default search action
Yahia Lebbah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Arnold Hien, Noureddine Aribi, Samir Loudni, Yahia Lebbah, Abdelkader Ouali, Albrecht Zimmermann:
Mining diverse sets of patterns with constraint programming using the pairwise Jaccard similarity relaxation. Constraints An Int. J. 29(1): 80-111 (2024) - [c33]Charles Vernerey, Noureddine Aribi, Samir Loudni, Yahia Lebbah, Nassim Belmecheri:
Learning to Rank Based on Choquet Integral: Application to Association Rules. PAKDD (1) 2024: 313-326 - 2023
- [j27]Amina Kemmar, Chahira Touati, Yahia Lebbah:
A CP-based approach for mining sequential patterns with quantities. Inteligencia Artif. 26(71): 1-12 (2023) - [j26]Nassim Belmecheri, Noureddine Aribi, Nadjib Lazaar, Yahia Lebbah, Samir Loudni:
Boosting the Learning for Ranking Patterns. Algorithms 16(5): 218 (2023) - [j25]Mohammed El Amine Laghzaoui, Yahia Lebbah:
A constraint programming approach for quantitative frequent pattern mining. Int. J. Data Min. Model. Manag. 15(3): 297-311 (2023) - [c32]Charles Vernerey, Samir Loudni, Noureddine Aribi, Yahia Lebbah:
Fouille de motifs sans seuil par optimisation multi-objectifs : Application aux règles d'association. EGC 2023: 483-490 - 2022
- [c31]Nassim Belmecheri, Noureddine Aribi, Nadjib Lazaar, Yahia Lebbah, Samir Loudni:
Une méthode d'apprentissage par optimisation multicritère pour le rangement de motifs en fouille de données. EGC 2022: 289-296 - [c30]Charles Vernerey, Samir Loudni, Noureddine Aribi, Yahia Lebbah:
Threshold-free Pattern Mining Meets Multi-Objective Optimization: Application to Association Rules. IJCAI 2022: 1880-1886 - [i7]Nassim Belmecheri, Noureddine Aribi, Nadjib Lazaar, Yahia Lebbah, Samir Loudni:
Boosting the Learning for Ranking Patterns. CoRR abs/2203.02696 (2022) - 2021
- [j24]Naima El Ghandour, Moussa Benaissa, Yahia Lebbah:
An Integer Linear Programming-Based Method for the Extraction of Ontology Alignment. Int. J. Inf. Technol. Web Eng. 16(2): 25-44 (2021) - 2020
- [j23]Abdelkader Ouali, David Allouche, Simon de Givry, Samir Loudni, Yahia Lebbah, Lakhdar Loukil, Patrice Boizumault:
Variable neighborhood search for graphical model energy minimization. Artif. Intell. 278 (2020) - [j22]Said Fourour, Yahia Lebbah:
Equitable Optimization for Multicast Communication. Int. J. Decis. Support Syst. Technol. 12(3): 1-25 (2020) - [j21]Noureddine Aribi, Yahia Lebbah:
A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols. Int. J. Inf. Secur. Priv. 14(4): 1-21 (2020) - [j20]Mohammed Rachid Khatir, Yahia Lebbah, Rachid Nourine:
A pattern-growth approach for mining trajectories. Multiagent Grid Syst. 16(2): 117-133 (2020) - [c29]Arnold Hien, Samir Loudni, Noureddine Aribi, Yahia Lebbah, Mohammed El Amine Laghzaoui, Abdelkader Ouali, Albrecht Zimmermann:
A Relaxation-Based Approach for Mining Diverse Closed Patterns. ECML/PKDD (1) 2020: 36-54
2010 – 2019
- 2019
- [c28]Noureddine Aribi, Nadjib Lazaar, Yahia Lebbah, Samir Loudni, Mehdi Maamar:
A Multiple Fault Localization Approach Based on Multicriteria Analytical Hierarchy Process. AITest 2019: 1-8 - 2018
- [j19]Amina Kemmar, Yahia Lebbah, Samir Loudni:
Interval graph mining. Int. J. Data Min. Model. Manag. 10(1): 1-22 (2018) - [j18]Noureddine Aribi, Yahia Lebbah:
On Solving the Multi-Objective Software Package Upgradability Problem. Int. J. Open Source Softw. Process. 9(2): 18-38 (2018) - [c27]Noureddine Aribi, Abdelkader Ouali, Yahia Lebbah, Samir Loudni:
Equitable Conceptual Clustering Using OWA Operator. PAKDD (3) 2018: 465-477 - [i6]Christian Bessiere, Nadjib Lazaar, Yahia Lebbah, Mehdi Maamar:
Users Constraints in Itemset Mining. CoRR abs/1801.00345 (2018) - 2017
- [j17]Mehdi Maamar, Nadjib Lazaar, Samir Loudni, Yahia Lebbah:
Fault localization using itemset mining under constraints. Autom. Softw. Eng. 24(2): 341-368 (2017) - [j16]Amina Kemmar, Yahia Lebbah, Samir Loudni, Patrice Boizumault, Thierry Charnois:
