOFT (Selected Papers) 2018: 3-27 - [c93]Imen Marsit, Mohamed Nazih Omri, Ji Meng Loh, Ali Mili:
Impact of Mutation Operators on Mutant Equivalence. ICSOFT 2018: 55-66 - [c92]Imen Marsit, Mohamed Nazih Omri
, Ji Meng Loh, Ali Mili:
Impact of Mutation Operators on the Ratio of Equivalent Mutants. SoMeT 2018: 664-677 - [c91]Marwa Benabdelali, Lamia Labed Jilani, Wided Ghardallou, Ali Mili:
Programming Without Refining. Refine@FM 2018: 39-52 - 2017
- [j68]Nafi Diallo, Wided Ghardallou, Jules Desharnais, Marcelo F. Frias, Ali Jaoua
, Ali Mili
:
What is a fault? and why does it matter? Innov. Syst. Softw. Eng. 13(2-3): 219-239 (2017) - [j67]Jules Desharnais, Nafi Diallo, Wided Ghardallou, Ali Mili
:
Projecting programs on specifications: Definition and implications. Sci. Comput. Program. 138: 26-48 (2017) - [c90]Besma Khaireddine
, Aleksandr Zakharchenko
, Ali Mili:
A Generic Algorithm for Program Repair. FormaliSE@ICSE 2017: 65-71 - [c89]Imen Marsit, Mohamed Nazih Omri, Ali Mili:
Estimating the Survival Rate of Mutants. ICSOFT 2017: 208-213 - [e3]Kamel Barkaoui, Hanifa Boucheneb, Ali Mili, Sofiène Tahar:
Verification and Evaluation of Computer and Communication Systems - 11th International Conference, VECoS 2017, Montreal, QC, Canada, August 24-25, 2017, Proceedings. Lecture Notes in Computer Science 10466, Springer 2017, ISBN 978-3-319-66175-9 [contents] - 2016
- [c88]Wided Ghardallou, Nafi Diallo, Ali Mili, Marcelo F. Frias:
Debugging without Testing. ICST 2016: 113-123 - [c87]Wided Ghardallou, Nafi Diallo, Ali Mili:
Software Evolution by Correctness Enhancement. SEKE 2016: 605-610 - [c86]Wided Ghardallou, Ali Mili, Nafi Diallo:
Relative Correctness: A Bridge Between Proving and Testing. VECoS 2016: 141-156 - [c85]Nafi Diallo, Wided Ghardallou, Ali Mili:
Program Repair by Stepwise Correctness Enhancement. PrePost@IFM 2016: 1-15 - 2015
- [j66]Fairouz Tchier
, Latifa Ben Arfa Rabai
, Ali Mili:
Putting engineering into software engineering: Upholding software engineering principles in the classroom. Comput. Hum. Behav. 48: 245-254 (2015) - [j65]Latifa Ben Arfa Rabai
, Barry Cohen, Ali Mili:
Programming Language Use in US Academia and Industry. Informatics Educ. 14(2): 143-160 (2015) - [c84]Jules Desharnais, Nafi Diallo, Wided Ghardallou, Marcelo F. Frias, Ali Jaoua
, Ali Mili:
Relational Mathematics for Relative Correctness. RAMiCS 2015: 191-208 - [c83]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Computing Attributes of Software Architectures - A Static Method and Its Validation. ENASE 2015: 55-66 - [c82]Nafi Diallo, Wided Ghardallou, Ali Mili:
Correctness and Relative Correctness. ICSE (2) 2015: 591-594 - [c81]Nafi Diallo, Wided Ghardallou, Jules Desharnais, Ali Mili:
Program Derivation by Correctness Enhacements. Refine@FM 2015: 57-70 - 2014
- [j64]Asma Louhichi, Wided Ghardallou, Khaled Bsaïes, Lamia Labed Jilani, Olfa Mraihi, Ali Mili:
Verifying while loops with invariant relations. Int. J. Crit. Comput. Based Syst. 5(1/2): 78-102 (2014) - [j63]Ali Mili, Ali Jaoua
, Marcelo F. Frias, Rasha Gaffer Mohamed Helali:
Semantic metrics for software products. Innov. Syst. Softw. Eng. 10(3): 203-217 (2014) - [c80]Ali Mili, Marcelo F. Frias, Ali Jaoua
:
On Faults and Faulty Programs. RAMiCS 2014: 191-207 - [c79]Anis Ben Aissa
, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Quantifying the impact of unavailability in cyber-physical environments. CICS 2014: 26-33 - [c78]Anis Ben Aissa, Latifa Ben Arfa Rabai
, Robert K. Abercrombie
, Ali Mili, Frederick T. Sheldon
:
Quantifying availability in SCADA environments using the cyber security metric MFC. CISR 2014: 81-84 - [c77]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Automated Quantitative Attributes Prediction from Architectural Description Language. ICSOFT PT 2014: 87-94 - 2013
- [j62]Neila Rjaibi, Latifa Ben Arfa Rabai
, Anis Ben Aissa, Ali Mili:
Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study. Int. J. Secur. Softw. Eng. 4(3): 64-81 (2013) - [j61]Latifa Ben Arfa Rabai, Mouna Jouini, Anis Ben Aissa, Ali Mili:
A cybersecurity model in cloud computing environments. J. King Saud Univ. Comput. Inf. Sci. 25(1): 63-75 (2013) - [j60]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Wided Ghardallou, Khaled Bsaïes, Ali Mili:
Invariant functions and invariant relations: An alternative to invariant assertions. J. Symb. Comput. 48: 1-36 (2013) - [j59]Olfa Mraihi, Asma Louhichi, Lamia Labed Jilani, Jules Desharnais, Ali Mili:
Invariant assertions, invariant relations, and invariant functions. Sci. Comput. Program. 78(9): 1212-1239 (2013) - [c76]Robert K. Abercrombie
, Frederick T. Sheldon
, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). CSIIRW 2013: 19 - [c75]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Architecture Level Prediction of Software Quality Attributes. ENASE 2013: 15-24 - [c74]Imen Derbel, Lamia Labed Jilani, Ali Mili:
ACME+: An ADL for Quantitative Analysis of Quality Attributes. ENASE (Selected Papers) 2013: 16-32 - [c73]Robert K. Abercrombie
, Frederick T. Sheldon
, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines. HICSS 2013: 1802-1811 - [c72]Imen Derbel, Lamia Labed Jilani, Ali Mili:
ACME+ for Software Architecture Analysis. ICSOFT 2013: 429-437 - [c71]Nicolás Rosner, Carlos Gustavo López Pombo, Nazareno Aguirre, Ali Jaoua, Ali Mili, Marcelo F. Frias:
Parallel Bounded Verification of Alloy Models by TranScoping. VSTTE 2013: 88-107 - 2012
- [j58]Anis Ben Aissa
, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Defining and computing a value based cyber-security measure. Inf. Syst. E Bus. Manag. 10(4): 433-453 (2012) - [j57]Lamia Labed Jilani, Asma Louhichi, Olfa Mraihi, Ali Mili:
Invariant relations, invariant functions, and loop functions. Innov. Syst. Softw. Eng. 8(3): 195-212 (2012) - [j56]Wided Ghardallou, Olfa Mraihi, Asma Louhichi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
A versatile concept for the analysis of loops. J. Log. Algebraic Methods Program. 81(5): 606-622 (2012) - [c70]Latifa Ben Arfa Rabai
, Mouna Jouini, Marwa Nafati, Anis Ben Aissa
, Ali Mili:
An economic model of security threats for cloud computing systems. CyberSec 2012: 100-105 - 2011
- [j55]Latifa Ben Arfa Rabai
, Yanzhi Bai, Ali Mili:
A quantitative model for software engineering trends. Inf. Sci. 181(22): 4993-5009 (2011) - [j54]Lamia Labed Jilani, Imen Derbel, Khaled Bsaïes, Hamdi Nasreddine, Ali Mili:
Reasoning About Quantitative Architectural Attributes (Invited Paper). J. Softw. 6(4): 574-583 (2011) - [c69]Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Validating Cyber Security Requirements: A Case Study. HICSS 2011: 1-10 - [c68]Olfa Mraihi, Wided Ghardallou, Asma Louhichi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
Computing Preconditions and Postconditions of While Loops. ICTAC 2011: 173-193 - 2010
- [j53]Anis Ben Aissa
, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Quantifying security threats and their potential impacts: a case study. Innov. Syst. Softw. Eng. 6(4): 269-281 (2010) - [j52]Ali Mili, Shir Aharon, Chaitanya Nadkarni, Lamia Labed Jilani, Asma Louhichi, Olfa Mraihi:
Reflexive transitive invariant relations: A basis for computing loop functions. J. Symb. Comput. 45(11): 1114-1143 (2010) - [c67]Imen Derbel, Lamia Labed Jilani, Ali Mili:
A model for analyzing architectural attributes. AICCSA 2010: 1-7 - [c66]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Ali Mili:
Towards an automated tool for computing loop functions. AICCSA 2010: 1-8 - [c65]Asma Louhichi, Olfa Mraihi, Lamia Labed Jilani, Ali Mili:
A Comparative Study of Invariant Assertions, Invariant Relations, and Invariant Functions. WING@ETAPS/IJCAR 2010: 152-166 - [c64]Anis Ben Aissa
, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Modeling stakeholder/value dependency through mean failure cost. CSIIRW 2010: 55 - [c63]Anis Ben Aissa
, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Software requirements for a system to compute mean failure cost. CSIIRW 2010: 73 - [c62]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Wided Ghardallou, Ali Mili:
Using invariant functions and invariant relations to compute loop functions. ICSE (2) 2010: 317-318
2000 – 2009
- 2009
- [j51]Ali Mili, Shir Aharon, Chaitanya Nadkarni:
Mathematics for reasoning about loop functions. Sci. Comput. Program. 74(11-12): 989-1020 (2009) - [c61]Asma Louhichi, Olfa Mraihi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
Relational Methods in the Analysis of While Loops: Observations of Versatility. RelMiCS 2009: 242-259 - [c60]Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Managing complex IT security processes with value based measures. CICS 2009: 69-75 - [c59]Anis Ben Aissa, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Quantifying security threats and their impact. CSIIRW 2009: 26 - [c58]Ali Mili, Frederick T. Sheldon
:
Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure Cost. HICSS 2009: 1-10 - [c57]Frederick T. Sheldon
, Robert K. Abercrombie
, Ali Mili:
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission. HICSS 2009: 1-10 - [c56]Latifa Ben Arfa Rabai, Yanzhi Bai, Ali Mili:
Modeling the Evolution of Software Engineering Trends - A Bottom Up Approach. ICSOFT (1) 2009: 47-54 - [e2]Frederick T. Sheldon, Greg Peterson, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009. ACM 2009, ISBN 978-1-60558-518-5 [contents] - 2008
- [c55]Frederick T. Sheldon
, Robert K. Abercrombie
, Ali Mili:
Evaluating security controls based on key performance indicators and stakeholder mission. CSIIRW 2008: 41:1-41:11 - [c54]Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value. HASE 2008: 479-482 - [c53]Ali Mili, Shir Aharon, Chaitanya Nadkarni:
An Algorithm for Computing Loop Functions. SEKE 2008: 448-453 - [c52]Ali Mili, Rahma Ben Ayed, Shir Aharon, Chaitanya Nadkarni:
Harnessing a Refinement Theory to Compute Loop Functions. TTSS 2008: 139-155 - [e1]Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008. ACM 2008, ISBN 978-1-60558-098-2 [contents] - 2007
- [j50]Yi Peng, Fu Li, Ali Mili:
Modeling the evolution of operating systems: An empirical study. J. Syst. Softw. 80(1): 1-15 (2007) - [c51]Ali Mili, Frederick T. Sheldon:
Measuring Reliability as a Mean Failure Cost. HASE 2007: 403-404 - [c50]Ali Mili, Tim Daly, Mark G. Pleszkoch, Stacy J. Prowell:
A Semantic Recognizer Infrastructure for Computing Loop Behavior. HICSS 2007: 277 - [c49]Ali Mili, Alex Vinokurov, Lamia Labed Jilani, Frederick T. Sheldon
, Rahma Ben Ayed:
Towards an Engineering Discipline of Computational Society. HICSS 2007: 281 - [c48]Mustafa Korkmaz, Ali Mili:
A Product Line of Software Reuse Cost Models. ICSOFT (SE) 2007: 264-269 - [c47]Yanzhi Bai, Ali Mili:
Monitoring software technology evolution, one trend at a time. SEDE 2007: 349-355 - [c46]Ali Mili:
A Refinement Based Framework for Computing Loop Behavior. SEW 2007: 144-153 - 2006
- [j49]Ali Mili, Frederick T. Sheldon
, Lamia Labed Jilani, Alex Vinokurov, Alexander Thomasian, Rahma Ben Ayed:
Modeling security as a dependability attribute: a refinement-based approach. Innov. Syst. Softw. Eng. 2(1): 39-48 (2006) - [c45]Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shereshevsky, Jules Desharnais:
Modeling Redundancy: Quantitative and Qualitative Models. AICCSA 2006: 1-8 - [c44]Israr Pasha Shaik, Walid Abdelmoez, Rajesh Gunnalan, Ali Mili, Christopher P. Fuhrman, Mark Shereshevsky, A. Zeid, Hany H. Ammar:
Using Change Propagation Probabilities to Assess Quality Attributes of Software Architectures 1. AICCSA 2006: 704-711 - 2005
- [j48]Ali Mili, Frederick T. Sheldon
, Fatma Mili, Jules Desharnais:
Recoverability preservation: a measure of last resort. Innov. Syst. Softw. Eng. 1(1): 54-62 (2005) - [j47]Vittorio Cortellessa, Diego Del Gobbo, Mark Shereshevsky, Jules Desharnais, Ali Mili:
Relational characterizations of system fault tolerance. Sci. Comput. Program. 56(3): 343-361 (2005) - [j46]Yaofei Chen, Rose Dios, Ali Mili, Lan Wu, Kefei Wang:
An Empirical Study of Programming Language Trends. IEEE Softw. 22(3): 72-78 (2005) - [c43]Walid Abdelmoez, Mark Shereshevsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, S. Bogazzi, Mustafa Korkmaz, Ali Mili:
Quantifying software architectures: an analysis of change propagation probabilities. AICCSA 2005: 124 - [c42]Ali Mili, Frederick T. Sheldon, Fatma Mili, Mark Shereshevsky, Jules Desharnais:
Perspectives on Redundancy: Applications to Software Certification. HICSS 2005 - [c41]Israr Pasha Shaik, Walid Abdelmoez, Rajesh Gunnalan, Mark Shereshevsky, A. Zeid, Hany H. Ammar, Ali Mili, Christopher P. Fuhrman:
Change Propagation for Assessing Design Quality of Software Architectures. WICSA 2005: 205-208 - 2004
- [c40]Ali Mili, GuangJie Jiang, Bojan Cukic, Yan Liu, Rahma Ben Ayed:
Towards the Verification and Validation of Online Learning Systems: General Framework and Applications. HICSS 2004 - [c39]Walid Abdelmoez, Mark Shereshevsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, S. Bogazzi, Mustafa Korkmaz, Ali Mili:
Software Architectures Change Propagation Tool (SACPT). ICSM 2004: 517 - [c38]Walid Abdelmoez, Diaa Eldin M. Nassar, Mark Shereshevsky, Nicholay Gradetsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, Ali Mili:
Error Propagation In Software Architectures. IEEE METRICS 2004: 384-393 - 2003
- [j45]Katerina Goseva-Popstojanova
, Ahmed E. Hassan, Ajith Guedem, Walid Abdelmoez, Diaa Eldin M. Nassar, Hany H. Ammar, Ali Mili:
Architectural-Level Risk Analysis Using UML. IEEE Trans. Software Eng. 29(10): 946-960 (2003) - 2002
- [j44]Robert David Cowan, Alan R. McKendall Jr.
, Ali Mili, Lin Yang, L. Wang, Dapeng Chen, V. Janardhana, Terry Spencer:
Software engineering technology watch. Inf. Sci. 140(3-4): 195-215 (2002) - [j43]Kamel Barkaoui, Mohamed Jmaiel, Ali Mili:
Guest editorial. J. Syst. Softw. 60(2): 87-89 (2002) - [j42]Robert David Cowan, Ali Mili, Hany H. Ammar, Alan R. McKendall Jr.
, Lin Yang, Dapeng Chen, Terry Spencer:
Software Engineering Technology Watch. IEEE Softw. 19(4): 123-129 (2002) - 2001
- [j41]Ali Mili, Senta Fowler Chmiel, Ravi Gottumukkala, Lisa Zhang:
Managing Software Reuse Economics: An Integrated ROI-based Model. Ann. Softw. Eng. 11(1): 175-218 (2001) - [j40]Lamia Labed Jilani, Jules Desharnais, Ali Mili:
Defining and Applying Measures of Distance Between Specifications. IEEE Trans. Software Eng. 27(8): 673-703 (2001) - [c37]Mark Shereshevsky, Habib Ammari, Nicholay Gradetsky, Ali Mili, Hany H. Ammar:
Information Theoretic Metrics for Software Architectures. COMPSAC 2001: 151- - [c36]H. Dieter Rombach, Manfred Broy, Michael Evangelist, Ali Mili, Leon J. Osterweil, David Lorge Parnas:
Software Engineering Research Agendas Panel (SERA): What Can't We Do, But Need to Learn How to Do? ICSE 2001: 698 - [c35]Diego Del Gobbo, Ali Mili:
Re-Engineering Fault Tolerance Requirements: A Case Study in Specifying Fault Tolerant Flight Control Systems. RE 2001: 236-247 - [c34]Diego Del Gobbo, Ali Mili:
An Application of Relational Algebra: Specification of a Fault Tolerant Flight Control System. RelMiS 2001: 94-111 - 2000
- [j39]Hany H. Ammar, Bojan Cukic, Ali Mili, Christopher P. Fuhrman:
A comparative analysis of hardware and software fault tolerance: Impact on software reliability engineering. Ann. Softw. Eng. 10: 103-150 (2000) - [j38]Rahma Ben Ayed, Jules Desharnais, Marc Frappier, Ali Mili:
A calculus of program adaptation and its applications. Sci. Comput. Program. 38(1-3): 73-124 (2000) - [j37]Rym Mili, Jules Desharnais, Marc Frappier, Ali Mili:
Semantic distance between specifications. Theor. Comput. Sci. 247(1-2): 257-276 (2000) - [c33]Habib Ammari, Ali Mili:
Lattice Based Distances. RelMiCS 2000: 1-10 - [c32]Hafedh Mili, Joumana Dargham, Ali Mili:
Views: A Framework for Feature-based Development and Distribution of OO Applications. HICSS 2000 - [c31]Ali Mili, Senta Fowler Chmiel, Ravi Gottumukkala, Lisa Zhang:
An integrated cost model for software reuse. ICSE 2000: 157-166 - [c30]