default search action
Abdeslam En-Nouaary
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j20]Abdeladim Sadiki, Jamal Bentahar, Rachida Dssouli, Abdeslam En-Nouaary, Hadi Otrok:
Deep reinforcement learning for the computation offloading in MIMO-based Edge Computing. Ad Hoc Networks 141: 103080 (2023) - 2021
- [j19]Adil Iguider, Oussama Elissati, Abdeslam En-Nouaary, Mouhcine Chami:
Shortest Path Method for Hardware/Software Partitioning Problems. Int. J. Inf. Syst. Soc. Chang. 12(3): 40-57 (2021) - 2020
- [j18]Adil Iguider, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami, Abdeslam En-Nouaary:
Heuristic algorithms for multi-criteria hardware/software partitioning in embedded systems codesign. Comput. Electr. Eng. 84: 106610 (2020) - 2019
- [j17]Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary:
Model Checking of WebRTC Peer to Peer System. Comput. Inf. Sci. 12(4): 56-71 (2019) - [j16]Adil Iguider, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami, Abdeslam En-Nouaary:
GO Game Inspired Algorithm for Hardware Software Partitioning in Multiprocessor Embedded Systems. Comput. Inf. Sci. 12(4): 111-122 (2019) - [j15]Soufiane Zahid, Abdeslam En-Nouaary, Slimane Bah:
Practical Model Checking of a Home Area Network System: Case Study. J. Comput. Inf. Technol. 27(2): 1-16 (2019) - 2017
- [j14]Driss Allaki, Mohamed Dahchour, Abdeslam En-Nouaary:
Managing Inconsistencies in UML Models: A Systematic Literature Review. J. Softw. 12(6): 454-471 (2017) - [j13]Youssef Mifrah, Abdeslam En-Nouaary, Mohamed Dahchour:
Towards a Framework for the Analysis and Evaluation of Computational Trust Models in Multi-agent Systems. J. Softw. 12(11): 892-905 (2017) - 2016
- [j12]Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:
Liveness and Reachability Analysis of BPMN Process Models. J. Comput. Inf. Technol. 24(2): 195-207 (2016) - 2015
- [j11]Driss Allaki, Mohamed Dahchour, Abdeslam En-Nouaary:
A New Taxonomy of Inconsistencies in UML Models : with their Detection Methods for Better MDE. Int. J. Comput. Sci. Appl. 12(1): 48-65 (2015) - [j10]Abdelmouttalib Maqil, Abdeslam En-Nouaary, Hicham Bensaid:
Towards a unified approach for modeling and analysis of real-time Embedded systems using MARTE/UML. Int. J. Comput. Sci. Appl. 12(1): 117-126 (2015) - [j9]Mostafa Bellafkih, Abdeslam En-Nouaary:
Guest Editorial. Int. J. Comput. Sci. Appl. 12(1): iv (2015) - 2013
- [j8]Abdeslam En-Nouaary:
A test purpose-based approach for testing timed input output automata. Softw. Test. Verification Reliab. 23(1): 53-76 (2013) - 2009
- [j7]Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal:
MPLS security: an approach for unicast and multicast environments. Ann. des Télécommunications 64(5-6): 391-400 (2009) - [j6]Sahel Alouneh, Anjali Agarwal, Abdeslam En-Nouaary:
A novel path protection scheme for MPLS networks using multi-path routing. Comput. Networks 53(9): 1530-1545 (2009) - 2008
- [j5]Abdeslam En-Nouaary:
A scalable method for testing real-time systems. Softw. Qual. J. 16(1): 3-22 (2008) - 2007
- [j4]Abdeslam En-Nouaary:
Test selection criteria for real-time systems modeled as timed input-output automata. Int. J. Web Inf. Syst. 3(4): 279-292 (2007) - [j3]Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal:
A Multiple LSPs Approach to Secure Data in MPLS Networks. J. Networks 2(4): 51-58 (2007) - 2002
- [j2]Abdeslam En-Nouaary, Rachida Dssouli, Ferhat Khendek:
Timed Wp-Method: Testing Real-Time Systems. IEEE Trans. Software Eng. 28(11): 1023-1038 (2002) - 1999
- [j1]Rachida Dssouli, Kassem Saleh, El Mostapha Aboulhamid, Abdeslam En-Nouaary, C. Bourhfir:
Test development for communication protocols: towards automation. Comput. Networks 31(17): 1835-1872 (1999)
Conference and Workshop Papers
- 2023
- [c40]Hassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour:
Dealing with Anti-Patterns When Migrating from Monoliths to Microservices: Challenges and Research Directions. CloudTech 2023: 1-8 - [c39]Khalid Zirari, Hamza Kamal Idrissi, Ahmed El-Yahyaoui, Hicham Bensaid, Abdeslam En-Nouaary:
Enhancing Ransomware Detection: A Registry Analysis-Based Approach. FiCloud 2023: 65-70 - [c38]Kaoutar Boussaoud, Meryeme Ayache, Abdeslam En-Nouaary:
A Multi-Agent Reinforcement Learning Approach for Congestion Control in network based-SDN. FiCloud 2023: 250-255 - 2022
- [c37]Nadia Kassri, Abdeslam Ennouaary, Slimane Bah:
Lightweight Hybrid Deep Learning Scheme for Automatic Modulation Classification in Cognitive Radio Networks. FiCloud 2022: 113-118 - [c36]Lahcen Abidar, Ikram El Asri, Dounia Zaidouni, Abdeslam Ennouaary:
A Data Mining System for Enhancing Profit Growth based on RFM and CLV. FiCloud 2022: 247-253 - [c35]Hassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour:
A Graph-based Solution to Deal with Cyclic Dependencies in Microservices Architecture. FiCloud 2022: 254-259 - 2021
- [c34]Hassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour:
Following Domain Driven Design principles for Microservices decomposition: is it enough? AICCSA 2021: 1-8 - 2020
- [c33]Lahcen Abidar, Dounia Zaidouni, Abdeslam Ennouaary:
Customer Segmentation With Machine Learning: New Strategy For Targeted Actions. SITA 2020: 36:1-36:6 - 2019
- [c32]Adil Iguider, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami, Abdeslam En-Nouaary:
Embedded systems hardware software partitioning using minimax algorithm. SCA 2019: 31:1-31:6 - 2018
- [c31]Asma El Hamzaoui, Abdeslam En-Nouaary, Hicham Bensaid:
On Formal Modeling and Validation of Signaling Protocols for Web Real-Time Communications using SDL. ANT/SEIT 2018: 1005-1012 - [c30]Driss Allaki, Mohamed Dahchour, Abdeslam En-Nouaary:
An AHP-Based Method to Fix Inconsistencies in UML Collaborative Modeling. CIST 2018: 1-5 - [c29]Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:
Short Paper: BPMN Process Analysis: A Formal Validation and Verification Eclipse Plugin for BPMN Process Models. NETYS 2018: 100-104 - [c28]Soufiane Zahid, Abdeslam En-Nouaary, Slimane Bah:
An SDL to Discrete-Time PROMELA Transformation of Home Area Network model. SITA 2018: 14:1-14:5 - [c27]Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary:
A New Signaling Topology for Multiparty Web Real-time Video Conference Networks. SITA 2018: 17:1-17:6 - 2017
- [c26]Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:
DataFlow Analysis in BPMN Models. ICEIS (2) 2017: 229-237 - [c25]Zahid Soufiane, Abdeslam En-Nouaary, Slimane Bah:
SDL Modeling and Validation of Home Area Network in Smart Grid Systems. SCA 2017: 28-43 - [c24]Adil Iguider, Mouhcine Chami, Oussama Elissati, Abdeslam En-Nouaary:
Embedded Systems HW/SW Partitioning Based on Lagrangian Relaxation Method. SCA 2017: 149-160 - 2016
- [c23]Driss Allaki, Mohamed Dahchour, Abdeslam En-Nouaary:
Detecting and fixing UML model inconsistencies using constraints. CIST 2016: 295-299 - [c22]Driss Allaki, Mohamed Dahchour, Abdeslam En-Nouaary:
A Constraint-based Approach for Checking Vertical Inconsistencies between Class and Sequence UML Diagrams. ICEIS (1) 2016: 441-447 - [c21]Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary:
A Formal Model for WebRTC Signaling Using SDL. NETYS 2016: 202-208 - [c20]Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:
Verification of Common Business Rules in BPMN Process Models. NETYS 2016: 334-339 - [c19]Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:
Analysis of common business rules in BPMN process models using business rule language. SITA 2016: 1-6 - [c18]Youssef Mifrah, Abdeslam En-Nouaary, Mohamed Dahchour:
Toward a Practical Method for Introducing and Evaluating Trust Learning Models in Open Multi-agent Systems. UNet 2016: 573-586 - 2015
- [c17]Mifrah Youssef, Abdeslam En-Nouaary, Mohamed Dahchour:
A JADE based testbed for evaluating computational trust models. SITA 2015: 1-7 - [c16]Youssef Mifrah, Abdeslam En-Nouaary, Mohamed Dahchour:
An Abstract Framework for Introducing Computational Trust Models in JADE-Based Multi-Agent Systems. UNet 2015: 513-523 - 2014
- [c15]Mostafa Bellafkih, Abdeslam En-Nouaary:
Preface. SITA 2014: 1 - 2012
- [c14]Ayoub Sabraoui, Abdeslam Ennouaary, Ismaïl Khriss, Mohammed El Koutbi:
An MDA-Based Approach for WS Composition Using UML Scenarios. ITNG 2012: 306-313 - 2010
- [c13]Abdeslam En-Nouaary, Mehdi Akiki:
An Integrated Framework for Automated Firewall Testing and Validation. ITNG 2010: 768-773 - 2009
- [c12]Omar Marey, Jamal Bentahar, Abdeslam En-Nouaary:
On the Measurement of Negotiation Dialogue Games. SoMeT 2009: 223-244 - 2008
- [c11]Sahel Alouneh, Anjali Agarwal, Abdeslam En-Nouaary:
A New Approach for Security in MPLS Multicast Networks. ICDCIT 2008: 71-82 - [c10]Abdeslam En-Nouaary, Abdelwahab Hamou-Lhadj:
A Boundary Checking Technique for Testing Real-Time Systems Modeled as Timed Input Output Automata (Short Paper). QSIC 2008: 209-215 - 2007
- [c9]Sahel Alouneh, Anjali Agarwal, Abdeslam En-Nouaary:
A Multiple Tree Approach for Fault Tolerance in MPLS Networks. ICDCIT 2007: 197-202 - [c8]Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal:
Securing MPLS Networks with Multi-path Routing. ITNG 2007: 809-814 - [c7]Abdelghani Benharref, Rachida Dssouli, Mohamed Adel Serhani, Abdeslam En-Nouaary, Roch H. Glitho:
New Approach for EFSM-Based Passive Testing of Web Services. TestCom/FATES 2007: 13-27 - 2003
- [c6]Abdeslam En-Nouaary, Rachida Dssouli:
A Guided Method for Testing Timed Input Output Automata. TestCom 2003: 211-225 - 2000
- [c5]Ahmed Khoumsi, Mehdi Akalay, Rachida Dssouli, Abdeslam En-Nouaary, Louis Granger:
An Approach for Testing Real Time Protocol Entities. TestCom 2000: 281-300 - [c4]Abdeslam En-Nouaary, Ferhat Khendek, Rachida Dssouli:
Testing embedded real-time systems. RTCSA 2000: 417-424 - 1999
- [c3]Abdeslam En-Nouaary, Ferhat Khendek, Rachida Dssouli:
Fault Coverage in Testing Real-Time Systems. RTCSA 1999: 150-157 - [c2]Abdeslam En-Nouaary, Rachida Dssouli, Ferhat Khendek:
From timed scenarios to SDL: specification, implementation and testing of real-time systems. SDL Forum 1999: 67- - 1998
- [c1]Abdeslam En-Nouaary, Rachida Dssouli, Ferhat Khendek, Abdelkader Elqortobi:
Timed Test Cases Generation Based on State Characterization Technique. RTSS 1998: 220-229
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint