


Остановите войну!
for scientists:


default search action
Abdelwahab Hamou-Lhadj
Wahab Hamou-Lhadj
Person information

- affiliation: Concordia University, Montreal, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j40]Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj
, Xiapu Luo
, Haipeng Cai
:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. IEEE Trans. Software Eng. 49(4): 1983-2005 (2023) - [c105]Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Naser Ezzati-Jivan:
Towards a Classification of Log Parsing Errors. ICPC 2023: 84-88 - 2022
- [j39]Maryam Mehrabi, Bahman Zamani
, Abdelwahab Hamou-Lhadj
:
HealMA: a model-driven framework for automatic generation of IoT-based Android health monitoring applications. Autom. Softw. Eng. 29(2): 56 (2022) - [j38]Keyur Patel, João Guilherme Faccin, Abdelwahab Hamou-Lhadj
, Ingrid Nunes:
The sense of logging in the Linux kernel. Empir. Softw. Eng. 27(6): 153 (2022) - [j37]Abdelouahed Gherbi, Wahab Hamou-Lhadj:
Guest Editors' introduction to the special section on the 12th system analysis and modelling conference (SAM 2020). Inf. Softw. Technol. 144: 106788 (2022) - [j36]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Locating and categorizing inefficient communication patterns in HPC systems using inter-process communication traces. J. Syst. Softw. 194: 111494 (2022) - [c104]Komal Panchal, Fatima Ait-Mahammed, Abdelwahab Hamou-Lhadj
, Zhongwen Zhu, Salman Memon, Alka Isac, Pragash Krishnamoorthy:
A Study on the Use of Runtime Files in Handling Crash Reports in a Large Telecom Company. FNWF 2022: 98-103 - [c103]Issam Sedki, Abdelwahab Hamou-Lhadj
, Otmane Aït Mohamed, Mohammed A. Shehab:
An Effective Approach for Parsing Large Log Files. ICSME 2022: 1-12 - [c102]Madeline Janecek, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj
:
Performance anomaly detection through sequence alignment of system-level traces. ICPC 2022: 264-274 - [c101]Mohammed A. Shehab, Abdelwahab Hamou-Lhadj
, Luay Alawneh:
ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of Projects. SANER 2022: 333-337 - [i5]Keyur Patel, João Guilherme Faccin, Abdelwahab Hamou-Lhadj, Ingrid Nunes:
The Sense of Logging in the Linux Kernel. CoRR abs/2208.06640 (2022) - 2021
- [j35]Mohammadali Gharaat, Mohammadreza Sharbaf, Bahman Zamani, Abdelwahab Hamou-Lhadj
:
ALBA: a model-driven framework for the automatic generation of android location-based apps. Autom. Softw. Eng. 28(1): 2 (2021) - [j34]Benjamin Vignau
, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj
:
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. J. Syst. Archit. 116: 102143 (2021) - [j33]Benjamin Vignau
, Raphaël Khoury
, Sylvain Hallé
, Abdelwahab Hamou-Lhadj
:
The Botnet Simulator: A simulation tool for understanding the interaction between botnets. Softw. Impacts 10: 100173 (2021) - [j32]Mahsa Panahandeh, Mohammad Hamdaqa
, Bahman Zamani
, Abdelwahab Hamou-Lhadj
:
MUPPIT: a method for using proper patterns in model transformations. Softw. Syst. Model. 20(5): 1491-1523 (2021) - [c100]Md. Shariful Islam, Abdelwahab Hamou-Lhadj
, Korosh Koochekian Sabor, Mohammad Hamdaqa
, Haipeng Cai
:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. SANER 2021: 411-421 - [i4]Naser Ezzati-Jivan, Quentin Fournier, Michel R. Dagenais, Abdelwahab Hamou-Lhadj:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. CoRR abs/2103.04933 (2021) - [i3]Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa, Haipeng Cai:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. CoRR abs/2103.08083 (2021) - [i2]Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed:
AWSOM-LP: An Effective Log Parsing Technique Using Pattern Recognition and Frequency Analysis. CoRR abs/2110.15473 (2021) - 2020
- [j31]Diana El-Masri, Fábio Petrillo
, Yann-Gaël Guéhéneuc, Abdelwahab Hamou-Lhadj
, Anas Bouziane:
A systematic literature review on automated log abstraction techniques. Inf. Softw. Technol. 122: 106276 (2020) - [j30]Haipeng Cai
, Xiaoqin Fu, Abdelwahab Hamou-Lhadj
:
A study of run-time behavioral evolution of benign versus malicious apps in android. Inf. Softw. Technol. 122: 106291 (2020) - [j29]Korosh Koochekian Sabor, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj
:
Automatic prediction of the severity of bugs using stack traces and categorical features. Inf. Softw. Technol. 123: 106205 (2020) - [j28]Fazilat Hojaji, Bahman Zamani
, Abdelwahab Hamou-Lhadj
, Tanja Mayerhofer, Erwan Bousse
:
Lossless compaction of model execution traces. Softw. Syst. Model. 19(1): 199-230 (2020) - [c99]Raphaël Khoury, Benjamin Vignau, Sylvain Hallé, Abdelwahab Hamou-Lhadj
, Asma Razgallah:
An Analysis of the Use of CVEs by IoT Malware. FPS 2020: 47-62 - [c98]Naser Ezzati-Jivan, Quentin Fournier, Michel R. Dagenais, Abdelwahab Hamou-Lhadj
:
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing. SCAM 2020: 149-159 - [c97]Rui Zhou, Mohammad Hamdaqa
, Haipeng Cai
, Abdelwahab Hamou-Lhadj
:
MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging Practices. SANER 2020: 577-581 - [e1]Abdelouahed Gherbi, Wahab Hamou-Lhadj, Ahmed Bali:
SAM '20: 12th System Analysis and Modelling Conference, Virtual Event, Canada, October 19-20, 2020. ACM 2020, ISBN 978-1-4503-8140-6 [contents]
2010 – 2019
- 2019
- [j27]Kobra Khanmohammadi
, Neda Ebrahimi, Abdelwahab Hamou-Lhadj
, Raphaël Khoury:
Empirical study of android repackaged applications. Empir. Softw. Eng. 24(6): 3587-3629 (2019) - [j26]Nasir Ali, Haipeng Cai
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine:
Exploiting Parts-of-Speech for effective automated requirements traceability. Inf. Softw. Technol. 106: 126-141 (2019) - [j25]Neda Ebrahimi, Abdelaziz Trabelsi, Md. Shariful Islam, Abdelwahab Hamou-Lhadj
, Kobra Khanmohammadi:
An HMM-based approach for automatic detection and classification of duplicate bug reports. Inf. Softw. Technol. 113: 98-109 (2019) - [j24]Fazilat Hojaji, Tanja Mayerhofer, Bahman Zamani
, Abdelwahab Hamou-Lhadj
, Erwan Bousse
:
Model execution tracing: a systematic mapping study. Softw. Syst. Model. 18(6): 3461-3485 (2019) - [c96]Korosh Koochekian Sabor, Abdelwahab Hamou-Lhadj, Abdelaziz Trabelsi, Jameleddine Hassine:
Predicting bug report fields using stack traces and categorical attributes. CASCON 2019: 224-233 - [c95]Omar Badreddin, Wahab Hamou-Lhadj, Swapnil Chauhan:
Susereum: towards a reward structure for sustainable scientific research software. SE4Science@ICSE 2019: 51-54 - [c94]Kobra Khanmohammadi, Raphaël Khoury, Abdelwahab Hamou-Lhadj
:
On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas. ISSRE Workshops 2019: 116-117 - [c93]Raphaël Khoury, Abdelwahab Hamou-Lhadj
, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo:
TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension. ISSRE Workshops 2019: 406-413 - 2018
- [j23]Jameleddine Hassine, Abdelwahab Hamou-Lhadj
, Luay Alawneh
:
A framework for the recovery and visualization of system availability scenarios from execution traces. Inf. Softw. Technol. 96: 78-93 (2018) - [j22]Pejman Salehi, Abdelwahab Hamou-Lhadj
, Maria Toeroe, Ferhat Khendek
:
A model-driven approach for the generation of configurations for highly available software systems. Innov. Syst. Softw. Eng. 14(4): 273-307 (2018) - [j21]Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Chamseddine Talhi:
Combining heterogeneous anomaly detectors for improved software security. J. Syst. Softw. 137: 415-429 (2018) - [j20]Md. Shariful Islam
, Wael Khreich, Abdelwahab Hamou-Lhadj
:
Anomaly Detection Techniques Based on Kappa-Pruned Ensembles. IEEE Trans. Reliab. 67(1): 212-229 (2018) - [c92]Wahab Hamou-Lhadj, Mathieu Nayrolles:
A Project on Software Defect Prevention at Commit-Time: A Success Story of University-Industry Research Collaboration. SER&IP@ICSE 2018: 24-25 - [c91]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
:
Towards a classification of bugs to facilitate software maintainability tasks. SQUADE@ICSE 2018: 25-32 - [c90]Korosh Koochekian Sabor, Mathieu Nayrolles, Abdelaziz Trabelsi, Abdelwahab Hamou-Lhadj
:
An Approach for Predicting Bug Report Fields Using a Neural Network Learning Model. ISSRE Workshops 2018: 232-236 - [c89]Omar Badreddin, Gerardo Barraza, Wahab Hamou-Lhadj:
vOCL: A novel approach for UML constraints modeling. MoDELS (Workshops) 2018: 174-186 - [c88]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
:
CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects. MSR 2018: 153-164 - [c87]Md. Shariful Islam, Korosh Koochekian Sabor, Abdelaziz Trabelsi, Wahab Hamou-Lhadj
, Luay Alawneh
:
MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection System. QRS 2018: 25-34 - [c86]Omar Badreddin, Wahab Hamou-Lhadj
, Vahdat Abdelzad, Rahad Khandoker, Maged Elassar:
Collaborative Software Design and Modeling in Open Source Systems. SAM 2018: 219-228 - [r2]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [i1]Shayan Eskandari, Jeremy Clark, Abdelwahab Hamou-Lhadj:
Buy your coffee with bitcoin: Real-world deployment of a bitcoin point of sale terminal. CoRR abs/1802.04236 (2018) - 2017
- [j19]Wael Khreich, Babak Khosravifar, Abdelwahab Hamou-Lhadj
, Chamseddine Talhi:
An anomaly detection system based on variable N-gram features and one-class SVM. Inf. Softw. Technol. 91: 186-197 (2017) - [j18]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
, Sofiène Tahar, Alf Larsson
:
A bug reproduction approach based on directed model checking and crash traces. J. Softw. Evol. Process. 29(3) (2017) - [c85]Atli F. Einarsson, Patrekur Patreksson, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj
:
SmartHomeML: Towards a Domain-Specific Modeling Language for Creating Smart Home Applications. ICIOT 2017: 82-88 - [c84]Kobra Khanmohammadi, Abdelwahab Hamou-Lhadj
:
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security. QRS 2017: 168-175 - [c83]Korosh Koochekian Sabor, Abdelwahab Hamou-Lhadj
, Alf Larsson:
DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports. QRS 2017: 240-250 - [c82]Daniel Amyot
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine
:
On the Impact of the SDL Forum Society Conferences on Academic Research. SDL Forum 2017: 30-45 - [c81]Hasan Salim Alkaf, Jameleddine Hassine
, Abdelwahab Hamou-Lhadj
, Luay Alawneh
:
An Automated Change Impact Analysis Approach to GRL Models. SDL Forum 2017: 157-172 - 2016
- [j17]Pejman Salehi
, Abdelwahab Hamou-Lhadj
, Maria Toeroe, Ferhat Khendek
:
A UML-based domain specific modeling language for service availability management: Design and experience. Comput. Stand. Interfaces 44: 63-83 (2016) - [j16]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj
, Ayse Basar Bener
:
Mining trends and patterns of software vulnerabilities. J. Syst. Softw. 117: 218-228 (2016) - [j15]Luay Alawneh
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine
:
Segmenting large traces of inter-process communication with a focus on high performance computing systems. J. Syst. Softw. 120: 1-16 (2016) - [j14]Andriy V. Miranskyy, Abdelwahab Hamou-Lhadj
, Enzo Cialini, Alf Larsson
:
Operational-Log Analysis for Big Data Systems: Challenges and Solutions. IEEE Softw. 33(2): 52-59 (2016) - [c80]Neda Ebrahimi Koopaei, Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Mohammad Hamdaqa
:
An effective method for detecting duplicate crash reports using crash traces and hidden Markov models. CASCON 2016: 75-84 - [c79]Korosh Koochekian Sabor, Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj:
Automatic prediction of the severity of bugs using stack traces. CASCON 2016: 96-105 - [c78]Hanieh Alipour, Yan Liu, Abdelwahab Hamou-Lhadj
, Ian Gorton:
Model driven performance simulation of cloud provisioned Hadoop mapreduce applications. MiSE@ICSE 2016: 48-54 - [c77]Raphaël Khoury, Lei Shi, Abdelwahab Hamou-Lhadj
:
Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle. ICSME 2016: 478-482 - [c76]Omar Badreddin, Maged Elaasar, Wahab Hamou-Lhadj
:
A Controlled Experiment for Evaluating the Comprehensibility of UML Action Languages. MODELSWARD 2016: 52-64 - [c75]Shayan Eskandari
, Jeremy Clark, Abdelwahab Hamou-Lhadj
:
Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 382-389 - [c74]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
:
BUMPER: A Tool for Coping with Natural Language Searches of Millions of Bugs and Fixes. SANER 2016: 649-652 - 2015
- [j13]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Abdelwahab Hamou-Lhadj
:
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System. IEEE Trans. Reliab. 64(1): 269-283 (2015) - [c73]Neda Ebrahimi Koopaei, Abdelwahab Hamou-Lhadj:
CrashAutomata: an approach for the detection of duplicate crash reports based on generalizable automata. CASCON 2015: 201-210 - [c72]Kobra Khanmohammadi, Mohammad Reza Rejali, Abdelwahab Hamou-Lhadj
:
Understanding the Service Life Cycle of Android Apps: An Exploratory Study. SPSM@CCS 2015: 81-86 - [c71]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj
, Stéphane Gagnon
:
A trace abstraction approach for host-based anomaly detection. CISDA 2015: 1-8 - [c70]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Nazim H. Madhavji, Mechelle Gittens:
Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces. GTSE@ICSE 2015: 59-68 - [c69]Abdou Maiga, Abdelwahab Hamou-Lhadj
, Mathieu Nayrolles, Korosh Koochekian Sabor, Alf Larsson
:
An empirical study on the handling of crash reports in a large software company: An experience report. ICSME 2015: 342-351 - [c68]Mathieu Nayrolles, Eric Beaudry, Naouel Moha, Petko Valtchev
, Abdelwahab Hamou-Lhadj
:
Towards Quality-Driven SOA Systems Refactoring Through Planning. MCETECH 2015: 269-284 - [c67]Omar Bahy Badreddin, Arnon Sturm, Abdelwahab Hamou-Lhadj, Timothy Lethbridge, Waylon Dixon, Ryan Simmons:
The Effects of Education on Students' Perception of Modeling in Software Engineering. HuFaMo@MoDELS 2015: 39-46 - [c66]Amirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj
:
An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques. QRS 2015: 109-118 - [c65]Maroua Ben Attia
, Chamseddine Talhi, Abdelwahab Hamou-Lhadj
, Babak Khosravifar, Vincent Turpaud, Mario Couture:
On-device anomaly detection for resource-limited systems. SAC 2015: 548-554 - [c64]Jameleddine Hassine
, Abdelwahab Hamou-Lhadj
:
Describing Early Security Requirements Using Use Case Maps. SDL Forum 2015: 202-217 - [c63]Manel Abdellatif
, Chamseddine Talhi, Abdelwahab Hamou-Lhadj
, Michel R. Dagenais:
On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis. SRDS Workshop 2015: 42-46 - [c62]Mathieu Nayrolles, Abdelwahab Hamou-Lhadj
, Sofiène Tahar, Alf Larsson
:
JCHARMING: A bug reproduction approach using crash traces and directed model checking. SANER 2015: 101-110 - [c61]Luay Alawneh
, Abdelwahab Hamou-Lhadj
, Jameleddine Hassine
:
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks. SANER 2015: 111-120 - 2014
- [j12]Alireza Shameli-Sendi, Mohamed Cheriet, Abdelwahab Hamou-Lhadj
:
Taxonomy of intrusion risk assessment and response system. Comput. Secur. 45: 1-16 (2014) - [j11]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Nazim H. Madhavji, Mechelle Gittens:
An empirical study on the use of mutant traces for diagnosis of faults in deployed systems. J. Syst. Softw. 90: 29-44 (2014) - [c60]Hanieh Alipour, Yan Liu, Abdelwahab Hamou-Lhadj:
Analyzing auto-scaling issues in cloud environments. CASCON 2014: 75-89 - [c59]Luay Alawneh
, Abdelwahab Hamou-Lhadj
, Syed Shariyar Murtaza, Yan Liu:
A contextual approach for effective recovery of inter-process communication patterns from HPC traces. CSMR-WCRE 2014: 274-282 - [c58]Salman Hoseini, Abdelwahab Hamou-Lhadj
, Patrick Desrosiers
, Martin Tapp:
Software feature location in practice: debugging aircraft simulation systems. ICSE Companion 2014: 225-234 - [c57]Jameleddine Hassine, Abdelwahab Hamou-Lhadj
:
Toward a UCM-Based Approach for Recovering System Availability Requirements from Execution Traces. SAM 2014: 48-63 - [c56]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Wael Khreich, Mario Couture:
Total ADS: Automated Software Anomaly Detection System. SCAM 2014: 83-88 - [r1]Richard Khoury, Raphaël Khoury, Abdelwahab Hamou-Lhadj:
Microtext Processing. Encyclopedia of Social Network Analysis and Mining 2014: 894-904 - 2013
- [j10]Ali Kanso, Ferhat Khendek
, Maria Toeroe, Abdelwahab Hamou-Lhadj
:
Automatic configuration generation for service high availability with load balancing. Concurr. Comput. Pract. Exp. 25(2): 265-287 (2013) - [j9]Heidar Pirzadeh, Sara Shanian, Abdelwahab Hamou-Lhadj
, Luay Alawneh
, Arya Shafiee:
Stratified sampling of execution traces: Execution phases serving as strata. Sci. Comput. Program. 78(8): 1099-1118 (2013) - [c55]Alf Larsson
, Abdelwahab Hamou-Lhadj
:
Mining Telecom System Logs to Facilitate Debugging Tasks. ICSM 2013: 536-539 - [c54]Shayan Eskandari
, Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Mario Couture:
Monitoring system calls for anomaly detection in modern operating systems. ISSRE (Supplemental Proceedings) 2013: 19-20 - [c53]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj
, Mario Couture:
A host-based anomaly detection approach by representing system calls as states of kernel modules. ISSRE 2013: 431-440 - [c52]Abdelwahab Hamou-Lhadj
, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphaël Khoury:
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction. RACS 2013: 328-335 - [c51]Jameleddine Hassine
, Abdelwahab Hamou-Lhadj
:
Towards the Generation of AMF Configurations from Use Case Maps Based Availability Requirements. SDL Forum 2013: 36-53 - [p1]Abdelwahab Hamou-Lhadj:
The Role of Software Tracing in Software Maintenance. Modeling Approaches and Algorithms for Advanced Computer Applications 2013: 5 - 2012
- [j8]Abdelwahab Hamou-Lhadj
, Timothy C. Lethbridge
:
A metamodel for the compact but lossless exchange of execution traces. Softw. Syst. Model. 11(1): 77-98 (2012) - [c50]Maher Idris, Ali Mehrabian, Abdelwahab Hamou-Lhadj
, Richard Khoury:
Pattern-Based Trace Correlation Technique to Compare Software Versions. AIS 2012: 159-166 - [c49]Raphaël Khoury, Abdelwahab Hamou-Lhadj
, Mario Couture:
Towards a formal framework for evaluating the effectiveness of system diversity when applied to security. CISDA 2012: 1-7 - [c48]Syed Shariyar Murtaza, Afroza Sultana, Abdelwahab Hamou-Lhadj
, Mario Couture:
On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies. CSMR 2012: 127-136 - [c47]Afroza Sultana, Abdelwahab Hamou-Lhadj
, Mario Couture:
An improved Hidden Markov Model for anomaly detection using frequent common patterns. ICC 2012: 1113-1117 - [c46]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Identifying computational phases from inter-process communication traces of HPC applications. ICPC 2012: 133-142 - 2011
- [j7]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
An exchange format for representing dynamic information generated from High Performance Computing applications. Future Gener. Comput. Syst. 27(4): 381-394 (2011) - [j6]Mohammad Hamdaqa
, Abdelwahab Hamou-Lhadj
:
An approach based on citation analysis to support effective handling of regulatory compliance. Future Gener. Comput. Syst. 27(4): 395-410 (2011) - [j5]Hossein Mehrfard, Abdelwahab Hamou-Lhadj
:
The Impact of Regulatory Compliance on Agile Software Processes with a Focus on the FDA Guidelines for Medical Device Software. Int. J. Inf. Syst. Model. Des. 2(2): 67-81 (2011) - [c45]Pejman Salehi, Ferhat Khendek, Abdelwahab Hamou-Lhadj, Maria Toeroe:
AMF configurations: Checking for service protection using heuristics. CNSM 2011: 1-8 - [c44]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
Pattern Recognition Techniques Applied to the Abstraction of Traces of Inter-Process Communication. CSMR 2011: 211-220 - [c43]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj
:
A Novel Approach Based on Gestalt Psychology for Abstracting the Content of Large Execution Traces for Program Comprehension. ICECCS 2011: 221-230 - [c42]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj
:
A software behaviour analysis framework based on the human perception systems. ICSE 2011: 948-951 - [c41]Heidar Pirzadeh, Abdelwahab Hamou-Lhadj
, Mohak Shah:
Exploiting text mining techniques in the analysis of execution traces. ICSM 2011: 223-232 - [c40]Luay Alawneh
, Abdelwahab Hamou-Lhadj
:
MTF: A Scalable Exchange Format for Traces of High Performance Computing Systems. ICPC 2011: 181-184