Communications, rapports techniques et autres


  1. François Coallier, Trillium: A Model for the Assessment of Telecom Product Development and Support Capability, reprinted from IEEE Software Process newsletter vol3 1995 in Software Process Models and Improvement, Robin B. Hunter and Richard H. Thayer [ed], IEEE Computer Society Press 2001
  2. François Coallier, International Software and System engineering Standards Activities / Actividades internacionales de Normalización en Software y Sistemas, in Ingeniería del Software, Fundacion DINTEL, 2001-03
  3. François Coallier, Jean Mayrand and Bruno Lague: Risk Management in Software Product Procurement, in Elements of Software Process Assessment and Improvement, Khaled El Eman and Nazim H. Madhavji [eds], IEEE Computer Society Press, 1999. pp. 23-44.
  4. François Coallier and Motei Azuma : Introduction to Software Engineering Standards, in SPICE, The Theory and Practice of Software Process Improvement and Capability Determination, Khaled El Eman, Jean-Normand Drouin and Walcélio Melo [eds], IEEE Computer Sopciety Press, 1998, pp. 1-18.
  5. François Coallier, Trillium: A Customer-Oriented Assessment Method for Software Development Capability, in Metrics in Software Evolution, Monika Müllenburg and Alain Abran [eds], GMBH NR 254, 199.
  6. François Coallier, Gene Hoffnagle, Paul Layzell, Liam O’Brien et Danny Poo (éditeurs), Proccedings, Tenth International Workshop on Software Technology and Engineering Practice, Montréal, Québec, Canada, October 6-8 2002, IEEE Computer Society Press.
  7. M. Kassab, G. El Boussaidi, "Incorporating Security and Performance Tactics into Pipes/Filters, Layered, MVC and Broker Architectural Patterns", Technical report, 2011
  8. G. El Boussaidi, "Développement logiciel par transformation de modèles". Ph.D.’s thesis, Université de Montréal, 2009. (Excellent honors)
  9. G. El Boussaidi, M. Martin, "The Design Pattern Code Generator for ABAP: Technical description", SAP Labs Canada internal report, January 12, 2009.
  10. G. El Boussaidi, Demonstration of the Design Pattern Code Generator for ABAP. SAP Labs Canada, January 8, 2009.
  11. G. El Boussaidi, M. Martin, "The Design Pattern Code Generator for ABAP", SAP Labs Canada internal report, June 2008.
  12. G. El Boussaidi, H. Mili, "Pattern Matching within model-driven approaches: strategies and problems", LATECE (Laboratory for research on technologies for eCommerce) technical report, November 2007, Montreal, Canada.
  13. G. El Boussaidi (2007), "Marketing Applications Architectural Description", SAP Labs Canada internal report, November 14, 2007.
  14. G. El Boussaidi, Software Design through model transformation, SAP Academic Symposium, Palo Alto, CA, June 7, 2007.
  15. G. El Boussaidi, H. Mili, "Les langages de description d’architectures", LATECE technical report, October 2006, Montreal, Canada.
  16. G. El Boussaidi, "Les approches de transformation de modèles basées sur les transformations de graphe", LATECE technical report, June 2006, Montreal, Canada.
  17. G. El Boussaidi, "Transformation de modèles par application de patrons de conception". Master’s thesis, Université de Québec à Montréal, March 2005. (Excellent honors).
  18. G. El Boussaidi, H. Mili, "Les patrons de conception : représentation et mise en oeuvre", LATECE technical report, April 2004, Montreal, Canada.
  19. Florent Bouchy, Michaël Lauer, John Mullins, Said Akram, Djamel Chabane, Abdelouahed Gherbi (2012) "Partitioning and Scheduling Requirements for Mixed-critical Avionic Embedded Systems on a Time-triggered Architecture", Final Report, CRIAQ Project Avio 503 Plan C, 126 pages, 2012.
  20. Florent Bouchy, Michaël Lauer, John Mullins, Said Akram, Djamel Chabane, Abdelouahed Gherbi (2012) "Model of Computation", Report, CRIAQ Project Avio 613, 8 pages, 2013.
  21. Gherbi, A, Charpentier, R., and Couture, M. (2010) "Redundancy with Diversity Based Software Architectures for the Detection and Tolerance of Cyber-Attacks", Technical Report, TM-2010-287, DRDC Valcartier, 82 pages.
  22. Mario Couture and Abdelouahed Gherbi (2009) "Cyber Threat - Definitions and references." TN 2009-235,1DRDC Valcartier, 148 pages
  23. R. Waroux et Nadjia Kara, "Algorithme de prédiction du temps d'attente dans des cliniques sans rendez-vous", Rapport technique confidentiel Technowait, Avril 2013.
  24. S. Benmakrelouf, et Nadjia Kara, "Analyse d’un outil d’aide à la stimulation cognitive basé sur les jeux sérieux pour patients atteints de psychose", Rapport technique confidentiel Creo, juin 2013.
  25. Benmakrelouf, Y. Ouakrim, Neila Mezghani et Nadjia Kara,"Sondage sur le degré d’utilisation des outils technologiques, les jeux vidéo et les réseaux sociaux en schizophrénie", Rapport technique RCR-TR-2012-P1-001-v1.00, juillet 2012.
  26. N. Kara and A. Dragoi, "Automatic session continuity management in IMS 3G networks", IIT-R report, February 2007.
  27. N. Kara and A. Dragoi, "Biomonitoring Application modeling and performance analysis", IIT-R report, March 2006
  28. N. Kara and H. Zeino, "End-to-End QoS management in wireless networks", IIT-R report March 2006.
  29. Nadjia Kara, A. Dragoi, "Context-aware Biomonitoring: requirements and architecture", IIT-R technical report, December 2006.
  30. N. Kara, A. Dragoi and O. Issa, "Context-aware Biomonitoring application: state of the art and scenarios", IIT-R report, October 2005
  31. U.S. Patent 7,757,283 - System and method for detecting abnormal traffic based on early notification, J.-M. Robert, F.J.N. Cosquer.
  32. U.S. Patent 7,716,740 – Rogue access point detection in wireless networks, J.-M. Robert, M. Barbeau.
  33. U.S. Patent 7,685,420 – Cookie-based mechanism providing lightweight authentication of layer-2 frames, F. Gariador, J.-M. Robert.
  34. U.S. Patent 7,647,623 – Application layer ingress filtering, J.-M. Robert, D. Vinokurov.
  35. U.S. Patent 7,565,426 – Mechanism for Tracing Back Anonymous Network Flows in Autonomous Systems, E. Jones et J.-M. Robert.
  36. U.S. Patent 7,487,541 – Flow-based method for tracking back single packets, J.-M. Robert.
  37. U.S. Patent 7,464,398 – Queuing methods for mitigation of packet spoofing, J.-M. Robert, S. D. D'Souza, P. Kierstead.
  38. U.S. Patent 7,415,018 – IP Time to Live (TTL) field used as a covert channel, E. Jones, O. Le Moigne, J.-M. Robert.
  39. U.S. Patent 7,373,663 – Secret hashing for TCP SYN/FIN correspondence, J.-M. Robert.
  40. U.S. Patent 7,284,272 – Secret hashing for TCP SYN/FIN correspondence, B. Howard, J.-M. Robert, P. Kierstead, S. D. D'Souza.
  41. U.S. Patent 7,114,182 – Statistical methods for detecting TCP SYN flood attacks, J.-M. Robert, B. Howard, P. Kierstead, S. D. D'Souza.
  42. M. Debbabi, M. Saleh, C. Talhi et S. Zhioua. Security Hardening of J2ME-CLDC. Rapport soumis à "Alcatel Research and Innovation (R&I) Security Group", Ottawa, Canada. Septembre, 2004.
  43. M. Debbabi, M. Saleh, C. Talhi et S. Zhioua. Security Evaluation of J2ME-CLDC. Rapport soumis à "Alcatel Research and Innovation (R&I) Security Group", Ottawa, Canada. Juillet, 2004.
  44. M. Debbabi, M. Saleh, C. Talhi et S. Zhioua. Reverse Engineering of the J2ME-CLDC platform. Rapport soumis à "Alcatel Research and Innovation (R&I) Security Group", Ottawa, Canada. Mai, 2004.
  45. M. Debbabi, M. Erhioui, A. Gherbi, C. Talhi et S. Zhioua. Towards Trusted Free Open Source Software. Rapport soumis à "Defence Research and Development Canada, Valcartier", Québec, Canada, Avril, 2004.
  46. M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui et S. Zhioua. E-Bunny Project. Rapport soumis à "Panasonic Information and Networking Technologies Laboratory." Mars, 2003.