default search action
Ali Mili 0001
Person information
- affiliation: New Jersey Institute of Technology, Newark, USA
Other persons with the same name
- Ali Mili 0002 — Grenoble Institute of Technology, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j76]Samia Al Blwi, Imen Marsit, Besma Khaireddine, Amani Ayad, Ji Meng Loh, Ali Mili:
Subsumption, correctness and relative correctness: Implications for software testing. Sci. Comput. Program. 239: 103177 (2025) - 2024
- [j75]Wided Ghardallou, Hessamaldin Mohammadi, Richard C. Linger, Mark G. Pleszkoch, Ji Meng Loh, Ali Mili:
Invariant relations for affine loops. Acta Informatica 61(3): 261-314 (2024) - [c112]Samia Al Blwi, Amani Ayad, Ali Mili:
Mutation Coverage is not Strongly Correlated with Mutation Coverage. AST@ICSE 2024: 1-11 - 2023
- [j74]Besma Khaireddine, Aleksandr Zakharchenko, Matias Martinez, Ali Mili:
Toward a theory of program repair. Acta Informatica 60(3): 209-255 (2023) - [j73]Hessam Mohammadi, Wided Ghardallou, Elijah Brick, Ali Mili:
On the persistent rumors of the programmer's imminent demise. Softw. Syst. Model. 22(6): 1969-1976 (2023) - [c111]Samia Al Blwi, Amani Ayad, Besma Khaireddine, Imen Marsit, Ali Mili:
Semantic Coverage: Measuring Test Suite Effectiveness. ICSOFT 2023: 287-294 - [c110]Hessamaldin Mohammadi, Wided Ghardallou, Elijah Brick, Ali Mili:
Assume(), Capture(), Verify(), Establish(): A Vocabulary for Static Program Analysis. QRS Companion 2023: 845-846 - [i2]Wided Ghardallou, Hessamaldin Mohammadi, Elijah Brick, Ali Mili:
Invariant Relations: A Bridge from Programs to Equations. CoRR abs/2310.04684 (2023) - 2022
- [c109]Hessamaldin Mohammadi, Wided Ghardallou, Richard C. Linger, Ali Mili:
Computing Program Functions. FormaliSE@ICSE 2022: 102-112 - [c108]Samia Al Blwi, Imen Marsit, Besma Khaireddine, Amani Ayad, Ji Meng Loh, Ali Mili:
Generalized Mutant Subsumption. ICSOFT 2022: 46-56 - [c107]Samia Al Blwi, Imen Marsit, Besma Khaireddine, Amani Ayad, Ji Meng Loh, Ali Mili:
Three Forms of Mutant Subsumption: Basic, Strict and Broad. ICSOFT (Selected Papers) 2022: 122-144 - [c106]Samia Al Blwi, Amani Ayad, Besma Khaireddine, Imen Marsit, Ali Mili:
Quantifying the Effectiveness of Mutant Sets. QRS Companion 2022: 288-297 - 2021
- [j72]Ali Mili:
Differentiators and detectors. Inf. Process. Lett. 169: 106111 (2021) - [j71]Imen Marsit, Amani Ayad, David Kim, Monsour Latif, Ji Meng Loh, Mohamed Nazih Omri, Ali Mili:
The ratio of equivalent mutants: A key to analyzing mutation equivalence. J. Syst. Softw. 181: 111039 (2021) - [c105]Besma Khaireddine, Ali Mili:
Quantifying Faultiness: What Does It Mean to Have N Faults? FormaliSE@ICSE 2021: 68-74 - [c104]Hessamaldin Mohammadi, Wided Ghardallou, Ali Mili:
Assume, Capture, Verify, Establish: Ingredients for Scalable Software Analysis. QRS Companion 2021: 415-424 - [c103]Besma Khaireddine, Amani Ayad, Imen Marsit, Ali Mili:
Mutation Subsumption as Relative Incorrectness. QUATIC 2021: 18-28 - [c102]Besma Khaireddine, Aleksandr Zakharchenko, Ali Mili:
The Bane of Generate-and-Validate Program Repair: Too Much Generation, Too Little Validation. SoMeT 2021: 113-126 - 2020
- [j70]Besma Khaireddine, Marwa Ben AbdelAli, Lamia Labed Jilani, Aleksandr Zakharchenko, Ali Mili:
Correctness enhancement: a pervasive software engineering paradigm. Int. J. Crit. Comput. Based Syst. 10(1): 37-73 (2020) - [c101]Besma Khaireddine, Aleksandr Zakharchenko, Ali Mili:
A Semantic Definition of Faults and Its Implications. QRS 2020: 14-21
2010 – 2019
- 2019
- [c100]Amani Ayad, Imen Marsit, Ji Meng Loh, Mohamed Nazih Omri, Ali Mili:
Quantitative Metrics for Mutation Testing. ICSOFT 2019: 49-59 - [c99]Amani Ayad, Imen Marsit, Sara Tawfig, Ji Meng Loh, Mohamed Nazih Omri, Ali Mili:
Quantitative Analysis of Mutant Equivalence. ICSOFT (Selected Papers) 2019: 58-80 - [c98]Amani Ayad, Imen Marsit, Ji Meng Loh, Mohamed Nazih Omri, Ali Mili:
Estimating the Number of Equivalent Mutants. ICST Workshops 2019: 112-121 - [c97]Besma Khaireddine, Matias Martinez, Ali Mili:
Program Repair at Arbitrary Fault Depth. ICST 2019: 465-472 - [c96]Besma Khaireddine, Aleksandr Zakharchenko, Ali Mili:
Fault Density, Fault Depth and Fault Multiplicity: The Reward of Discernment. QRS Companion 2019: 532-533 - [i1]Luciano Zemín, Simón Gutiérrez Brida, Santiago Bermúdez, Santiago Perez De Rosso, Nazareno Aguirre, Ali Mili, Ali Jaoua, Marcelo F. Frias:
Stryker: Scaling Specification-Based Program Repair by Pruning Infeasible Mutants with SAT. CoRR abs/1910.14011 (2019) - 2018
- [j69]Nafi Diallo, Wided Ghardallou, Jules Desharnais, Ali Mili:
Convergence: Integrating termination and abort-freedom. J. Log. Algebraic Methods Program. 97: 1-29 (2018) - [c95]Amani Ayad, Imen Marsit, Mohamed Nazih Omri, Ji Meng Loh, Ali Mili:
Using Semantic Metrics to Predict Mutation Equivalence. ICSOFT (Selected Papers) 2018: 3-27 - [c94]Imen Marsit, Mohamed Nazih Omri, Ji Meng Loh, Ali Mili:
Impact of Mutation Operators on Mutant Equivalence. ICSOFT 2018: 55-66 - [c93]Imen Marsit, Mohamed Nazih Omri, Ji Meng Loh, Ali Mili:
Impact of Mutation Operators on the Ratio of Equivalent Mutants. SoMeT 2018: 664-677 - [c92]Marwa Benabdelali, Lamia Labed Jilani, Wided Ghardallou, Ali Mili:
Programming Without Refining. Refine@FM 2018: 39-52 - 2017
- [j68]Nafi Diallo, Wided Ghardallou, Jules Desharnais, Marcelo F. Frias, Ali Jaoua, Ali Mili:
What is a fault? and why does it matter? Innov. Syst. Softw. Eng. 13(2-3): 219-239 (2017) - [j67]Jules Desharnais, Nafi Diallo, Wided Ghardallou, Ali Mili:
Projecting programs on specifications: Definition and implications. Sci. Comput. Program. 138: 26-48 (2017) - [c91]Besma Khaireddine, Aleksandr Zakharchenko, Ali Mili:
A Generic Algorithm for Program Repair. FormaliSE@ICSE 2017: 65-71 - [c90]Imen Marsit, Mohamed Nazih Omri, Ali Mili:
Estimating the Survival Rate of Mutants. ICSOFT 2017: 208-213 - [e3]Kamel Barkaoui, Hanifa Boucheneb, Ali Mili, Sofiène Tahar:
Verification and Evaluation of Computer and Communication Systems - 11th International Conference, VECoS 2017, Montreal, QC, Canada, August 24-25, 2017, Proceedings. Lecture Notes in Computer Science 10466, Springer 2017, ISBN 978-3-319-66175-9 [contents] - 2016
- [c89]Wided Ghardallou, Nafi Diallo, Ali Mili, Marcelo F. Frias:
Debugging without Testing. ICST 2016: 113-123 - [c88]Wided Ghardallou, Nafi Diallo, Ali Mili:
Software Evolution by Correctness Enhancement. SEKE 2016: 605-610 - [c87]Wided Ghardallou, Ali Mili, Nafi Diallo:
Relative Correctness: A Bridge Between Proving and Testing. VECoS 2016: 141-156 - [c86]Nafi Diallo, Wided Ghardallou, Ali Mili:
Program Repair by Stepwise Correctness Enhancement. PrePost@IFM 2016: 1-15 - 2015
- [j66]Fairouz Tchier, Latifa Ben Arfa Rabai, Ali Mili:
Putting engineering into software engineering: Upholding software engineering principles in the classroom. Comput. Hum. Behav. 48: 245-254 (2015) - [j65]Latifa Ben Arfa Rabai, Barry Cohen, Ali Mili:
Programming Language Use in US Academia and Industry. Informatics Educ. 14(2): 143-160 (2015) - [c85]Jules Desharnais, Nafi Diallo, Wided Ghardallou, Marcelo F. Frias, Ali Jaoua, Ali Mili:
Relational Mathematics for Relative Correctness. RAMiCS 2015: 191-208 - [c84]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Computing Attributes of Software Architectures - A Static Method and Its Validation. ENASE 2015: 55-66 - [c83]Nafi Diallo, Wided Ghardallou, Ali Mili:
Correctness and Relative Correctness. ICSE (2) 2015: 591-594 - [c82]Nafi Diallo, Wided Ghardallou, Jules Desharnais, Ali Mili:
Program Derivation by Correctness Enhacements. Refine@FM 2015: 57-70 - 2014
- [j64]Asma Louhichi, Wided Ghardallou, Khaled Bsaïes, Lamia Labed Jilani, Olfa Mraihi, Ali Mili:
Verifying while loops with invariant relations. Int. J. Crit. Comput. Based Syst. 5(1/2): 78-102 (2014) - [j63]Ali Mili, Ali Jaoua, Marcelo F. Frias, Rasha Gaffer Mohamed Helali:
Semantic metrics for software products. Innov. Syst. Softw. Eng. 10(3): 203-217 (2014) - [c81]Ali Mili, Marcelo F. Frias, Ali Jaoua:
On Faults and Faulty Programs. RAMiCS 2014: 191-207 - [c80]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying the impact of unavailability in cyber-physical environments. CICS 2014: 26-33 - [c79]Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili, Frederick T. Sheldon:
Quantifying availability in SCADA environments using the cyber security metric MFC. CISR 2014: 81-84 - [c78]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Automated Quantitative Attributes Prediction from Architectural Description Language. ICSOFT PT 2014: 87-94 - 2013
- [j62]Neila Rjaibi, Latifa Ben Arfa Rabai, Anis Ben Aissa, Ali Mili:
Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study. Int. J. Secur. Softw. Eng. 4(3): 64-81 (2013) - [j61]Latifa Ben Arfa Rabai, Mouna Jouini, Anis Ben Aissa, Ali Mili:
A cybersecurity model in cloud computing environments. J. King Saud Univ. Comput. Inf. Sci. 25(1): 63-75 (2013) - [j60]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Wided Ghardallou, Khaled Bsaïes, Ali Mili:
Invariant functions and invariant relations: An alternative to invariant assertions. J. Symb. Comput. 48: 1-36 (2013) - [j59]Olfa Mraihi, Asma Louhichi, Lamia Labed Jilani, Jules Desharnais, Ali Mili:
Invariant assertions, invariant relations, and invariant functions. Sci. Comput. Program. 78(9): 1212-1239 (2013) - [c77]Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). CSIIRW 2013: 19 - [c76]Imen Derbel, Lamia Labed Jilani, Ali Mili:
Architecture Level Prediction of Software Quality Attributes. ENASE 2013: 15-24 - [c75]Imen Derbel, Lamia Labed Jilani, Ali Mili:
ACME+: An ADL for Quantitative Analysis of Quality Attributes. ENASE (Selected Papers) 2013: 16-32 - [c74]Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines. HICSS 2013: 1802-1811 - [c73]Imen Derbel, Lamia Labed Jilani, Ali Mili:
ACME+ for Software Architecture Analysis. ICSOFT 2013: 429-437 - [c72]Nicolás Rosner, Carlos Gustavo López Pombo, Nazareno Aguirre, Ali Jaoua, Ali Mili, Marcelo F. Frias:
Parallel Bounded Verification of Alloy Models by TranScoping. VSTTE 2013: 88-107 - 2012
- [j58]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Defining and computing a value based cyber-security measure. Inf. Syst. E Bus. Manag. 10(4): 433-453 (2012) - [j57]Lamia Labed Jilani, Asma Louhichi, Olfa Mraihi, Ali Mili:
Invariant relations, invariant functions, and loop functions. Innov. Syst. Softw. Eng. 8(3): 195-212 (2012) - [j56]Wided Ghardallou, Olfa Mraihi, Asma Louhichi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
A versatile concept for the analysis of loops. J. Log. Algebraic Methods Program. 81(5): 606-622 (2012) - [c71]Latifa Ben Arfa Rabai, Mouna Jouini, Marwa Nafati, Anis Ben Aissa, Ali Mili:
An economic model of security threats for cloud computing systems. CyberSec 2012: 100-105 - 2011
- [j55]Latifa Ben Arfa Rabai, Yanzhi Bai, Ali Mili:
A quantitative model for software engineering trends. Inf. Sci. 181(22): 4993-5009 (2011) - [j54]Lamia Labed Jilani, Imen Derbel, Khaled Bsaïes, Hamdi Nasreddine, Ali Mili:
Reasoning About Quantitative Architectural Attributes (Invited Paper). J. Softw. 6(4): 574-583 (2011) - [c70]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Validating Cyber Security Requirements: A Case Study. HICSS 2011: 1-10 - [c69]Olfa Mraihi, Wided Ghardallou, Asma Louhichi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
Computing Preconditions and Postconditions of While Loops. ICTAC 2011: 173-193 - 2010
- [j53]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying security threats and their potential impacts: a case study. Innov. Syst. Softw. Eng. 6(4): 269-281 (2010) - [j52]Ali Mili, Shir Aharon, Chaitanya Nadkarni, Lamia Labed Jilani, Asma Louhichi, Olfa Mraihi:
Reflexive transitive invariant relations: A basis for computing loop functions. J. Symb. Comput. 45(11): 1114-1143 (2010) - [c68]Imen Derbel, Lamia Labed Jilani, Ali Mili:
A model for analyzing architectural attributes. AICCSA 2010: 1-7 - [c67]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Ali Mili:
Towards an automated tool for computing loop functions. AICCSA 2010: 1-8 - [c66]Asma Louhichi, Olfa Mraihi, Lamia Labed Jilani, Ali Mili:
A Comparative Study of Invariant Assertions, Invariant Relations, and Invariant Functions. WING@ETAPS/IJCAR 2010: 152-166 - [c65]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Modeling stakeholder/value dependency through mean failure cost. CSIIRW 2010: 55 - [c64]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Software requirements for a system to compute mean failure cost. CSIIRW 2010: 73 - [c63]Lamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Wided Ghardallou, Ali Mili:
Using invariant functions and invariant relations to compute loop functions. ICSE (2) 2010: 317-318
2000 – 2009
- 2009
- [j51]Ali Mili, Shir Aharon, Chaitanya Nadkarni:
Mathematics for reasoning about loop functions. Sci. Comput. Program. 74(11-12): 989-1020 (2009) - [c62]Asma Louhichi, Olfa Mraihi, Lamia Labed Jilani, Khaled Bsaïes, Ali Mili:
Relational Methods in the Analysis of While Loops: Observations of Versatility. RelMiCS 2009: 242-259 - [c61]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Managing complex IT security processes with value based measures. CICS 2009: 69-75 - [c60]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying security threats and their impact. CSIIRW 2009: 26 - [c59]Ali Mili, Frederick T. Sheldon:
Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure Cost. HICSS 2009: 1-10 - [c58]Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili:
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission. HICSS 2009: 1-10 - [c57]Latifa Ben Arfa Rabai, Yanzhi Bai, Ali Mili:
Modeling the Evolution of Software Engineering Trends - A Bottom Up Approach. ICSOFT (1) 2009: 47-54 - [e2]Frederick T. Sheldon, Greg Peterson, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009. ACM 2009, ISBN 978-1-60558-518-5 [contents] - 2008
- [c56]Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili:
Evaluating security controls based on key performance indicators and stakeholder mission. CSIIRW 2008: 41:1-41:11 - [c55]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value. HASE 2008: 479-482 - [c54]Ali Mili, Shir Aharon, Chaitanya Nadkarni:
An Algorithm for Computing Loop Functions. SEKE 2008: 448-453 - [c53]Ali Mili, Rahma Ben Ayed, Shir Aharon, Chaitanya Nadkarni:
Harnessing a Refinement Theory to Compute Loop Functions. TTSS 2008: 139-155 - [e1]Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008. ACM 2008, ISBN 978-1-60558-098-2 [contents] - 2007
- [j50]Yi Peng, Fu Li, Ali Mili:
Modeling the evolution of operating systems: An empirical study. J. Syst. Softw. 80(1): 1-15 (2007) - [c52]Ali Mili, Frederick T. Sheldon:
Measuring Reliability as a Mean Failure Cost. HASE 2007: 403-404 - [c51]Ali Mili, Tim Daly, Mark G. Pleszkoch, Stacy J. Prowell:
A Semantic Recognizer Infrastructure for Computing Loop Behavior. HICSS 2007: 277 - [c50]Ali Mili, Alex Vinokurov, Lamia Labed Jilani, Frederick T. Sheldon, Rahma Ben Ayed:
Towards an Engineering Discipline of Computational Society. HICSS 2007: 281 - [c49]Mustafa Korkmaz, Ali Mili:
A Product Line of Software Reuse Cost Models. ICSOFT (SE) 2007: 264-269 - [c48]Yanzhi Bai, Ali Mili:
Monitoring software technology evolution, one trend at a time. SEDE 2007: 349-355 - [c47]Ali Mili:
A Refinement Based Framework for Computing Loop Behavior. SEW 2007: 144-153 - 2006
- [j49]Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani, Alex Vinokurov, Alexander Thomasian, Rahma Ben Ayed:
Modeling security as a dependability attribute: a refinement-based approach. Innov. Syst. Softw. Eng. 2(1): 39-48 (2006) - [c46]Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shereshevsky, Jules Desharnais:
Modeling Redundancy: Quantitative and Qualitative Models. AICCSA 2006: 1-8 - [c45]Israr Pasha Shaik, Walid Abdelmoez, Rajesh Gunnalan, Ali Mili, Christopher P. Fuhrman, Mark Shereshevsky, A. Zeid, Hany H. Ammar:
Using Change Propagation Probabilities to Assess Quality Attributes of Software Architectures 1. AICCSA 2006: 704-711 - 2005
- [j48]Ali Mili, Frederick T. Sheldon, Fatma Mili, Jules Desharnais:
Recoverability preservation: a measure of last resort. Innov. Syst. Softw. Eng. 1(1): 54-62 (2005) - [j47]Vittorio Cortellessa, Diego Del Gobbo, Mark Shereshevsky, Jules Desharnais, Ali Mili:
Relational characterizations of system fault tolerance. Sci. Comput. Program. 56(3): 343-361 (2005) - [j46]Yaofei Chen, Rose Dios, Ali Mili, Lan Wu, Kefei Wang:
An Empirical Study of Programming Language Trends. IEEE Softw. 22(3): 72-78 (2005) - [c44]Walid Abdelmoez, Mark Shereshevsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, S. Bogazzi, Mustafa Korkmaz, Ali Mili:
Quantifying software architectures: an analysis of change propagation probabilities. AICCSA 2005: 124 - [c43]Ali Mili, Frederick T. Sheldon, Fatma Mili, Mark Shereshevsky, Jules Desharnais:
Perspectives on Redundancy: Applications to Software Certification. HICSS 2005 - [c42]Israr Pasha Shaik, Walid Abdelmoez, Rajesh Gunnalan, Mark Shereshevsky, A. Zeid, Hany H. Ammar, Ali Mili, Christopher P. Fuhrman:
Change Propagation for Assessing Design Quality of Software Architectures. WICSA 2005: 205-208 - 2004
- [c41]Bo Yu, Ali Mili, Walid Abdelmoez, Rajesh Gunnalan, Mark Shereshevsky, Hany H. Ammar:
Assessing and Quantifying Attributes of Product Line Architectures. CCCT (2) 2004: 175-181 - [c40]Ali Mili, GuangJie Jiang, Bojan Cukic, Yan Liu, Rahma Ben Ayed:
Towards the Verification and Validation of Online Learning Systems: General Framework and Applications. HICSS 2004 - [c39]Walid Abdelmoez, Mark Shereshevsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, S. Bogazzi, Mustafa Korkmaz, Ali Mili:
Software Architectures Change Propagation Tool (SACPT). ICSM 2004: 517 - [c38]Walid Abdelmoez, Diaa Eldin M. Nassar, Mark Shereshevsky, Nicholay Gradetsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, Ali Mili:
Error Propagation In Software Architectures. IEEE METRICS 2004: 384-393 - 2003
- [j45]Katerina Goseva-Popstojanova, Ahmed E. Hassan, Ajith Guedem, Walid Abdelmoez, Diaa Eldin M. Nassar, Hany H. Ammar, Ali Mili:
Architectural-Level Risk Analysis Using UML. IEEE Trans. Software Eng. 29(10): 946-960 (2003) - 2002
- [j44]Robert David Cowan, Alan R. McKendall Jr., Ali Mili, Lin Yang, L. Wang, Dapeng Chen, V. Janardhana, Terry Spencer:
Software engineering technology watch. Inf. Sci. 140(3-4): 195-215 (2002) - [j43]Kamel Barkaoui, Mohamed Jmaiel, Ali Mili:
Guest editorial. J. Syst. Softw. 60(2): 87-89 (2002) - [j42]