default search action
Adel Mahfoudhi
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Faten Mrabet, Walid Karamti, Adel Mahfoudhi:
Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures. Computing 106(3): 651-712 (2024) - 2022
- [j13]Faten Mrabet, Walid Karamti, Adel Mahfoudhi:
A clustering allocation and scheduling analysis approach for multiprocessor dependent real-time tasks. Int. J. Comput. Appl. Technol. 70(1): 48-71 (2022) - [c41]Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:
SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network. SIN 2022: 1-6 - 2021
- [j12]Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:
Performance evaluation of Convolutional Neural Network for web security. Comput. Commun. 175: 58-67 (2021) - [c40]Nouha Derbel, Hedi Tmar, Adel Mahfoudhi:
A Multi-View DCNN Based Method for Breast Cancer Screening. DICTA 2021: 1-6 - [c39]Marwa Hentati, Abdelwaheb Trabelsi, Adel Mahfoudhi:
Optimizing the Usability of User Interfaces based on Multi-objective Evolutionary Algorithms. ICSOFT 2021: 277-284 - 2020
- [c38]Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:
M-CNN: A New Hybrid Deep Learning Model for Web Security. AICCSA 2020: 1-7 - [c37]Nouha Derbel, Hedi Tmar, Adel Mahfoudhi:
A Multi-view Deep Convolutional Neural Network for Reduction of False Positive Findings in Breast Cancer Screening. ATSIP 2020: 1-6 - [c36]Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:
Malicious Http Request Detection Using Code-Level Convolutional Neural Network. CRiSIS 2020: 317-324 - [c35]Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi:
ASCII Embedding: An Efficient Deep Learning Method for Web Attacks Detection. MedPRAI 2020: 286-297
2010 – 2019
- 2019
- [j11]Marwa Hentati, Abdelwaheb Trabelsi, Lassaad Ben Ammar, Adel Mahfoudhi:
Search-based software engineering for optimising usability of user interfaces within model transformations. IET Softw. 13(5): 368-378 (2019) - 2018
- [j10]Amina Magdich, Yessine Hadj Kacem, Mickaël Kerboeuf, Adel Mahfoudhi, Mohamed Abid:
A design pattern-based approach for automatic choice of semi-partitioned and global scheduling algorithms. Inf. Softw. Technol. 97: 83-98 (2018) - [c34]Faten Mrabet, Walid Karamti, Adel Mahfoudhi:
SAC-Tool: A Tool for Scheduling Analysis and Correction of Multiprocessor Real Time Systems. AICCSA 2018: 1-7 - [c33]Amina Magdich, Yessine Hadj Kacem, Bouthaina Dammak, Adel Mahfoudhi, Mohamed Abid:
From Dynamic UML/MARTE Models to Early Schedulability Analysis of RTES with Dependent Tasks. ISDA (2) 2018: 192-201 - 2017
- [j9]Aymen Abid, Abdennaceur Kachouri, Adel Mahfoudhi:
Outlier detection for wireless sensor networks using density-based clustering approach. IET Wirel. Sens. Syst. 7(4): 83-90 (2017) - [j8]Aymen Abid, Atef Masmoudi, Abdennaceur Kachouri, Adel Mahfoudhi:
Outlier Detection in Wireless Sensor Networks Based on OPTICS Method for Events and Errors Identification. Wirel. Pers. Commun. 97(1): 1503-1515 (2017) - [c32]Faten Mrabet, Walid Karamti, Adel Mahfoudhi:
Scheduling Analysis and Correction of Periodic Real Time Systems with Tasks Migration. ISDA 2017: 712-723 - 2016
- [j7]Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi:
A model-driven approach for usability engineering of interactive systems. Softw. Qual. J. 24(2): 301-335 (2016) - [c31]Aymen Abid, Abdennaceur Kachouri, Adel Mahfoudhi:
Anomaly detection through outlier and neighborhood data in Wireless Sensor Networks. ATSIP 2016: 26-30 - [c30]Marwa Hentati, Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi:
Model-driven Engineering for Optimizing the Usability of User Interfaces. ICEIS (2) 2016: 459-466 - [c29]Rebai Rim, Maalej Mohamed Amin, Adel Mahfoudhi, Mohamed Abid:
Bayesian user modeling: evaluation metrics of an adaptive user interface. ICMV 2016: 103412F - [c28]Amina Magdich, Yessine Hadj Kacem, Adel Mahfoudhi, Mohamed Abid:
From UML/MARTE Models of Multiprocessor Real-time Embedded Systems to Early Schedulability Analysis based on SimSo Tool. ICSOFT-EA 2016: 202-209 - [c27]Rebai Rim, Maalej Mohamed Amin, Adel Mahfoudhi, Mohamed Abid:
Evaluation Method for an Adaptive Web Interface: GOMS Model. ISDA 2016: 116-124 - [c26]Rebai Rim, Maalej Mohamed Amin, Adel Mahfoudhi, Mohamed Abid:
Comparison of Hard and Probabilistic Evidence in Bayesian Model. ISDA 2016: 622-629 - [c25]Marwa Hentati, Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi:
An Approach for Incorporating the Usability Optimization Process into the Model Transformation. ISDA 2016: 879-888 - [c24]Marwa Hentati, Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi:
A fuzzy-logic system for the user interface usability measurement. SNPD 2016: 133-138 - 2015
- [j6]Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi:
Incorporating usability requirements into model transformation technologies. Requir. Eng. 20(4): 465-479 (2015) - [j5]Adel Mahfoudhi, Walid Karamti:
Transformation process of RTS scheduling analysis requirements from UML/MARTE to dynamic priority time Petri Nets. J. Supercomput. 71(10): 3637-3667 (2015) - [c23]Aymen Abid, Abdennaceur Kachouri, Awatef Ben Fradj Guiloufi, Adel Mahfoudhi, Nejah Nasri, Mohamed Abid:
Centralized KNN anomaly detector for WSN. SSD 2015: 1-4 - [c22]Amina Magdich, Yessine Hadj Kacem, Adel Mahfoudhi, Mickaël Kerboeuf, Mohamed Abid:
Real-Time Design Patterns: Architectural Designs for Automatic Semi-Partitioned and Global Scheduling. BMMDS/EMMSAD 2015: 447-460 - [c21]Marwa Hentati, Abdelwaheb Trabelsi, Lassaad Ben Ammar, Adel Mahfoudhi:
Towards optimizing the usability of user interface generated with model-driven development process. HSI 2015: 206-212 - [c20]Rebai Rim, Aymen Abid, Maalej Mohamed Amin, Adel Mahfoudhi:
Cloud computing for an adaptive Web interface. ICTA 2015: 1-3 - 2014
- [j4]Walid Karamti, Adel Mahfoudhi:
Scheduling analysis based on model checking for multiprocessor real-time systems. J. Supercomput. 68(3): 1604-1629 (2014) - [c19]Amina Magdich, Yessine Hadj Kacem, Adel Mahfoudhi, Mickaël Kerboeuf:
A UML/MARTE-Based Design Pattern for Semi-partitioned Scheduling Analysis. WETICE 2014: 300-305 - 2013
- [c18]Rebai Rim, Maalej Mohamed Amin, Adel Mahfoudhi:
Bayesian networks for user modeling: Predicting the user's preferences. HIS 2013: 144-148 - [c17]Lassaad Ben Ammar, Adel Mahfoudhi:
Usability driven model transformation. HSI 2013: 110-116 - [c16]Lassaad Ben Ammar, Adel Mahfoudhi:
Early Usability Evaluation in Model Driven Framework. ICEIS (3) 2013: 23-30 - [c15]Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi:
Dealing with Usability in Model-Driven Development Method. ICEIS 2013: 405-420 - [c14]Amina Magdich, Yessine Hadj Kacem, Adel Mahfoudhi:
Extending UML/MARTE-GRM for Integrating Tasks Migrations in Class Diagrams. SERA (selected papers) 2013: 73-84 - [c13]Lassaad Ben Ammar, Adel Mahfoudhi:
An Empirical Evaluation of a Usability Measurement Method in a Model Driven Framework. SouthCHI 2013: 157-173 - 2012
- [j3]Wided Bouchelligua, Adel Mahfoudhi, Mourad Abed:
A Model Driven Engineering Approach Toward User Interfaces Adaptation. Int. J. Adapt. Resilient Auton. Syst. 3(1): 65-86 (2012) - [j2]Adel Mahfoudhi, Yessine Hadj Kacem, Walid Karamti, Mohamed Abid:
Compositional specification of real time embedded systems by priority time Petri Nets. J. Supercomput. 59(3): 1478-1503 (2012) - [c12]Yessine Hadj Kacem, Adel Mahfoudhi, Amina Magdich, Chokri Mraidha, Walid Karamti:
Using MDE and priority time petri nets for the schedulability analysis of embedded systems modeled by UML activity diagrams. ECBS 2012: 316-323 - [c11]Walid Karamti, Adel Mahfoudhi, Yessine Hadj Kacem:
Using Dynamic Priority Time Petri Nets for Scheduling Analysis via Earliest Deadline First Policy. ISPA 2012: 332-339 - [c10]Amina Magdich, Yessine Hadj Kacem, Adel Mahfoudhi, Mohamed Abid:
A MARTE Extension for Global Scheduling Analysis of Multiprocessor Systems. ISSRE 2012: 371-379 - [c9]Walid Karamti, Adel Mahfoudhi, Yessine Hadj Kacem, Mohamed Abid:
A Formal Method for Scheduling Analysis of a Partitioned Multiprocessor System - Dynamic Priority Time Petri Nets. PECCS 2012: 317-326 - 2010
- [j1]Ali Cherif Chaabani, Atef Boujelben, Adel Mahfoudhi, Mohamed Abid:
An Automatic-Pre-processing Method For Mammographic Images. J. Digit. Content Technol. its Appl. 4(3): 190-201 (2010) - [c8]Yessine Hadj Kacem, Adel Mahfoudhi, Hedi Tmar, Mohamed Abid:
From UML/MARTE to RTDT: A model driven based method for scheduling analysis and HW/SW partitioning. AICCSA 2010: 1-7 - [c7]Wided Bouchelligua, Adel Mahfoudhi, Nesrine Mezhoudi, Olfa Dâassi, Mourad Abed:
User Interfaces Modelling of Workflow Information Systems. EOMAS 2010: 143-163 - [c6]Wided Bouchelligua, Adel Mahfoudhi, Lassaad Ben Ammar, Sirine Rebai, Mourad Abed:
An MDE Approach for User Interface Adaptation to the Context of Use. HCSE 2010: 62-78 - [c5]Yessine Hadj Kacem, Walid Karamti, Adel Mahfoudhi, Mohamed Abid:
A Petri Net Extension for Schedulability Analysis of Real Time Embedded Systems. PDPTA 2010: 304-314 - [c4]Ali Cherif Chaabani, Atef Boujelben, Adel Mahfoudhi, Mohamed Abid:
Shape Features for Mass Diagnosis in Mammographic Images. VISAPP (2) 2010: 255-262
2000 – 2009
- 2008
- [c3]Yessine Hadj Kacem, Adel Mahfoudhi, Hedi Tmar, Mohamed Abid:
Towards the Automatic Generation of Real Time Operating Systems Applying UML/MDA. Software Engineering Research and Practice 2008: 171-177 - 2005
- [c2]Adel Mahfoudhi, Mohamed Abid, Mourad Abed:
Towards a user interface generation approach based on object oriented design and task model. TAMODIA 2005: 135-142 - 2001
- [c1]Adel Mahfoudhi, Mourad Abed, Dimitri Tabary:
From the Formal Specifications of Users Tasks to the Automatic Generation of the HCI Specifications. BCS HCI/IHM 2001: 331-347
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint