Остановите войну!
for scientists:
default search action
Marouane Kessentini
- > Home > Persons > Marouane Kessentini
Publications
- 2023
- [c73]Wajdi Aljedaani, Mohammed Alkahtani, Stephanie Ludi, Mohamed Wiem Mkaouer, Marcelo Medeiros Eler, Marouane Kessentini, Ali Ouni:
The State of Accessibility in Blackboard: Survey and User Reviews Case Study. W4A 2023: 84-95 - 2022
- [j60]Makram Soui, Mabrouka Chouchane, Narjes Bessghaier, Mohamed Wiem Mkaouer, Marouane Kessentini:
On the Impact of Aesthetic Defects on the Maintainability of Mobile Graphical User Interfaces: An Empirical Study. Inf. Syst. Frontiers 24(2): 659-676 (2022) - 2021
- [j52]Eman Abdullah AlOmar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Marouane Kessentini:
How we refactor and how we document it? On the use of supervised machine learning algorithms to classify refactoring documentation. Expert Syst. Appl. 167: 114176 (2021) - [j51]Rafi Almhana, Marouane Kessentini, Wiem Mkaouer:
Method-level bug localization using hybrid multi-objective search. Inf. Softw. Technol. 131: 106474 (2021) - [c70]Eman Abdullah AlOmar, Hussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini:
Refactoring Practices in the Context of Modern Code Review: An Industrial Case Study at Xerox. ICSE (SEIP) 2021: 348-357 - [i5]Eman Abdullah AlOmar, Hussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini:
Refactoring Practices in the Context of Modern Code Review: An Industrial Case Study at Xerox. CoRR abs/2102.05201 (2021) - 2020
- [j42]Makram Soui, Mabrouka Chouchane, Mohamed Wiem Mkaouer, Marouane Kessentini, Khaled Ghédira:
Assessing the quality of mobile graphical user interfaces using multi-objective optimization. Soft Comput. 24(10): 7685-7714 (2020) - [j41]Vahid Alizadeh, Marouane Kessentini, Mohamed Wiem Mkaouer, Mel Ocinneide, Ali Ouni, Yuanfang Cai:
An Interactive and Dynamic Search-Based Approach to Software Refactoring Recommendations. IEEE Trans. Software Eng. 46(9): 932-961 (2020) - [i4]Mohamed Wiem Mkaouer, Marouane Kessentini, Adnan Shaout, Patrice Koligheu, Slim Bechikh, Kalyanmoy Deb, Ali Ouni:
Many-Objective Software Remodularization using NSGA-III. CoRR abs/2005.06510 (2020) - [i2]Eman Abdullah AlOmar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Marouane Kessentini:
How We Refactor and How We Document it? On the Use of Supervised Machine Learning Algorithms to Classify Refactoring Documentation. CoRR abs/2010.13890 (2020) - 2019
- [c60]Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini:
On the Impact of Refactoring on the Relationship between Quality Attributes and Design Metrics. ESEM 2019: 1-11 - [i1]Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini:
Do Design Metrics Capture Developers Perception of Quality? An Empirical Study on Self-Affirmed Refactoring Activities. CoRR abs/1907.04797 (2019) - 2018
- [j33]Paul W. McBurney, Siyuan Jiang, Marouane Kessentini, Nicholas A. Kraft, Ameer Armaly, Mohamed Wiem Mkaouer, Collin McMillan:
Towards Prioritizing Documentation Effort. IEEE Trans. Software Eng. 44(9): 897-913 (2018) - 2017
- [j30]Mohamed Wiem Mkaouer, Marouane Kessentini, Mel Ó Cinnéide, Shinpei Hayashi, Kalyanmoy Deb:
A robust multi-objective approach to balance severity and importance of refactoring opportunities. Empir. Softw. Eng. 22(2): 894-927 (2017) - [c53]Ian Shoenberger, Mohamed Wiem Mkaouer, Marouane Kessentini:
On the Use of Smelly Examples to Detect Code Smells in JavaScript. EvoApplications (2) 2017: 20-34 - 2016
- [j21]Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, Mel Ó Cinnéide, Kalyanmoy Deb:
On the use of many quality attributes for software refactoring: a many-objective search-based software engineering approach. Empir. Softw. Eng. 21(6): 2503-2545 (2016) - [c40]Rafi Almhana, Wiem Mkaouer, Marouane Kessentini, Ali Ouni:
Recommending relevant classes for bug reports using multi-objective search. ASE 2016: 286-295 - 2015
- [j12]Wiem Mkaouer, Marouane Kessentini, Adnan Shaout, Patrice Koligheu, Slim Bechikh, Kalyanmoy Deb, Ali Ouni:
Many-Objective Software Remodularization Using NSGA-III. ACM Trans. Softw. Eng. Methodol. 24(3): 17:1-17:45 (2015) - 2014
- [j11]Mohamed Wiem Mkaouer, Marouane Kessentini:
Model Transformation Using Multiobjective Optimization. Adv. Comput. 92: 161-202 (2014) - [c36]Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, Mel Ó Cinnéide, Kalyanmoy Deb:
Software refactoring under uncertainty: a robust multi-objective approach. GECCO (Companion) 2014: 187-188 - [c35]Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, Kalyanmoy Deb, Mel Ó Cinnéide:
High dimensional search-based software engineering: finding tradeoffs among 15 objectives for automating software refactoring using NSGA-III. GECCO 2014: 1263-1270 - [c34]Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, Kalyanmoy Deb, Mel Ó Cinnéide:
Recommendation system for software refactoring using innovization and interactive dynamic optimization. ASE 2014: 331-336 - [c31]Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, Mel Ó Cinnéide:
A Robust Multi-objective Approach for Software Refactoring under Uncertainty. SSBSE 2014: 168-183 - 2013
- [c24]Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, Daniel R. Tauritz:
Preference-based multi-objective software modelling. CMSBSE@ICSE 2013: 61-66
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-07 03:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint