Journal articles


  1. A. Couture, C. Y. Laporte, and R. Champagne, "Amélioration de la performance des processus de test de recette dans une société d'État québécoise", Génie Logiciel, no. 101, pp. 51-60, June 2012.
  2. A. Masmoudi, G. Paquette, and R. Champagne, "Metadata-driven software components aggregation process with reuse", International Journal on Advanced Media and Communication, vol. 2, no. 1, pp. 35-58, 2008.
  3. A. April and R. Champagne, "What is the service level of your CMMS supplier?" in Maintenance & asset management, vol. 21, no. 1, pp. 25-29, Spring 2006.
  4. F. Coallier, R. Champagne, "A Product Line Engineering Practices Model", Journal of Science of Computer Programming, vol. 57, no. 1, pp. 73-87, 2005.
  5. R. Champagne, L.-A. Dessaint, H. Fortin-Blanchette, G. Sybille, "Analysis and Validation of a Real-time AC Drive Simulator", IEEE Transactions on Power Electronics, vol.19, no.2, Mars 2004.
  6. R. Champagne, L.-A. Dessaint, H. Fortin-Blanchette, "Real-Time Simulation of Electric Drives", IMACS Transactions on Mathematics and Computers in Simulation, vol. 63, Novembre 2003, pp. 173-181.
  7. O. Akhrif, A.-F. Okou, L.-A. Dessaint, R. Champagne, "Application of a Multivariable Feedback Linearization Scheme for Rotor Angle Stability and Voltage Regulation of Power Systems", IEEE Transactions on Power Systems, vol. 14, pp. 620-628, 1999.
  8. F. Coallier and R. Champagne, A Product Line engineering practices model, Elsevier Science of Computer Programming, vol. 57, pp. 73-87, 2005.
  9. François Coallier, International Standardization in Software and Systems Engineering, Crosstalk – The journal of Defense Software Engineering, February 2003.
  10. Pierre N. Robillard, Daniel Coupal, François Coallier: Profiling Software through the Use of Metrics. SP&E 21(5): 507-518 (1991).
  11. Ching Y.Suen, Peter D. Grogono, Raijan Shinghal and François Coallier: Verifying, validating, and measuring the performance of expert systems, expert systems with applications, Vol. 1, pp. 93-102, 1990.
  12. A. Ghannem, G. El Boussaidi, M. Kessentini, "Model Refactoring Using Examples: A Search-based Approach", accepted in Journal of Software: Evolution and Process, December 2013.
  13. G. El Boussaidi, H. Mili, "Understanding design patterns - what is the problem?" Journal of Software: Practice and Experience, Volume 42, Issue 12, pages 1495–1529, December 2012 DOI: 10.1002/spe.1145
  14. M. Kassab, G. El Boussaidi, H. Mili, "A quantitative evaluation of the impact of architectural patterns on quality requirements", Springer's Studies in Computational Intelligence Book Series, Volume 377, October 2011, pp. 173-184.
  15. H. Mili, G. Tremblay, G. Bou Jaoude, E. Lefebvre, L. El Abd, G. El Boussaidi, "Business Process Modeling Languages: Sorting through the alphabet soup". ACM Computing Surveys, Volume 43 Issue 1, November 2010, pp.1-56. DOI=10.1145/1824795.1824799.
  16. H. Mili, G. El Boussaidi, A. Salah, "Mise en oeuvre des patrons de conception par représentation explicite du problème". Journal of L’objet (LMO actes), ISSN 1262-1137, vol. 11, no 1-2, pp. 113-126, 2005.
  17. Sébastien Rufiange, Christopher P. Fuhrman, Visualizing protected variations in evolving software designs In Journal of Systems and Software, 2013.
  18. S. Rufiange, M.J. McGuffin, C.P. Fuhrman, ‘TreeMatrix: A Hybrid Visualization of Compound Graphs, In Computer Graphics Forum, Blackwell Publishing Ltd, volume 31, 2012.
  19. C.P. Fuhrman, Exploiting open-source projects to study software design, In Informatics in education, Vilnius University Institute of Mathematics and Informatics, volume 6, 2007.
  20. C.P. Fuhrman, Lightweight models for interpreting informal specifications, In Requirements Engineering, Springer, volume 8, 2003.
  21. H.H. Ammar, B. Cukic, A. Mili, C. Fuhrman, A comparative analysis of hardware and software fault tolerance: Impact on software reliability engineering, In Annals of Software Engineering, Springer, volume 10, 2000.
  22. Gherbi, A, Charpentier R, and Couture M. (2011) "Software Diversity for Future Systems Security" CrossTalk the Journal of Defense Software Engineering Vol. 25 No. 5, Sept/Oct 2011, pp. 10-13.
  23. Abdelouahed Gherbi, Ferhat Khendek. (2009) "From UML/SPT Models to Schedulability Analysis: Approach and a Prototype Implementation using ATL". In the Journal of Automated Software Engineering, Volume 16, Number 3-4, pages 387-414, Springer.
  24. Abdelouahed Gherbi, Ferhat Khendek. (2006) "UML Profiles for Real-Time Systems and their Applications" In the Journal of Object Technology Volume 5, Number 4, pages 149-169.
  25. M. Debbabi, A. Gherbi, A. Mourad, and H. Yahyaoui (2006) "A Selective Dynamic Compiler for Embedded Java Virtual Machines Targeting ARM Processors" in the Journal of Science of Computer Programming, Volume 59, Issue 1-2, Elsevier.
  26. M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. (2005) "E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines." In the Journal of Object Technology, Volume 4, Number 1, pages 83-108.
  27. Fatna Belqasmi, Christian Azar, Mbarka Soualhia, Nadjia Kara and Roch Glitho, ‘A case study of a Virtualized Infrastructure and its accompanying platform for IVR Applications in the Clouds’, IEEE Network Magazine, 2013.
  28. May El Barachi and Nadjia Kara, "Contextual Information acquisition and management solutions for IP-based Networks: A survey", Recent Patents on Telecommunications Journal, March 2013.
  29. May El Barachi, Sleiman Rabah, Nadjia Kara and Rachida Dssouli, Joey Paquet "A Multi-Service Multi-role Integrated Information Model for Dynamic Resource Discovery in Virtual Networks", submitted to IEEE Communications Magazine, 2013.
  30. May El Barachi, Nadjia Kara and Mathieu Forgues, "An Open Virtual Multi-Services Networking Architecture for the Future Internet", submitted to IEEE Internet Computer Magazine, 2013.
  31. Fatna Belqasmi, Nadjia Kara, Roch Glitho, Mbarka Soualhia and Christian Azar, "Genetic algorithms for resource management in virtualized IVR applications", IEEE Transactions on Network and Service Management Journal (accepted with minor changes), 2013.
  32. A. Dragoi and N. Kara, "Enabling network convergence through contextual session-mobility with IMS", International Journal of Multimedia & Its Applications, Vol. 3, No. 2, pp. 12-31, May 2011.
  33. A. Dragoi and N. Kara, "Ubiquitous and personalized Contextual Biomonitoring", International Journal of Healthcare Technology and Management (IJHTM) – Special Issue on Pervasive Healthcare, Vol. 10, No. ½, pp. 27-48, 2009.
  34. N. Kara, "Mobility Management approaches for Mobile IP Networks: Performance comparison and Use Recommendations", IEEE Transactions on Mobile Computing Journal, Vol. 8, No. 10, pp.1-14, 2009.
  35. M. J. McGuffin et J.-M. Robert, "Quantifying the sace-efficiency of 2D graphical representations of trees", Information Visualisation, Vol. 9, pp. 115-140, 2010.(pdf)
  36. M. Barbeau et J.-M. Robert, "Rogue-Base Station Detection in WiMax/802.16 Wireless Access Networks", Annales des Télécommunications, Vol. 61, No 11-12, November-December 2006, pp. 1300-1313. (pdf)
  37. P.C. van Oorschot, J.-M. Robert, et M. Vargas Martin, "A Monitoring System for Detecting Repeated Packets with Applications to Computer Worms", International Journal of Information Security, vol. 5, no. 3, 2006, pp. 86-199. (pdf)
  38. T. M. Chen et J.-M. Robert, "Worm epidemics in high-speed networks", IEEE Computer, vol. 37, no. 6, pp. 48-53, 2004.
  39. C. H. Bennett, G. Brassard et J.-M. Robert, "Privacy Amplification by Public Discussion", SIAM Journal of Computing vol. 17, no. 2, pp. 210-229, 1988.
  40. D. Mouheb, C. Talhi, M. Nouh, V. Lima, M. Debbabi, L. Wang, M. Pourzandi, 2010, Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML, Springer's Studies in Computational Intelligence Book Series, Vol 296/2010, Pages 197-213.
  41. M. Hejazi, C. Talhi, and M. Debbabi, 2009, Extraction of Forensically Sensitive Information from Windows Physical Memory, Digital Investigation Journal, Vol 6, Pages 121–131.
  42. M. Hejazi, M. Debbabi, and C. Talhi, 2008, Automated Windows Memory File Extraction for Cyber Forensics Investigation, Journal of Digital Forensics Practice, Vol 2, Num 3, Pages 117–131.
  43. V. Lima, C. Talhi, D. Mouheb, M. Debbabi, L. Wang, and M. Pourzandi, 2009, Formal Verification and Validation of UML 2.0 Sequence Diagrams Using Source and Destination of Messages, Electronic Notes of Theoretical Computer Science, Vol 254, Pages 143–160.
  44. C. Talhi, D. Mouheb, V. Lima, M. Debbabi, L. Wang, and M. Pourzandi. Usability of Security Specification Approaches for UML Design: A Survey, 2009, International Journal of Object Technology, Vol 8, Num 6, Pages 103–122.
  45. C. Talhi, N. Tawbi, and M. Debbabi, 2008, Execution Monitoring Enforcement under Memory-Limitations Constraints, Journal of Information and Computation, Vol 206/2-4, Pages 158–184.
  46. M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua, 2006, Security Evaluation of J2ME CLDC Embedded Java Platform, International Journal of Object Technology, Vol 5, Issue 2, Pages 125–154.
  47. M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua, 2006, Vulnerability Analysis of J2ME CLDC security, the US DoD Information Assurance Newsletter, Vol 9, Num 2, Pages 18–24.
  48. M. Debbabi, A. Mourad, C. Talhi, and H. Yahyaoui, 2005, Accelerating Embedded Java for Mobile Devices. IEEE Communications Magazine, Vol 43, Issue 9, Pages 80–85.
  49. M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua, 2005, E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines, International Journal of Object Technology, Vol 4, Issue 1, Pages 83–108.