2008 |
14 | EE | Béchir Ktari,
François Lajeunesse-Robert,
Claude Bolduc:
Solving Linear Equations in *-continuous Action Lattices.
RelMiCS 2008: 289-303 |
2007 |
13 | | François Lajeunesse-Robert,
Béchir Ktari:
Toward Solving Equations in Kleene Algebras.
SoMeT 2007: 285-304 |
12 | EE | Béchir Ktari,
Hamido Fujita,
Mohamed Mejri,
Daniel Godbout:
Toward a new software development environment.
Knowl.-Based Syst. 20(7): 683-693 (2007) |
2006 |
11 | | Daniel Godbout,
Béchir Ktari,
Mohamed Mejri:
A Formal Translation From an Imperative Language With Array to a Declarative Language.
SoMeT 2006: 319-339 |
10 | EE | Hamido Fujita,
Béchir Ktari,
Mohamed Mejri:
Implementing Lyee-Calculus in Java.
Knowl.-Based Syst. 19(2): 116-129 (2006) |
9 | EE | Mohamed Mbarki,
Mohamed Mejri,
Béchir Ktari:
Converting an imperative program to a declarative one.
Knowl.-Based Syst. 19(2): 130-140 (2006) |
2005 |
8 | | Béchir Ktari,
Mohamed Mejri,
Daniel Godbout,
Hamido Fujita:
LyeeBuilder.
SoMeT 2005: 83-99 |
2004 |
7 | EE | Alexandre Lacasse,
Mohamed Mejri,
Béchir Ktari:
Formal Implementation of Network Security Policies.
PST 2004: 161-166 |
6 | EE | Mathieu Couture,
Béchir Ktari,
Mohamed Mejri,
Frédéric Massicotte:
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring.
PST 2004: 175-179 |
5 | EE | Hamido Fujita,
Mohamed Mejri,
Béchir Ktari:
A process algebra to formalize the Lyee methodology.
Knowl.-Based Syst. 17(5-6): 263-281 (2004) |
2003 |
4 | EE | Mohamed Mejri,
Béchir Ktari,
Hamido Fujita,
M. M. Erhioui:
Static analysis of Lyee requirements.
Knowl.-Based Syst. 16(7-8): 361-382 (2003) |
2000 |
3 | EE | Mourad Debbabi,
E. Giasson,
Béchir Ktari,
F. Michaud,
Nadia Tawbi:
Secure Self-Certified COTS.
WETICE 2000: 183-188 |
1999 |
2 | EE | J. Bergeron,
Mourad Debbabi,
M. M. Erhioui,
Béchir Ktari:
Static Analysis of Binary Code to Isolate Malicious Behaviors.
WETICE 1999: 184-189 |
1998 |
1 | EE | Mourad Debbabi,
Abdelkader Benzakour,
Béchir Ktari:
A Synergy Between Model-Checking and Type Inference for the Verification of Value-Passing Higher-Order Processes.
AMAST 1998: 214-230 |