


Остановите войну!
for scientists:
Abdelwahab Hamou-Lhadj
Wahab Hamou-Lhadj
Person information

- affiliation: Concordia University, Montreal, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j37]Abdelouahed Gherbi, Wahab Hamou-Lhadj:
Guest Editors' introduction to the special section on the 12th system analysis and modelling conference (SAM 2020). Inf. Softw. Technol. 144: 106788 (2022) - [c100]Mohammed A. Shehab, Abdelwahab Hamou-Lhadj, Luay Alawneh:
ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of Projects. SANER 2022: 333-337 - 2021
- [j36]Mohammadali Gharaat, Mohammadreza Sharbaf, Bahman Zamani, Abdelwahab Hamou-Lhadj:
ALBA: a model-driven framework for the automatic generation of android location-based apps. Autom. Softw. Eng. 28(1): 2 (2021) - [j35]Benjamin Vignau
, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj:
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. J. Syst. Archit. 116: 102143 (2021) - [j34]Benjamin Vignau
, Raphaël Khoury
, Sylvain Hallé
, Abdelwahab Hamou-Lhadj
:
The Botnet Simulator: A simulation tool for understanding the interaction between botnets. Softw. Impacts 10: 100173 (2021) - [j33]Mahsa Panahandeh, Mohammad Hamdaqa
, Bahman Zamani
, Abdelwahab Hamou-Lhadj:
MUPPIT: a method for using proper patterns in model transformations. Softw. Syst. Model. 20(5): 1491-1523 (2021) - [c99]Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa
, Haipeng Cai:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. SANER 2021: 411-421 - [i4]Naser Ezzati-Jivan, Quentin Fournier, Michel R. Dagenais, Abdelwahab Hamou-Lhadj:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. CoRR abs/2103.04933 (2021) - [i3]Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa, Haipeng Cai:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. CoRR abs/2103.08083 (2021) - [i2]Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed:
AWSOM-LP: An Effective Log Parsing Technique Using Pattern Recognition and Frequency Analysis. CoRR abs/2110.15473 (2021) - 2020
- [j32]Diana El-Masri, Fábio Petrillo
, Yann-Gaël Guéhéneuc, Abdelwahab Hamou-Lhadj, Anas Bouziane:
A systematic literature review on automated log abstraction techniques. Inf. Softw. Technol. 122: 106276 (2020) - [j31]Haipeng Cai
, Xiaoqin Fu, Abdelwahab Hamou-Lhadj:
A study of run-time behavioral evolution of benign versus malicious apps in android. Inf. Softw. Technol. 122: 106291 (2020) - [j30]Korosh Koochekian Sabor, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj:
Automatic prediction of the severity of bugs using stack traces and categorical features. Inf. Softw. Technol. 123: 106205 (2020) - [j29]Fazilat Hojaji, Bahman Zamani
, Abdelwahab Hamou-Lhadj, Tanja Mayerhofer, Erwan Bousse
:
Lossless compaction of model execution traces. Softw. Syst. Model. 19(1): 199-230 (2020) - [c98]Raphaël Khoury, Benjamin Vignau, Sylvain Hallé, Abdelwahab Hamou-Lhadj, Asma Razgallah:
An Analysis of the Use of CVEs by IoT Malware. FPS 2020: 47-62 - [c97]Naser Ezzati-Jivan, Quentin Fournier, Michel R. Dagenais, Abdelwahab Hamou-Lhadj:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. SCAM 2020: 149-159 - [c96]Rui Zhou, Mohammad Hamdaqa
, Haipeng Cai, Abdelwahab Hamou-Lhadj:
MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging Practices. SANER 2020: 577-581 - [e1]Abdelouahed Gherbi, Wahab Hamou-Lhadj, Ahmed Bali:
SAM '20: 12th System Analysis and Modelling Conference, Virtual Event, Canada, October 19-20, 2020. ACM 2020, ISBN 978-1-4503-8140-6 [contents]
2010 – 2019
- 2019
- [j28]Kobra Khanmohammadi
, Neda Ebrahimi, Abdelwahab Hamou-Lhadj, Raphaël Khoury:
Empirical study of android repackaged applications. Empir. Softw. Eng. 24(6): 3587-3629 (2019) - [j27]Nasir Ali, Haipeng Cai
, Abdelwahab Hamou-Lhadj, Jameleddine Hassine:
Exploiting Parts-of-Speech for effective automated requirements traceability. Inf. Softw. Technol. 106: 126-141 (2019) - [j26]Neda Ebrahimi, Abdelaziz Trabelsi, Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Kobra Khanmohammadi:
An HMM-based approach for automatic detection and classification of duplicate bug reports. Inf. Softw. Technol. 113: 98-109 (2019) - [j25]Fazilat Hojaji, Tanja Mayerhofer, Bahman Zamani
, Abdelwahab Hamou-Lhadj
, Erwan Bousse
:
Model execution tracing: a systematic mapping study. Softw. Syst. Model. 18(6): 3461-3485 (2019) - [c95]Korosh Koochekian Sabor, Abdelwahab Hamou-Lhadj, Abdelaziz Trabelsi, Jameleddine Hassine:
Predicting bug report fields using stack traces and categorical attributes. CASCON 2019: 224-233 - [c94]Omar Badreddin, Wahab Hamou-Lhadj, Swapnil Chauhan:
Susereum: towards a reward structure for sustainable scientific research software. SE4Science@ICSE 2019: 51-54 - [c93]Kobra Khanmohammadi, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas. ISSRE Workshops 2019: 116-117 - [c92]Raphaël Khoury, Abdelwahab Hamou-Lhadj, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo:
TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension. ISSRE Workshops 2019: 406-413 - 2018
- [j24]Jameleddine Hassine, Abdelwahab Hamou-Lhadj, Luay Alawneh
:
A framework for the recovery and visualization of system availability scenarios from execution traces. Inf. Softw. Technol. 96: 78-93 (2018) - [j23]Pejman Salehi, Abdelwahab Hamou-Lhadj, Maria Toeroe, Ferhat Khendek:
A model-driven approach for the generation of configurations for highly available software systems. Innov. Syst. Softw. Eng. 14(4): 273-307 (2018) - [j22]Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Chamseddine Talhi:
Combining heterogeneous anomaly detectors for improved software security. J. Syst. Softw. 137: 415-429 (2018) - [j21]Md. Shariful Islam
, Wael Khreich, Abdelwahab Hamou-Lhadj:
Anomaly Detection Techniques Based on Kappa-Pruned Ensembles. IEEE Trans. Reliab. 67(1): 212-229 (2018) - [c91]Wahab Hamou-Lhadj, Mathieu Nayrolles:
A Project on Software Defect Prevention at Commit-Time: A Success Story of University-Industry Research Collaboration. SER&IP@ICSE 2018: 24-25 - [c90]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj:
Towards a classification of bugs to facilitate software maintainability tasks. SQUADE@ICSE 2018: 25-32 - [c89]Korosh Koochekian Sabor, Mathieu Nayrolles, Abdelaziz Trabelsi, Abdelwahab Hamou-Lhadj:
An Approach for Predicting Bug Report Fields Using a Neural Network Learning Model. ISSRE Workshops 2018: 232-236 - [c88]Omar Badreddin, Gerardo Barraza, Wahab Hamou-Lhadj:
vOCL: A novel approach for UML constraints modeling. MoDELS (Workshops) 2018: 174-186 - [c87]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj:
CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects. MSR 2018: 153-164 - [c86]Md. Shariful Islam, Korosh Koochekian Sabor, Abdelaziz Trabelsi, Wahab Hamou-Lhadj, Luay Alawneh
:
MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection System. QRS 2018: 25-34 - [c85]Omar Badreddin, Wahab Hamou-Lhadj, Vahdat Abdelzad, Rahad Khandoker, Maged Elassar:
Collaborative Software Design and Modeling in Open Source Systems. SAM 2018: 219-228 - [r2]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [i1]Shayan Eskandari, Jeremy Clark, Abdelwahab Hamou-Lhadj:
Buy your coffee with bitcoin: Real-world deployment of a bitcoin point of sale terminal. CoRR abs/1802.04236 (2018) - 2017
- [j20]Wael Khreich, Babak Khosravifar, Abdelwahab Hamou-Lhadj, Chamseddine Talhi:
An anomaly detection system based on variable N-gram features and one-class SVM. Inf. Softw. Technol. 91: 186-197 (2017) - [j19]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj, Sofiène Tahar, Alf Larsson:
A bug reproduction approach based on directed model checking and crash traces. J. Softw. Evol. Process. 29(3) (2017) - [c84]Atli F. Einarsson, Patrekur Patreksson, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj:
SmartHomeML: Towards a Domain-Specific Modeling Language for Creating Smart Home Applications. ICIOT 2017: 82-88 - [c83]Kobra Khanmohammadi, Abdelwahab Hamou-Lhadj:
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security. QRS 2017: 168-175 - [c82]Korosh Koochekian Sabor, Abdelwahab Hamou-Lhadj, Alf Larsson:
DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports. QRS 2017: 240-250 - [c81]Daniel Amyot
, Abdelwahab Hamou-Lhadj, Jameleddine Hassine
:
On the Impact of the SDL Forum Society Conferences on Academic Research. SDL Forum 2017: 30-45 - [c80]Hasan Salim Alkaf, Jameleddine Hassine
, Abdelwahab Hamou-Lhadj, Luay Alawneh
:
An Automated Change Impact Analysis Approach to GRL Models. SDL Forum 2017: 157-172 - 2016
- [j18]Pejman Salehi
, Abdelwahab Hamou-Lhadj, Maria Toeroe, Ferhat Khendek
:
A UML-based domain specific modeling language for service availability management: Design and experience. Comput. Stand. Interfaces 44: 63-83 (2016) - [j17]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Ayse Basar Bener:
Mining trends and patterns of software vulnerabilities. J. Syst. Softw. 117: 218-228 (2016) - [j16]Luay Alawneh
, Abdelwahab Hamou-Lhadj, Jameleddine Hassine
:
Segmenting large traces of inter-process communication with a focus on high performance computing systems. J. Syst. Softw. 120: 1-16 (2016) - [j15]Andriy V. Miranskyy, Abdelwahab Hamou-Lhadj, Enzo Cialini, Alf Larsson:
Operational-Log Analysis for Big Data Systems: Challenges and Solutions. IEEE Softw. 33(2): 52-59 (2016) - [c79]Neda Ebrahimi Koopaei, Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Mohammad Hamdaqa
:
An effective method for detecting duplicate crash reports using crash traces and hidden Markov models. CASCON 2016: 75-84 - [c78]Korosh Koochekian Sabor, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj:
Automatic prediction of the severity of bugs using stack traces. CASCON 2016: 96-105 - [c77]Hanieh Alipour, Yan Liu, Abdelwahab Hamou-Lhadj, Ian Gorton:
Model driven performance simulation of cloud provisioned Hadoop mapreduce applications. MiSE@ICSE 2016: 48-54 - [c76]Raphaël Khoury, Lei Shi, Abdelwahab Hamou-Lhadj:
Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle. ICSME 2016: 478-482 - [c75]Omar Badreddin, Maged Elaasar, Wahab Hamou-Lhadj:
A Controlled Experiment for Evaluating the Comprehensibility of UML Action Languages. MODELSWARD 2016: 52-64 - [c74]Shayan Eskandari
, Jeremy Clark, Abdelwahab Hamou-Lhadj:
Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 382-389 - [c73]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj:
BUMPER: A Tool for Coping with Natural Language Searches of Millions of Bugs and Fixes. SANER 2016: 649-652 - 2015
- [j14]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Abdelwahab Hamou-Lhadj:
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System. IEEE Trans. Reliab. 64(1): 269-283 (2015) - [c72]Neda Ebrahimi Koopaei, Abdelwahab Hamou-Lhadj:
CrashAutomata: an approach for the detection of duplicate crash reports based on generalizable automata. CASCON 2015: 201-210 - [c71]Kobra Khanmohammadi, Mohammad Reza Rejali, Abdelwahab Hamou-Lhadj:
Understanding the Service Life Cycle of Android Apps: An Exploratory Study. SPSM@CCS 2015: 81-86 - [c70]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Stéphane Gagnon
:
A trace abstraction approach for host-based anomaly detection. CISDA 2015: 1-8 - [c69]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Nazim H. Madhavji, Mechelle Gittens:
Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces. GTSE@ICSE 2015: 59-68 - [c68]Abdou Maiga, Abdelwahab Hamou-Lhadj, Mathieu Nayrolles, Korosh Koochekian Sabor, Alf Larsson:
An empirical study on the handling of crash reports in a large software company: An experience report. ICSME 2015: 342-351 - [c67]Mathieu Nayrolles, Eric Beaudry, Naouel Moha, Petko Valtchev
, Abdelwahab Hamou-Lhadj:
Towards Quality-Driven SOA Systems Refactoring Through Planning. MCETECH 2015: 269-284 - [c66]Omar Bahy Badreddin, Arnon Sturm, Abdelwahab Hamou-Lhadj, Timothy Lethbridge, Waylon Dixon, Ryan Simmons:
The Effects of Education on Students' Perception of Modeling in Software Engineering. HuFaMo@MoDELS 2015: 39-46 - [c65]Amirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj:
An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques. QRS 2015: 109-118 - [c64]Maroua Ben Attia
, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Babak Khosravifar, Vincent Turpaud, Mario Couture:
On-device anomaly detection for resource-limited systems. SAC 2015: 548-554 - [c63]Jameleddine Hassine
, Abdelwahab Hamou-Lhadj:
Describing Early Security Requirements Using Use Case Maps. SDL Forum 2015: 202-217 - [c62]Manel Abdellatif, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Michel R. Dagenais:
On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis. SRDS Workshop 2015: 42-46 - [c61]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj, Sofiène Tahar, Alf Larsson:
JCHARMING: A bug reproduction approach using crash traces and directed model checking. SANER 2015: 101-110 - [c60]Luay Alawneh
, Abdelwahab Hamou-Lhadj, Jameleddine Hassine
:
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks. SANER 2015: 111-120 - 2014
- [j13]Alireza Shameli Sendi, Mohamed Cheriet, Abdelwahab Hamou-Lhadj:
Taxonomy of intrusion risk assessment and response system. Comput. Secur. 45: 1-16 (2014) - [j12]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Nazim H. Madhavji, Mechelle Gittens:
An empirical study on the use of mutant traces for diagnosis of faults in deployed systems. J. Syst. Softw. 90: 29-44 (2014) - [c59]Hanieh Alipour, Yan Liu, Abdelwahab Hamou-Lhadj:
Analyzing auto-scaling issues in cloud environments. CASCON 2014: 75-89 - [c58]Luay Alawneh
, Abdelwahab Hamou-Lhadj, Syed Shariyar Murtaza, Yan Liu:
A contextual approach for effective recovery of inter-process communication patterns from HPC traces. CSMR-WCRE 2014: 274-282 - [c57]Salman Hoseini, Abdelwahab Hamou-Lhadj, Patrick Desrosiers
, Martin Tapp:
Software feature location in practice: debugging aircraft simulation systems. ICSE Companion 2014: 225-234 - [c56]Jameleddine Hassine, Abdelwahab Hamou-Lhadj:
Toward a UCM-Based Approach for Recovering System Availability Requirements from Execution Traces. SAM 2014: 48-63 - [c55]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Wael Khreich, Mario Couture:
Total ADS: Automated Software Anomaly Detection System. SCAM 2014: 83-88 - [r1]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining 2014: 894-904 - 2013
- [j11]Ali Kanso, Ferhat Khendek
, Maria Toeroe, Abdelwahab Hamou-Lhadj:
Automatic configuration generation for service high availability with load balancing. Concurr. Comput. Pract. Exp. 25(2): 265-287 (2013) - [j10]Heidar Pirzadeh, Sara Shanian, Abdelwahab Hamou-Lhadj, Luay Alawneh
, Arya Shafiee:
Stratified sampling of execution traces: Execution phases serving as strata. Sci. Comput. Program. 78(8): 1099-1118 (2013) - [c54]Alf Larsson, Abdelwahab Hamou-Lhadj:
Mining Telecom System Logs to Facilitate Debugging Tasks. ICSM 2013: 536-539 - [c53]Shayan Eskandari
, Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Mario Couture:
Monitoring system calls for anomaly detection in modern operating systems. ISSRE (Supplemental Proceedings) 2013: 19-20 - [c52]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Mario Couture:
A host-based anomaly detection approach by representing system calls as states of kernel modules. ISSRE 2013: 431-440 - [c51]Abdelwahab Hamou-Lhadj, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphaël Khoury:
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction. RACS 2013: 328-335 - [c50]Jameleddine Hassine
, Abdelwahab Hamou-Lhadj:
Towards the Generation of AMF Configurations from Use Case Maps Based Availability Requirements. SDL Forum 2013: 36-53 - [p1]Abdelwahab Hamou-Lhadj:
The Role of Software Tracing in Software Maintenance. Modeling Approaches and Algorithms for Advanced Computer Applications 2013: 5 - 2012
- [j9]Abdelwahab Hamou-Lhadj, Timothy C. Lethbridge
:
A metamodel for the compact but lossless exchange of execution traces. Softw. Syst. Model. 11(1): 77-98 (2012) - [c49]Maher Idris, Ali Mehrabian, Abdelwahab Hamou-Lhadj, Richard Khoury:
Pattern-Based Trace Correlation Technique to Compare Software Versions. AIS 2012: 159-166 - [c48]Raphaël Khoury, Abdelwahab Hamou-Lhadj, Mario Couture:
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security. CISDA 2012: 1-7 - [c47]Syed Shariyar Murtaza, Afroza Sultana, Abdelwahab Hamou-Lhadj, Mario Couture:
On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies. CSMR 2012: 127-136 - [c46]Afroza Sultana, Abdelwahab Hamou-Lhadj, Mario Couture:
An improved Hidden Markov Model for anomaly detection using frequent common patterns. ICC 2012: 1113-1117 - [c45]Luay Alawneh
, Abdelwahab Hamou-Lhadj:
Identifying computational phases from inter-process communication traces of HPC applications. ICPC 2012: 133-142 - 2011
- [j8]Luay Alawneh
, Abdelwahab Hamou-Lhadj:
An exchange format for representing dynamic information generated from High Performance Computing applications. Future Gener. Comput. Syst. 27(4): 381-394 (2011) - [j7]Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj:
An approach based on citation analysis to support effective handling of regulatory compliance. Future Gener. Comput. Syst. 27(4): 395-410 (2011) - [j6]Hossein Mehrfard, Abdelwahab Hamou-Lhadj:
The Impact of Regulatory Compliance on Agile Software Processes with a Focus on the FDA Guidelines for Medical Device Software. Int. J. Inf. Syst. Model. Des. 2(2): 67-81 (2011) - [c44]Pejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:
AMF configurations: Checking for service protection using heuristics. CNSM 2011: 1-8 - [c43]Luay Alawneh
, Abdelwahab Hamou-Lhadj:
Pattern Recognition Techniques Applied to the Abstraction of Traces of Inter-Process Communication. CSMR 2011: 211-220 - [c42]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj:
A Novel Approach Based on Gestalt Psychology for Abstracting the Content of Large Execution Traces for Program Comprehension. ICECCS 2011: 221-230 - [c41]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj:
A software behaviour analysis framework based on the human perception systems. ICSE 2011: 948-951 - [c40]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj, Mohak Shah:
Exploiting text mining techniques in the analysis of execution traces. ICSM 2011: 223-232 - [c39]Luay Alawneh
, Abdelwahab Hamou-Lhadj:
MTF: A Scalable Exchange Format for Traces of High Performance Computing Systems. ICPC 2011: 181-184 - [c38]Heidar Pirzadeh, Sara Shanian, Abdelwahab Hamou-Lhadj, Ali Mehrabian:
The Concept of Stratified Sampling of Execution Traces. ICPC 2011: 225-226 - 2010
- [j5]Abdelwahab Hamou-Lhadj, Timothy C. Lethbridge
:
Understanding the complexity embedded in large routine call traces with a focus on program comprehension tasks. IET Softw. 4(2): 161-177 (2010) - [j4]Heidar Pirzadeh, Danny Dubé, Abdelwahab Hamou-Lhadj:
An Extended Proof-Carrying Code Framework for Security Enforcement. Trans. Comput. Sci. 11: 249-269 (2010) - [c37]Pejman Salehi, Abdelwahab Hamou-Lhadj, Pietro Colombo
, Ferhat Khendek
, Maria Toeroe:
A UML-Based Domain Specific Modeling Language for the Availability Management Framework. HASE 2010: 35-44 - [c36]Ali Kanso, Ferhat Khendek
, Abdelwahab Hamou-Lhadj, Maria Toeroe:
Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing. NOTERE 2010: 33-40 - [c35]Pejman Salehi, Pietro Colombo
, Abdelwahab Hamou-Lhadj, Ferhat Khendek
:
A Model Driven Approach for AMF Configuration Generation. SAM 2010: 124-143 - [c34]Zohreh Sharafi, Parisa Mirshams, Abdelwahab Hamou-Lhadj, Constantinos Constantinides:
Extending the UML Metamodel to Provide Support for Crosscutting Concerns. SERA 2010: 149-157 - [c33]Heidar Pirzadeh, Akanksha Agarwal, Abdelwahab Hamou-Lhadj:
An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension. SERA 2010: 207-214 - [c32]Hossein Mehrfard, Heidar Pirzadeh, Abdelwahab Hamou-Lhadj:
Investigating the Capability of Agile Processes to Support Life-Science Regulations: The Case of XP and FDA Regulations with a Focus on Human Factor Requirements. SERA (selected papers) 2010: 241-255 - [c31]Abdelwahab Hamou-Lhadj, David Röthlisberger, Andy Zaidman
, Orla Greevy:
Workshop on Program Comprehension through Dynamic Analysis (PCODA10). WCRE 2010: 279-280
2000 – 2009
- 2009
- [j3]Abhishek Rohatgi, Abdelwahab Hamou-Lhadj, Juergen Rilling:
Approach for solving the feature location problem by measuring the component modification impact. IET Softw. 3(4): 292-311 (2009) - [c30]Ali Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj, Ferhat Khendek
:
Generating AMF Configurations from Software Vendor Constraints and User Requirements. ARES 2009: 454-461 - [c29]Chiragkumar Patel, Abdelwahab Hamou-Lhadj, Juergen Rilling:
Software Clustering Using Dynamic Analysis and Static Dependencies. CSMR 2009: 27-36 - [c28]Luay Alawneh
, Abdelwahab Hamou-Lhadj:
Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel. FGIT-ASEA 2009: 253-263 - [c27]