Prefix-projection global constraint and top-k approach for sequential pattern mining. Constraints An Int. J. 22(2): 265-306 (2017) - [c26]Noureddine Aribi, Mehdi Maamar, Nadjib Lazaar, Yahia Lebbah, Samir Loudni:
Multiple Fault Localization Using Constraint Programming and Pattern Mining. ICTAI 2017: 860-867 - [c25]Abdelkader Ouali, Albrecht Zimmermann, Samir Loudni, Yahia Lebbah, Bruno Crémilleux, Patrice Boizumault, Lakhdar Loukil:
Integer Linear Programming for Pattern Set Mining; with an Application to Tiling. PAKDD (2) 2017: 286-299 - [c24]Abdelkader Ouali, David Allouche, Simon de Givry, Samir Loudni, Yahia Lebbah, Lakhdar Loukil:
Iterative Decomposition Guided Variable Neighborhood Search for Graphical Model Energy Minimization. UAI 2017 - 2016
- [j15]Amina Kemmar, Yahia Lebbah, Samir Loudni:
A Constraint Programming Approach for Web Log Mining. Int. J. Inf. Technol. Web Eng. 11(4): 24-42 (2016) - [j14]Mohamed Sayah, Yahia Lebbah:
GWW metaheuristic to solve constraints on floating point numbers and application to test case generation. Int. J. Math. Model. Numer. Optimisation 7(2): 121-137 (2016) - [j13]Chahira Touati, Moussa Benaissa, Yahia Lebbah:
An efficient model for extracting an optimal alignment with multiple cardinalities in ontology alignment. Int. J. Metadata Semant. Ontologies 11(2): 71-81 (2016) - [j12]Amina Kemmar, Yahia Lebbah, Samir Loudni, Patrice Boizumault, Thierry Charnois:
Une contrainte globale pour l'extraction de motifs séquentiels. Rev. d'Intelligence Artif. 30(6): 675-703 (2016) - [j11]Chahira Touati, Moussa Benaissa, Yahia Lebbah:
Une approche basée sur les flots pour optimiser la sélection de l'alignement des ontologies. Rev. d'Intelligence Artif. 30(6): 733-758 (2016) - [c23]Nadjib Lazaar, Yahia Lebbah, Samir Loudni, Mehdi Maamar, Valentin Lemière, Christian Bessiere, Patrice Boizumault:
A Global Constraint for Closed Frequent Pattern Mining. CP 2016: 333-349 - [c22]Amina Kemmar, Samir Loudni, Yahia Lebbah, Patrice Boizumault, Thierry Charnois:
A Global Constraint for Mining Sequential Patterns with GAP Constraint. CPAIOR 2016: 198-215 - [c21]Abdelkader Ouali, Samir Loudni, Yahia Lebbah, Patrice Boizumault, Albrecht Zimmermann, Lakhdar Loukil:
Efficiently Finding Conceptual Clustering Models with Integer Linear Programming. IJCAI 2016: 647-654 - [i5]Mehdi Maamar, Nadjib Lazaar, Samir Loudni, Yahia Lebbah:
A global constraint for closed itemset mining. CoRR abs/1604.04894 (2016) - 2015
- [j10]Abdelkader Ouali, Samir Loudni, Lakhdar Loukil, Patrice Boizumault, Yahia Lebbah:
Replicated Parallel Strategies for Decomposition Guided VNS. Electron. Notes Discret. Math. 47: 93-100 (2015) - [j9]Fatima Zohra Lebbah, Yahia Lebbah:
VNS approach for solving a financial portfolio design problem. Electron. Notes Discret. Math. 47: 125-132 (2015) - [j8]Fatima Zohra Lebbah, Yahia Lebbah:
A Local Search Approach to Solve a Financial Portfolio Design Problem. Int. J. Appl. Metaheuristic Comput. 6(2): 1-17 (2015) - [c20]Amina Kemmar, Samir Loudni, Yahia Lebbah, Patrice Boizumault, Thierry Charnois:
PREFIX-PROJECTION Global Constraint for Sequential Pattern Mining. CP 2015: 226-243 - [i4]Amina Kemmar, Samir Loudni, Yahia Lebbah, Patrice Boizumault, Thierry Charnois:
Prefix-Projection Global Constraint for Sequential Pattern Mining. CoRR abs/1504.07877 (2015) - [i3]Amina Kemmar, Samir Loudni, Yahia Lebbah, Patrice Boizumault, Thierry Charnois:
A global Constraint for mining Sequential Patterns with GAP constraint. CoRR abs/1511.08350 (2015) - 2014
- [c19]Abdelkader Ouali, Samir Loudni, Lakhdar Loukil, Patrice Boizumault, Yahia Lebbah:
Cooperative Parallel Decomposition Guided VNS for Solving Weighted CSP. Hybrid Metaheuristics 2014: 100-114 - [c18]Amina Kemmar, Willy Ugarte, Samir Loudni, Thierry Charnois, Yahia Lebbah, Patrice Boizumault, Bruno Crémilleux:
Mining Relevant Sequence Patterns with CP-Based Framework. ICTAI 2014: 552-559 - 2013
- [c17]Noureddine Aribi, Yahia Lebbah:
Exact Approaches for Parameter Elicitation in Lexicographic Ordering. ADT 2013: 45-56 - [p1]Noureddine Aribi, Yahia Lebbah:
Statistical and Constraint Programming Approaches for Parameter Elicitation in Lexicographic Ordering. Modeling Approaches and Algorithms for Advanced Computer Applications 2013: 47-56 - 2012
- [j7]Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
A CP framework for testing CP. Constraints An Int. J. 17(2): 123-147 (2012) - [c16]Amina Kemmar, Yahia Lebbah, Mohammed Ouali, Samir Loudni:
Complete and Incomplete Approaches for Graph Mining. ICWIT 2012: 312-317 - 2011
- [j6]Moussa Benaissa, Yahia Lebbah:
A constraint programming based approach to detect ontology inconsistencies. Int. Arab J. Inf. Technol. 8(1): 1-8 (2011) - [j5]Alexandre Goldsztejn, Yahia Lebbah, Claude Michel, Michel Rueher:
Capabilities of Constraint Programming in Safe Global Optimization. Reliab. Comput. 15(1): 47-59 (2011) - [c15]Hamza Bouchaour, Mohammed Ouali, Yahia Lebbah:
Towards a Method for VLSI Circuit Reverse Engineering. CIIA 2011 - [c14]Moussa Benaissa, Yahia Lebbah:
Optimisation de l'extraction de l'alignment des ontologies avec la contrainte de différence. EGC 2011: 401-406 - [c13]Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
A Framework for the Automatic Correction of Constraint Programs. ICST 2011: 319-326 - 2010
- [c12]Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
On Testing Constraint Programs. CP 2010: 330-344 - [c11]Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
Fault Localization in Constraint Programs. ICTAI (1) 2010: 61-67 - [i2]Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
On Testing Constraint Programs. CoRR abs/1005.2882 (2010)
2000 – 2009
- 2009
- [j4]Yahia Lebbah:
ICOS: a branch and bound based solver for rigorous global optimization. Optim. Methods Softw. 24(4-5): 709-726 (2009) - 2008
- [c10]Alexandre Goldsztejn, Yahia Lebbah, Claude Michel, Michel Rueher:
Revisiting the Upper Bounding Process in a Safe Branch and Bound Algorithm. CP 2008: 598-602 - [c9]Arnaud Gotlieb, Nadjib Lazaar, Yahia Lebbah:
Towards Constraing-Based Local Search for Automatic Test Data Generation. ICST Workshops 2008: 195 - [i1]Alexandre Goldsztejn, Yahia Lebbah, Claude Michel, Michel Rueher:
Revisiting the upper bounding process in a safe Branch and Bound algorithm. CoRR abs/0807.2382 (2008) - 2007
- [c8]Yahia Lebbah, Claude Michel, Michel Rueher:
Using constraint techniques for a safe and fast implementation of optimality-based reduction. SAC 2007: 326-331 - 2005
- [j3]Yahia Lebbah, Claude Michel, Michel Rueher:
A Rigorous Global Filtering Algorithm for Quadratic Constraints*. Constraints An Int. J. 10(1): 47-65 (2005) - [j2]Yahia Lebbah, Claude Michel, Michel Rueher, David Daney, Jean-Pierre Merlet:
Efficient and Safe Global Constraints for Handling Numerical Constraint Systems. SIAM J. Numer. Anal. 42(5): 2076-2097 (2005) - 2003
- [c7]Yahia Lebbah, Claude Michel, Michel Rueher:
Efficient Pruning Technique Based on Linear Relaxations. COCOS 2003: 1-14 - 2002
- [j1]Yahia Lebbah, Olivier Lhomme:
Accelerating filtering techniques for numeric CSPs. Artif. Intell. 139(1): 109-132 (2002) - [c6]Yahia Lebbah, Michel Rueher, Claude Michel:
A Global Filtering Algorithm for Handling Systems of Quadratic Equations and Inequations. CP 2002: 109-123 - 2001
- [c5]Claude Michel, Michel Rueher, Yahia Lebbah:
Solving Constraints over Floating-Point Numbers. CP 2001: 524-538
1990 – 1999
- 1998
- [c4]Yahia Lebbah, Olivier Lhomme:
Acceleration Methods for Numeric CSPs. AAAI/IAAI 1998: 19-24 - [c3]Yahia Lebbah, Olivier Lhomme:
Acceleration methods for numeric CSPs. JFPLC 1998: 185-198 - [c2]Yahia Lebbah, Olivier Lhomme:
Prediction by extrapolation for interval tightening methods. SCAN 1998: 159-166 - 1997
- [c1]Yahia Lebbah:
Consistency Checking by Type Inference and Constraint Satisfaction. SAFECOMP 1997: 253-264
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint