default search action
Riadh Robbana
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Sana Younès, Maroua Idi, Riadh Robbana:
Performability analysis of multi-service call admission control schemes in LTE networks. Int. J. Gen. Syst. 53(2): 215-253 (2024) - [j12]Sana Younès, Maroua Idi, Riadh Robbana:
Discrete-time Markov decision process for performance analysis of virtual machine allocation schemes in C-RAN. J. Netw. Comput. Appl. 225: 103859 (2024) - [c45]Maroua Idi, Sana Younès, Riadh Robbana:
Steady-State Energy Consumption Evaluation in BaseBand Units Pool in Cloud Radio Access Network. ENASE 2024: 99-109 - 2022
- [c44]Farah Fourati, Mohamed Tahar Bhiri, Riadh Robbana:
Xtend Transformation from PDDL to Event-B. ICCCI 2022: 638-644 - [c43]Maroua Idi, Sana Younès, Riadh Robbana:
Performance Evaluation of Call Admission Control Strategy in Cloud Radio Access Network using Formal Methods. ICSOFT 2022: 630-640 - [c42]Farah Fourati, Mohamed Tahar Bhiri, Riadh Robbana:
Validating Event-B models using PDDL. KES 2022: 2638-2647 - 2021
- [j11]Imene Ben Hafaiedh, Roua Ben Hamouda, Riadh Robbana:
A model-based approach for formal verification and performance analysis of dynamic load-balancing protocols in cloud environment. Clust. Comput. 24(4): 2977-2994 (2021) - [j10]Marwa Chaieb, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
Design and practical implementation of verify-your-vote protocol. Concurr. Comput. Pract. Exp. 33(1) (2021) - [j9]Roua Ben Hamouda, Imene Ben Hafaiedh, Riadh Robbana:
Modelling and verification of reconfigurable fault-tolerant and self-recovering systems in hybrid Clouds. Simul. Model. Pract. Theory 111: 102331 (2021) - [c41]Amine Maamouri, Lilia Sfaxi, Riadh Robbana:
Phi: A Generic Microservices-Based Big Data Architecture. EMCIS 2021: 3-16 - 2020
- [j8]Taycir Bouasker, Mahjoub Langar, Riadh Robbana:
QoS monitor as a service. Softw. Qual. J. 28(3): 1279-1301 (2020) - [c40]Mohamed Mehdi Ben Aissa, Lilia Sfaxi, Riadh Robbana:
DECIDE: A New Decisional Big Data Methodology for a Better Data Governance. EMCIS 2020: 63-78 - [c39]Oussama Trabelsi, Lilia Sfaxi, Riadh Robbana:
A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems. ICETE (Selected Papers) 2020: 51-78 - [c38]Oussama Trabelsi, Lilia Sfaxi, Riadh Robbana:
DCBC: A Distributed High-performance Block-Cipher Mode of Operation. ICETE (2) 2020: 86-97
2010 – 2019
- 2019
- [c37]Marwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting. ICETE (2) 2019: 228-235 - [c36]Marwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
DABSTERS: A Privacy Preserving e-Voting Protocol for Permissioned Blockchain. ICTAC 2019: 292-312 - 2018
- [j7]Imene Ben Hafaiedh, Maroua Ben Slimane, Riadh Robbana:
A formal model for the analysis and verification of a pre-emptive round-robin arbiter. Int. J. Crit. Comput. Based Syst. 8(2): 169-192 (2018) - [c35]Marwa Chaieb, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
Verify-Your-Vote: A Verifiable Blockchain-Based Online Voting Protocol. EMCIS 2018: 16-30 - [c34]Roua Ben Hamouda, Sabrine Boussema, Imene Ben Hafaiedh, Riadh Robbana:
Performance Evaluation of Dynamic Load Balancing Protocols Based on Formal Models in Cloud Environments. VECoS 2018: 64-79 - 2017
- [j6]Maroua Ben Slimane, Imene Ben Hafaiedh, Riadh Robbana:
Formal-Based Design and Verification of SoC Arbitration Protocols: A Comparative Analysis of TDMA and Round-Robin. IEEE Des. Test 34(5): 54-62 (2017) - [c33]Imene Ben Hafaiedh, Maroua Ben Slimane, Sourour Haouala, Riadh Robbana:
Formal Distributed Model for the Verification of Job-Scheduling in Cloud Environments. AICCSA 2017: 660-667 - [c32]Safa Saoudi, Souheib Yousfi, Riadh Robbana:
Elliptic Curve Cryptography on E-Passport Authentication Protocol. AICCSA 2017: 1253-1260 - 2016
- [c31]Taycir Bouasker, Mahjoub Langar, Riadh Robbana:
Novel time related quality of service criteria. AICCSA 2016: 1-8 - [c30]Brahim Nasraoui, Riadh Robbana:
Reachability Analysis of Multithreaded Programs Using Communicating Rewriting Systems. COMPSAC Workshops 2016: 228-233 - [c29]Imene Ben Hafaiedh, Maroua Ben Slimane, Riadh Robbana:
A Distributed Formal Model for the Analysis and Verification of Arbitration Protocols on MPSoCs Architecture. ICA3PP 2016: 658-674 - [c28]Farah Fourati, Mohamed Tahar Bhiri, Riadh Robbana:
Verification and validation of PDDL descriptions using Event-B formal method. ICMCS 2016: 770-776 - [c27]Taycir Bouasker, Mahjoub Langar, Riadh Robbana:
NFRs based web services scoring as web service. ISCC 2016: 1032-1038 - [c26]Farah Fourati, Mohamed Tahar Bhiri, Riadh Robbana:
Coupling Event-B/ProB for the Analysis of the Software Architecture Evolution Described in PDDL. ISDA 2016: 821-830 - [c25]Imene Hadded, Mahjoub Langar, Riadh Robbana:
Web Services Orchestration's Monitor as a Web Service. SoMeT 2016: 258-269 - [c24]Safa Saoudi, Souheib Yousfi, Riadh Robbana:
ePassport Protocol on the Spi Calculus. VECoS 2016: 161-176 - [c23]Hana M'Hemdi, Jacques Julliand, Pierre-Alain Masson, Riadh Robbana:
Conformance Testing for Non-deterministic Timed Pushdown Automata with Deadlines. WETICE 2016: 211-213 - 2015
- [c22]Donia Khemakhem Krid, Naouel Ben Salem Grati, Riadh Robbana:
A new model for Online Social Networks case of Facebook. AICCSA 2015: 1-6 - [c21]Hana M'Hemdi, Jacques Julliand, Pierre-Alain Masson, Riadh Robbana:
Test generation from timed pushdown automata with inputs and outputs. ICST Workshops 2015: 1-10 - [c20]Karim Dahmani, Mahjoub Langar, Riadh Robbana:
A Formal Dynamic Verification of Choreographed Web Services Conversations. ProvSec 2015: 340-353 - [c19]Hana M'Hemdi, Jacques Julliand, Pierre-Alain Masson, Riadh Robbana:
Non-deterministic Timed Pushdown Automata-Based Testing Evaluated by Mutation. WETICE 2015: 198-203 - 2014
- [e1]Véronique Cortier, Riadh Robbana:
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , Tunis, Tunisia, June 23rd, 2014. CEUR Workshop Proceedings 1158, CEUR-WS.org 2014 [contents] - 2013
- [j5]Lilia Sfaxi, Takoua Abdellatif, Riadh Robbana, Yassine Lakhnech:
Information flow control of component-based distributed systems. Concurr. Comput. Pract. Exp. 25(2): 161-179 (2013) - 2012
- [j4]Lilia Sfaxi, Takoua Abdellatif, Yassine Lakhnech, Riadh Robbana:
Sécuriser les systèmes distribués à base de composants par contrôle de flux d'information. Tech. Sci. Informatiques 31(2): 245-279 (2012) - [c18]Souheib Yousfi, Stéphane Derrode, Riadh Robbana:
Watermarking in e-voting for large scale election. ICMCS 2012: 130-133 - [c17]Assia Ben Shil, Kaouthar Blibech, Riadh Robbana, Wafa Neji:
A New PVSS Scheme with a Simple Encryption Function. SCSS 2012: 11-22 - 2011
- [c16]Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yassine Lakhnech:
Automating information flow control in component-based distributed systems. CBSE 2011: 73-82 - 2010
- [c15]Roberto Araújo, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi:
Towards Practical and Secure Coercion-Resistant Electronic Elections. CANS 2010: 278-297
2000 – 2009
- 2009
- [c14]Lotfi Majdoub, Riadh Robbana:
Test Cases Generation for Nondeterministic Duration Systems. MSVVEIS 2009: 14-23 - [c13]Narjes Ben Rajeb, Brahim Nasraoui, Riadh Robbana, Tayssir Touili:
Verifying Multithreaded Recursive Programs with Integer Variables. INFINITY 2009: 143-154 - 2008
- [c12]Souheib Yousfi, Alexis Bonnecaze, Riadh Robbana:
Apport de la cryptographie elliptique dans le vote électronique. CRiSIS 2008: 185-192 - [c11]Assia Ben Shil, Kaouthar Blibech, Riadh Robbana:
A new timestamping schema in the Bounded Storage Model. CRiSIS 2008: 199-205 - [c10]Yosr Naïja, Salem Chakhar, Kaouthar Blibech, Riadh Robbana:
Extension of Partitional Clustering Methods for Handling Mixed Data. ICDM Workshops 2008: 257-266 - 2007
- [c9]Lotfi Majdoub, Riadh Robbana:
Testing Duration Systems using an approximation method. DepCoS-RELCOMEX 2007: 119-126 - [c8]Saddek Bensalem, Moez Krichen, Lotfi Majdoub, Riadh Robbana, Stavros Tripakis:
A Simplified Approach for Testing Real-Time Systems Based on Action Refinement. ISoLA 2007: 191-202 - 2006
- [c7]Lotfi Majdoub, Riadh Robbana:
Test Purpose of Duration Systems. MSVVEIS 2006: 67-75 - 2004
- [j3]Narjes Berregeb, Riadh Robbana, Ashish Tiwari:
Towards automated proofs of observational properties. Discret. Math. Theor. Comput. Sci. 6(2): 143-162 (2004) - [j2]Narjes Berregeb, Riadh Robbana:
On the Verification by Approximation of Duration Systems. Int. Arab J. Inf. Technol. 1(2): 147-155 (2004) - 2003
- [j1]Riadh Robbana:
Verification of Duration Systems Using an Approximation Approach. J. Comput. Sci. Technol. 18(2): 153-162 (2003)
1990 – 1999
- 1995
- [b1]Riadh Robbana:
Spécification et vérification de systèmes hybrides. (Specification and verification of hybrid systems). Joseph Fourier University, Grenoble, France, 1995 - [c6]Ahmed Bouajjani, Yassine Lakhnech, Riadh Robbana:
From Duration Calculus To Linear Hybrid Automata. CAV 1995: 196-210 - [c5]Ahmed Bouajjani, Riadh Robbana:
Verifying omega-Regular Properties for a Subclass of Linear Hybrid Systems. CAV 1995: 437-450 - 1994
- [c4]Ahmed Bouajjani, Rachid Echahed, Riadh Robbana:
Verification of Context-Free Timed Systems Using Linear Hybrid Observers. CAV 1994: 118-131 - [c3]Ahmed Bouajjani, Rachid Echahed, Riadh Robbana:
Verification of Nonregular Temporal Properties for Context-Free Processes. CONCUR 1994: 81-97 - [c2]Ahmed Bouajjani, Rachid Echahed, Riadh Robbana:
Verfying Invariance Properties of Timed Systems with Duration Variables. FTRTFT 1994: 193-210 - [c1]Ahmed Bouajjani, Rachid Echahed, Riadh Robbana:
On the Automatic Verification of Systems with Continuous Variables and Unbounded Discrete Data Structures. Hybrid Systems 1994: 64-85
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint