关注
Ali Mili
Ali Mili
NJIT
在 themilis.net 的电子邮件经过验证
标题
引用次数
引用次数
年份
Reusing software: Issues and research directions
H Mili, F Mili, A Mili
IEEE transactions on Software Engineering 21 (6), 528-562, 1995
10711995
Reuse-based software engineering: techniques, organization, and controls
H Mili, A Mili, S Yacoub, E Addy
Wiley-Interscience, 2001
3762001
Storing and retrieving software components: A refinement based system
R Mili, A Mili, RT Mittermeir
IEEE Transactions on Software Engineering 23 (7), 445-460, 1997
3741997
A survey of software reuse libraries
A Mili, R Mili, RT Mittermeir
Annals of software engineering 5 (1), 349-414, 1998
2781998
Architectural-level risk analysis using UML
K Goseva-Popstojanova, A Hassan, A Guedem, W Abdelmoez, ...
IEEE transactions on software engineering 29 (10), 946-960, 2003
2152003
A cybersecurity model in cloud computing environments
LBA Rabai, M Jouini, AB Aissa, A Mili
Journal of King Saud University-Computer and Information Sciences 25 (1), 63-75, 2013
1582013
Error propagation in software architectures
W Abdelmoez, DM Nassar, M Shereshevsky, N Gradetsky, R Gunnalan, ...
10th International Symposium on Software Metrics, 2004. Proceedings., 384-393, 2004
1232004
On the lattice of specifications: Applications to a specification methodology
N Boudriga, F Elloumi, A Mili
Formal Aspects of Computing 4, 544-571, 1992
1231992
Software testing: Concepts and operations
A Mili, F Tchier
John Wiley & Sons, 2015
932015
An empirical study of programming language trends
Y Chen, R Dios, A Mili, L Wu, K Wang
IEEE software 22 (3), 72-79, 2005
872005
An integrated cost model for software reuse
A Mili, SF Chmiel, R Gottumukkala, L Zhang
Proceedings of the 22nd international conference on Software engineering …, 2000
802000
Toward an engineering discipline of software reuse
A Mili, S Yacoub, E Addy, H Mili
IEEE software 16 (5), 22-31, 1999
751999
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
742010
Embedding a demonic semilattice in a relation algebra
J Desharnais, N Belkhiter, SBM Sghaier, F Tchier, A Jaoua, A Mili, ...
Theoretical Computer Science 149 (2), 333-360, 1995
601995
A relational approach to the design of deterministic programs
A Mili
Acta Informatica 20, 315-328, 1983
591983
Characterizing a software component
S Yacoub, H Ammar, A Mili
International Workshop on Component-Based Software Engineering 298, 1999
571999
Integration of sequential scenarios
J Desharnais, M Frappier, R Khédri, A Mili
IEEE Transactions on Software Engineering 24 (9), 695-708, 1998
571998
Towards quantitative measures of Information Security: A Cloud Computing case study
M Jouini, AB Aissa, LBA Rabai, A Mili
International Journal of cyber-security and digital forensics (IJCSDF) 1 (3 …, 2012
552012
Relational heuristics for the design of deterministic programs
A Mili, J Desharnais, F Mili
Acta Informatica 24, 239-276, 1987
551987
Quantifying software architectures: an analysis of change propagation probabilities
W Abdelmoez, M Shereshevsky, R Gunnalan, HH Ammar, B Yu, ...
The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005
532005
系统目前无法执行此操作,请稍后再试。
文章 1–20