Остановите войну!
for scientists:
default search action
Walid Gaaloul
- > Home > Persons > Walid Gaaloul
Publications
- 2022
- [c139]Ikram Garfatta, Kaïs Klai, Mohamed Graïet, Walid Gaaloul:
Model checking of vulnerabilities in smart contracts: a solidity-to-CPN approach. SAC 2022: 316-325 - 2021
- [c137]Ikram Garfatta, Kais Klai, Walid Gaaloul, Mohamed Graiet:
A Survey on Formal Verification for Solidity Smart Contracts. ACSW 2021: 3:1-3:10 - [c132]Ikram Garfatta, Kaïs Klai, Mohamed Graïet, Walid Gaaloul:
Model Checking of Solidity Smart Contracts Adopted for Business Processes. ICSOC 2021: 116-132 - [c127]Ikram Garfatta, Kaïs Klai, Mohamed Graïet, Walid Gaaloul:
A Solidity-to-CPN Approach Towards Formal Verification of Smart Contracts. WETICE 2021: 69-74 - 2019
- [c113]Imed Abbassi, Layth Sliman, Mohamed Graiet, Walid Gaaloul:
On the Verification of Data Encryption Requirements in Internet of Things Using Event-B. ICDEc 2019: 147-156 - 2018
- [j28]Mohamed Graiet, Imed Abbassi, Mourad Kmimech, Walid Gaaloul:
A Genetic-Based Adaptive Approach for Reliable and Efficient Service Composition. IEEE Syst. J. 12(2): 1644-1654 (2018) - [c100]Ikram Garfatta, Kais Klai, Mohamed Graiet, Walid Gaaloul:
Formal Modelling and Verification of Cloud Resource Allocation in Business Processes. OTM Conferences (1) 2018: 552-567 - [c97]Ikram Garfatta, Kais Klai, Mohamed Graiet, Walid Gaaloul:
[WiP] Formal Modelling of IT Resource Allocation in Business Processes. SOCA 2018: 227-232 - 2017
- [j25]Mohamed Graiet, Amel Mammar, Souha Boubaker, Walid Gaaloul:
Towards Correct Cloud Resource Allocation in Business Processes. IEEE Trans. Serv. Comput. 10(1): 23-36 (2017) - [c91]Souha Boubaker, Kais Klai, Katia Schmitz, Mohamed Graiet, Walid Gaaloul:
Deadlock-Freeness Verification of Business Process Configuration Using SOG. ICSOC 2017: 96-112 - 2016
- [c80]Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul:
Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B. AINA 2016: 746-753 - [c75]Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul:
A Formal Guidance Approach for Correct Process Configuration. ICSOC 2016: 483-498 - [c74]Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul:
An Event-B Based Approach for Ensuring Correct Configurable Business Processes. ICWS 2016: 460-467 - [c72]Aida Lahouij, Lazhar Hamel, Mohamed Graiet, Abir Elkhalfa, Walid Gaaloul:
A Global SLA-Aware Approach for Aggregating Services in the Cloud. OTM Conferences 2016: 363-380 - 2015
- [c69]Souha Boubaker, Walid Gaaloul, Mohamed Graiet, Nejib Ben Hadj-Alouane:
Event-B Based Approach for Verifying Cloud Resource Allocation in Business Process. SCC 2015: 538-545 - [c63]Imed Abbassi, Mohamed Graiet, Walid Gaaloul, Nejib Ben Hadj-Alouane:
Genetic-Based Approach for ATS and SLA-aware Web Services Composition. WISE (1) 2015: 369-383 - 2014
- [c62]Imed Abbassi, Mohamed Graiet, Walid Gaaloul, Nejib Ben Hadj-Alouane:
A Formal Approach for Enforcing Transactional Requirements in Web Service Compositions. IEEE SCC 2014: 637-644 - 2013
- [c53]Mohamed Graiet, Imed Abbassi, Lazhar Hamel, Mohamed Tahar Bhiri, Mourad Kmimech, Walid Gaaloul:
Event-B Based Approach for Verifying Dynamic Composite Service Transactional Behavior. ICWS 2013: 251-259 - 2012
- [j10]Mohamed Graiet, Raoudha Maraoui, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul:
Towards an approach of formal verification of mediation protocol based on web services of MDE type. Int. J. Web Inf. Syst. 8(1): 32-54 (2012) - [c48]Lazhar Hamel, Mohamed Graiet, Walid Gaaloul:
Event-B Formalisation of Web Services for Dynamic Composition. SKG 2012: 150-156 - 2011
- [c41]Lazhar Hamel, Mohamed Graiet, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul:
Verifying Composite Service Transactional Behavior with EVENT-B. ECSA 2011: 67-74 - [c37]Soumaya Louhichi, Mohamed Graiet, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul, Eric Cariou:
MDE approach for the generation and verification of SCA model. iiWAS 2011: 317-320 - [c36]Raoudha Maraoui, Amel Mhamdi, Mohamed Graiet, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul, Eric Cariou:
Towards a transformation of composite web service with QoS extension into ACME\Armani. iiWAS 2011: 349-352 - [c35]Lazhar Hamel, Mohamed Graiet, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul:
Verifying Composite Service Transactional Behavior with EVENT-B. SKG 2011: 99-106 - [c34]Soumaya Louhichi, Mohamed Graiet, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul, Eric Cariou:
ATL Transformation for the Generation of SCA Model. SKG 2011: 164-167 - [c33]Wided Ben Abid, Mohamed Graiet, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul, Eric Cariou:
Profile UML2.0 for Specification of the SCA Architectures. SKG 2011: 191-194 - 2010
- [c25]Mohamed Graiet, Raoudha Maraoui, Mourad Kmimech, Mohamed Tahar Bhiri, Walid Gaaloul:
Towards an approach of formal verification of mediation protocol based on web services. iiWAS 2010: 75-82
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint